تفاصيل العمل

This project is a technical laboratory exercise from Cisco Networking Academy, performed using the Packet Tracer simulation tool. It focuses on the implementation and management of Standard IPv4 Access Control Lists (ACLs).

Here is a formal description of the work shown in the image:

1. Project Overview

Title: Configure and Modify Standard IPv4 ACLs.

Goal: To manage network traffic and enhance security by allowing or denying data packets based on their source IP addresses.

Status: The activity is 100% Complete, indicating that all configuration tasks and connectivity tests were successful.

2. Network Topology Structure

The network represents a corporate environment divided into three main segments:

Office 1 (Left): Managed by router R1, connecting two local networks (PC-A and PC-B) through switches S1 and S2.

Office 2 (Right): Managed by router R3, connecting two local networks (PC-C and PC-D) through switches S3 and S4.

The Edge (Center): Acts as the gateway between the two offices and the external Internet (represented by the server at 209.165.200.254).

3. Key Technical Components

The Addressing Table provides the roadmap for the entire configuration:

IP Addressing: Utilizes private Class C networks (e.g., 192.168.10.0/24) for local offices and serial point-to-point links (e.g., 10.1.1.0/30) for inter-router communication.

Default Gateways: Properly assigned to all end devices (PCs) and switches to ensure they can communicate outside their local subnet.

Interfaces: Uses a mix of GigabitEthernet for local traffic and Serial interfaces for Wide Area Network (WAN) connections.

4. Tasks Performed

Based on the objective, the work involved:

Configuration: Writing ACL statements to permit or deny specific traffic (e.g., preventing Office 1 from accessing Office 2).

Application: Applying the ACLs to the correct router interfaces in the "Inbound" or "Outbound" direction.

Modification: Editing existing ACLs to add new rules without deleting the entire list.

Verification: Testing connectivity using ping commands to ensure the security rules are working as intended.

بطاقة العمل

اسم المستقل
عدد الإعجابات
0
عدد المشاهدات
1
تاريخ الإضافة
تاريخ الإنجاز
المهارات