16.3.1/16. 0.0.0.255 any eq 22
access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25
access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35
access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18
access-list 101 permit tcp 172.16.5.35/16. 0.0.0.255 any eq19
access-list 101 permit tcp 172.16.0.0/16. 0.0.0.255 any eq39
access-list 101 deny tcp 172.16.0.254/16. 0.0.0.255 any eq26
access-list 101 deny tcp 172.16.5.35/16 . 0.0.0.255 any eq23
Further steps is the configuration of ACL for ABC Corporation. Configuration of Extended Access Control list is critical for the protection of network infrastructures of ABC Corporation.
Configuration of Extended Access Control Lists for ABC Corporation using Port Numbers.
The following commands are used for the configuration of Extended Access Control List for the ABC Corporation network infrastructure.:
R1(config)#access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20
R1(config)#access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21
R1(config)#access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22
R1(config)#access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25
R1(config)#access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35
R1(config)#access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18
R1(config)#access-list 101 permit tcp 172.16.5.35/16. 0.0.0.255 any eq19
R1(config)#access-list 101 permit tcp 172.16.0.0/16. 0.0.0.255 any eq39
R1(config)#access-list 101 deny tcp 172.16.0.254/16. 0.0.0.255 any eq26
R1(config)#access-list 101 deny tcp 172.16.5.35/16 . 0.0.0.255 any eq23
Based on the configuration of the ACL for ABC Corporation, the paper re-creates the diagram.
Fig 2: Re-create of ACL Diagram for ABC Corporation
With the ACL commands, the paper recreates the diagram, and creates filtering rules for the router to follow. From the diagram in Fig 2, router will filter all hosts 172.16.5.35 from getting access onto the Internet. When host 172.16.5.35 attempts to get access into the internet, the ACL commands will prevent host 172.16.5.35 from getting access. This is very important because some malicious users may want to get access to the internet using these devices. By creating the ACL filtering rules, the host 172.16.5.35 will not be able to get access to the ABC Corporation.
Additional filtering rules that will be implemented based on Fig 2 are that the router will deny all other traffic to get access to 172.16.5.3.0. The router will serve as a guard to prevent other network from getting access to 172.16.5.3.0. In these devices, when a packet arrives onto the network router, and based on the filtering rules, the packet will extract information from the packet and the router will make decision whether to pass the information into the network or deny the information. Based on the filtering rules created, the router will deny other network traffic from getting access to the 172.16.5.3.0.
More importantly, the router will not allow outside traffic to ping telnet and ftp. This is very important for security reason because Telnet does not encrypt the data that come from other network. Thus, it is practical for eavesdropper to extract information from the network if allowing outside traffic to get access to the network. Moreover, there is no authentication that would ensure that there is no interception when the communication is being carried out over the network. Based on the shortcoming of the Telnet, it is very critical for ABC Corporation not to allow outside network from getting access to the Telnet.
Additionally, part of the filtering rules is not to allow outside network to get access to the File Transfer Control (FTP). Typically,...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now