ACL Filtering Lab
Security

Overview
This lab demonstrates how Access Control Lists (ACLs) are used to filter network traffic and control access between different networks.
Requirements
- Create standard ACL
- Create extended ACL
- Apply ACL to interface
Steps
- Define ACL rules based on network requirements
- Apply ACL to the correct interface direction (in/out)
- Test traffic flow between networks
Solution
- Step 1: Created a standard ACL to permit traffic from 192.168.1.0/24 network
- Step 2: Applied the ACL to interface G0/0 in inbound direction
- Step 3: Verified configuration using show access-lists command
- Step 4: Tested connectivity to confirm allowed and blocked traffic behavior
Verification
- ACL entries correctly installed in router
- Allowed traffic passes as expected
- Blocked traffic is denied properly
- No misconfigured rules detected
Notes
- ACLs are processed top-down (order matters)
- Implicit deny exists at the end of every ACL
- Always test both allowed and denied traffic