All language subtitles for 10. Access Control Lists

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,480 --> 00:00:04,460 In the section we're going to talk about the access control lists. 2 00:00:04,470 --> 00:00:15,660 Let's go with the ACL or will a c as access lists are a set of commands which are grouped together to 3 00:00:15,660 --> 00:00:21,420 filter the packet that enters or leaves to an interface. 4 00:00:21,630 --> 00:00:31,230 They control the flow of traffic in their work and provide security for network access access lists 5 00:00:31,260 --> 00:00:41,220 are implemented sequentially as a permit or deny statement to inbound or outbound of interface and used 6 00:00:41,220 --> 00:00:47,680 for also different purposes such as for example maybe a rough map or something like that. 7 00:00:47,730 --> 00:00:53,990 There are two types of access lists and they are standard or extended. 8 00:00:54,000 --> 00:00:59,150 And they can be used with numbers or named format. 9 00:00:59,160 --> 00:01:07,880 Please pay attention that each ACL must have a permit statement because there is an implicit denial 10 00:01:07,880 --> 00:01:10,620 rule at the bottom of each ACL. 11 00:01:10,620 --> 00:01:12,030 That's the key point. 12 00:01:13,410 --> 00:01:20,630 Anywhere you see an example for the number access list which are permitting some networks. 13 00:01:20,780 --> 00:01:27,240 And here's our configuration access list and the number. 14 00:01:27,500 --> 00:01:38,510 Then permit or deny statement and we're using and network and we are using air field named Wild Cards 15 00:01:39,110 --> 00:01:43,150 which we're going to exit mine later. 16 00:01:44,060 --> 00:01:49,130 All access lists must be identified by a name or a number. 17 00:01:49,130 --> 00:01:56,990 As I told you in the first slide and then the access lists are more common than then numbered access 18 00:01:56,990 --> 00:02:06,180 lists because you can specify a meaningful name that is easier to remember and associate with that task. 19 00:02:06,350 --> 00:02:15,080 You can reorder statements in or add statements to named access lists and name the access lists support 20 00:02:15,170 --> 00:02:24,340 the following features that are not supported by a number to access such as IP options filtering noncontiguous 21 00:02:24,430 --> 00:02:27,400 ports or TCAP flic filtering. 22 00:02:27,440 --> 00:02:28,180 All right. 23 00:02:28,190 --> 00:02:34,400 Here is how we can configure named access list to configure a name access list. 24 00:02:34,400 --> 00:02:40,550 We are typing i p access list command and we're choosing. 25 00:02:40,580 --> 00:02:49,340 If we're going to use an extended or if we're going to use a standard access that most of the time in 26 00:02:49,340 --> 00:02:56,780 this Exxon-Mobile we're using standard and I pay access list and the standard configuration. 27 00:02:56,780 --> 00:03:06,080 And we are writing the name of our access this thing here and as you can see in here under the access 28 00:03:06,080 --> 00:03:12,690 this month we are denying or permitting to sign statements. 29 00:03:12,930 --> 00:03:17,190 OK let's go ahead with the wild card mask. 30 00:03:17,700 --> 00:03:27,900 What mask is a mask of bits that indicates which parts of an IP address are available for an examination 31 00:03:27,930 --> 00:03:35,770 and determines what IP addresses should be permanent or denied in access control lists. 32 00:03:35,890 --> 00:03:44,590 What kind of mask has a reverse logic logical subnet mask as 0 in the wild card mask means to focus 33 00:03:44,670 --> 00:03:57,540 to that bet while as one means to ignoring the to when if you see is zero on the summer mask answer 34 00:03:57,540 --> 00:04:07,230 on the current mess that means we need to take care we need to focus a little bit but if we're seeing 35 00:04:07,410 --> 00:04:12,150 one that means we need to ignore that bit. 36 00:04:12,230 --> 00:04:16,770 OK I'm going to show you an example as well. 37 00:04:17,100 --> 00:04:25,020 In this access list we're seeing an accidental statement and this access list is saying and access this 38 00:04:25,410 --> 00:04:40,450 didn't number access as one per minute wandered in some way to that 16 0 0 with that wild card massacre 39 00:04:40,480 --> 00:04:46,120 of 0 0 255 255. 40 00:04:46,300 --> 00:05:00,360 So what that means here is the network the and the here is the answer here is the wildcard mask what 41 00:05:00,360 --> 00:05:12,400 that so you is if we're using zero that means we need to focus to relate to pets. 42 00:05:12,410 --> 00:05:13,190 All right. 