[CCNAv6 S4] 4.4.2.9 Packet Tracer - Troubleshooting IPv4 ACLs




Packet Tracer - Troubleshooting IPv4 ACLs
Addressing Table


Objectives

Part 1: Troubleshoot ACL Issue 1

Part 2: Troubleshoot ACL Issue 2

Part 3: Troubleshoot ACL Issue 3

Scenario

This network is meant to have the following three policies implemented:

·        Hosts from the 192.168.0.0/24 network are unable to access any TCP service of Server3.
·        Hosts from the 10.0.0.0/8 network are unable to access the HTTP service of Server1.
·        Hosts from the 172.16.0.0/16 network are unable to access the FTP service of Server2.
Note: All FTP usernames and passwords are “cisco”.

No other restrictions should be in place. Unfortunately, the rules that have been implemented are not working correctly. Your task is to find and fix the errors related to the access lists on R1.

Part 1:      Troubleshoot ACL Issue 1
Hosts from the 192.168.0.0/24 network are intentionally unable to access any TCP service of Server3, but should not be otherwise restricted.

Step 1:      Determine the ACL problem.

As you perform the following tasks, compare the results to what you would expect from the ACL.

a.      Using L2, attempt to access FTP and HTTP services of Server1, Server2, and Server3.

b.      Using L2, ping Server1, Server2, and Server3.

c.      Using L2, ping G0/2 of R1.

d.      View the running configuration on R1. Examine access list 192_to_10 and its placement on the interfaces. Is the access list placed on the correct interface and in the correct direction? Is there any statement in the list that permits or denies traffic to other networks? Are the statements in the correct order?

e.      Perform other tests, as necessary.

Step 2:      Implement a solution.

Make an adjustment to access list 192_to_10 to fix the problem.

Step 3:      Verify that the problem is resolved and document the solution.

If the problem is resolved, document the solution: otherwise return to Step 1.

Part 2:      Troubleshoot ACL Issue 2
Hosts from the 10.0.0.0/8 network are intentionally unable to access the HTTP service of Server1, but should not be otherwise restricted.

Step 1:      Determine the ACL problem.

As you perform the following tasks, compare the results to what you would expect from the ACL.

a.      Using L3, attempt to access FTP and HTTP services of Server1, Server2, and Server3.

b.      Using L3, ping Server1, Server2, and Server3.

c.      View the running configuration on R1. Examine access list 10_to_172 and its placement on the interfaces. Is the access list placed on the correct interface and in the correct direction? Is there any statement in the list that permits or denies traffic to other networks? Are the statements in the correct order?

d.      Run other tests as necessary.

Step 2:      Implement a solution.

Make an adjustment to access list 10_to_172 to fix the problem.

Step 3:      Verify the problem is resolved and document the solution.

If the problem is resolved, document the solution; otherwise return to Step 1.

Part 3:      Troubleshoot ACL Issue 3
Hosts from the 172.16.0.0/16 network are intentionally unable to access the FTP service of Server2, but should not be otherwise restricted.

Step 1:      Determine the ACL problem.

As you perform the following tasks, compare the results to the expectations of the ACL.

a.      Using L1, attempt to access FTP and HTTP services of Server1, Server2, and Server3.

b.      Using L1, ping Server1, Server2, and Server3.

c.      View the running configuration on R1. Examine access list 172_to_192 and its placement on the interfaces. Is the access list placed on the correct port in the correct direction? Is there any statement in the list that permits or denies traffic to other networks? Are the statements in the correct order?

d.      Run other tests as necessary.

Step 2:      Implement a solution.

Make an adjustment to access list 172_to_192 to fix the problem.

Step 3:      Verify the problem is resolved and document the solution.

If the problem is resolved, document the solution; otherwise return to Step 1.



Configuration R1:

enable
configure terminal
ip access-list extended 192_to_10
 permit ip any any
ip access-list extended 172_to_192
 no 10
 30 permit ip any any
interface g0/0
 no ip access-group 10_to_172 out
 ip access-group 10_to_172 in
 end
write memory
!

END !~!



Nhận xét

Đăng nhận xét

Bài đăng phổ biến từ blog này

[CCNAv6 S4] 8.2.4.14 Packet Tracer - Troubleshooting Enterprise Networks 3

[CCNAv6 S2] 2.2.2.4 Packet Tracer - Configuring IPv4 Static and Default Routes

[CCNAv6 S2] 7.3.2.4 Packet Tracer - Troubleshooting Standard IPv4 ACLs