ACL访问控制列表 Cisco
原创
©著作权归作者所有:来自51CTO博客作者hitns的原创作品,请联系作者获取转载授权,否则将追究法律责任
拓扑结构图:
![ACL访问控制列表 Cisco_ACL访问控制列表](https://s2.51cto.com/images/blog/202212/09103243_63929e4b30f2056544.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_30,g_se,x_10,y_10,shadow_20,type_ZmFuZ3poZW5naGVpdGk=/resize,m_fixed,w_1184)
配置代码:
S1:
enable
conf t
host s1
no ip domain-lookup
vlan 2
exit
vlan 3
exit
vlan 4
exit
int vlan 2
ip address 192.168.2.254 255.255.255.0
int vlan 3
ip address 192.168.3.254 255.255.255.0
int vlan 4
ip address 192.168.4.254 255.255.255.0
int f0/1
switchport access vlan 2
int f0/2
switchport access vlan 3
int f0/3
switchport access vlan 4
exit
ip routing
int f0/4
no switchport
ip address 192.168.5.2 255.255.255.252
no shut
exit
ip route 0.0.0.0 0.0.0.0 192.168.5.1
!扩展ACL访问控制列表的启用
!在S1上创建扩展访问控制列表,禁止192.168.2.0/24访问192.168.6.0/24的web服务器
access-list 101 deny tcp 192.168.2.0 0.0.0.255 host 192.168.6.1 eq www
access-list 101 permit tcp any any eq www
int vlan 2
ip access-group 101 in
!撤销ACL对网络的访问控制
int vlan 2
no ip access-group 101 in
!下边这个没有配置成功,但是自己查看博客确实是这样写的,所以这个作为一个疑问保留
!时间访问控制列表:在host 192.168.6.1中提供ftp服务,要求:只容许192.168.3.0/24
!网段的用户在2020年5月1日到2020年12月31日的周末访问host 192.168.6.1上的
!ftp资源,工作时间不能下载该ftp资源
time-range softer
periodic weekend 00:00 to 23:59
asbolute start 1 may 2020 end 31 December 2020
access-list 102 deny tcp 192.168.3.0 0.0.0.255 host 192.168.6.1 eq ftp time-range softer
access-list 102 permit tcp any any eq ftp
int vlan 3
ip access-group 102 in
!撤销ACL对网络的访问控制
int vlan 3
no ip access-group 102 in
R1:
enable
conf t
host r1
no ip domain-lookup
int g0/0
ip address 192.168.5.1 255.255.255.252
no shut
int g0/1
ip address 192.168.6.254 255.255.255.0
no shut
exit
ip route 0.0.0.0 0.0.0.0 192.168.5.2
!ACL 访问控制列表的启用
access-list 1 deny 192.168.4.0 0.0.0.255
access-list 1 permit any
int g0/1
ip access-group 1 out
exit
int g0/1
no ip access-group 1 out
Exit
实验结果:
路由表:
S1:
![ACL访问控制列表 Cisco_访问控制_02](https://s2.51cto.com/images/blog/202212/09103243_63929e4b6c56210965.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_30,g_se,x_10,y_10,shadow_20,type_ZmFuZ3poZW5naGVpdGk=/resize,m_fixed,w_1184)
R1:
![ACL访问控制列表 Cisco_访问控制_03](https://s2.51cto.com/images/blog/202212/09103243_63929e4ba57fc79207.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_30,g_se,x_10,y_10,shadow_20,type_ZmFuZ3poZW5naGVpdGk=/resize,m_fixed,w_1184)
1:在S1上创建扩展访问控制列表,禁止192.168.2.0/24访问192.168.6.0/24的web服务器
PC1:
![ACL访问控制列表 Cisco_web服务器_04](https://s2.51cto.com/images/blog/202212/09103243_63929e4bf1ec973923.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_30,g_se,x_10,y_10,shadow_20,type_ZmFuZ3poZW5naGVpdGk=/resize,m_fixed,w_1184)
2:禁止192.168.4.0/24访问192.168.6.0/24
PC3:
![ACL访问控制列表 Cisco_web服务器_05](https://s2.51cto.com/images/blog/202212/09103244_63929e4c3854743582.png?x-oss-process=image/watermark,size_16,text_QDUxQ1RP5Y2a5a6i,color_FFFFFF,t_30,g_se,x_10,y_10,shadow_20,type_ZmFuZ3poZW5naGVpdGk=/resize,m_fixed,w_1184)