43 00:05:13,430 --> 00:05:24,670 As you can see in here I have a zero and I need to focus to one hundred and seventy two in here. 44 00:05:24,860 --> 00:05:36,720 We're another zero and we need to focus to 16 on the last two bits we have just once for the 2:55 as 45 00:05:36,780 --> 00:05:40,680 you can see in the binary version. 46 00:05:41,160 --> 00:05:44,500 And that means we need to ignore that bit. 47 00:05:44,510 --> 00:05:55,270 So this wildcard mask means for cursor everything starting with the 100 and so and if for seven to that 48 00:05:55,280 --> 00:05:56,220 16 49 00:06:00,650 --> 00:06:10,280 and so that means we are permitting everything starting with they wandered 70 to that 16 for example 50 00:06:10,300 --> 00:06:11,230 winers. 51 00:06:11,350 --> 00:06:24,220 So into that 16 1.5 maybe Whatever were you want let's go with the World Cup mask example too. 52 00:06:24,380 --> 00:06:39,140 And we have another configuration access list 50 per minute this time 192 100 and 68 8.00 outcome mask 53 00:06:39,140 --> 00:06:48,340 of 0 0 0 255 which means a zero. 54 00:06:48,860 --> 00:06:51,190 And here is the wildcard mask 55 00:06:53,970 --> 00:07:04,200 which means we need to focus the first three portions and we don't care the last portion because we 56 00:07:04,200 --> 00:07:07,160 have continuous ones in a year. 57 00:07:07,290 --> 00:07:16,830 That means this access list permits everything starting with the ones that 90 to 100 and sixty eight 58 00:07:16,910 --> 00:07:18,500 that's a lot. 59 00:07:18,510 --> 00:07:22,600 For example oh that's strong strong. 60 00:07:22,770 --> 00:07:27,040 That would be something like that. 61 00:07:27,070 --> 00:07:29,560 And we can give an example like 62 00:07:32,170 --> 00:07:36,570 63 5:06 to other Durnford for AM. 64 00:07:36,740 --> 00:07:48,220 That's an arbitrarily OK let's go with the standard IPV for access lists standard access lists perform 65 00:07:48,350 --> 00:07:56,900 packet filtering based on sound source sudras and must be implemented to other which is the closest 66 00:07:56,900 --> 00:08:08,080 to the destination address for official see numbers where it wants 99 and 1000 and 300 and one thousand 67 00:08:08,800 --> 00:08:10,780 nine hundred ninety nine. 68 00:08:10,880 --> 00:08:20,120 These range are used for standard access this configuration and this access lists are applied to interfaces 69 00:08:20,170 --> 00:08:22,710 by IPX this group command. 70 00:08:22,730 --> 00:08:30,380 As you can see in here there is an standard access this configuration we're getting into the conflict 71 00:08:30,380 --> 00:08:39,950 mode first then we are typing access lists and the number of access list and the permit or deny and 72 00:08:39,950 --> 00:08:42,090 The relate to network. 73 00:08:42,740 --> 00:08:53,430 Then we are getting into the interface mode and via implementing this access list. 74 00:08:53,600 --> 00:09:03,980 Two are related interface which means for example we Heraldo in here we are faster than 0 0 and Fester's 75 00:09:03,980 --> 00:09:13,430 0 1 and we are implementing this IP access group to inbound. 76 00:09:13,450 --> 00:09:17,450 This would be fifth the to inbound. 77 00:09:17,470 --> 00:09:26,470 Which means really we are implementing to this we are implementing this access this to this direction. 78 00:09:29,780 --> 00:09:41,300 Let's go hat in this example we have another standard access list access list for in the first month 79 00:09:41,330 --> 00:09:48,110 we are denying the Sen. 41 zeros Zeeuw. 80 00:09:48,250 --> 00:09:50,250 I'm sorry 20 0. 81 00:09:52,080 --> 00:09:58,930 That means everything beginning with this 10:41 20 and something like that. 82 00:09:59,090 --> 00:10:11,540 If the second statement we're poor meaning the host then 12:56 to any that 5 in here R.K. access list 83 00:10:11,540 --> 00:10:13,100 rules are implemented. 84 00:10:13,230 --> 00:10:21,920 The international security issue as you as I told you in the first statement we're also denying discipled 85 00:10:21,920 --> 00:10:23,300 this as you can see. 86 00:10:23,510 --> 00:10:32,590 So the traffic will be blocked even if we type discipled this with a permit statement in here as is 87 00:10:32,690 --> 00:10:37,770 consider the New Year there there's a conflict between two rules in this example. 88 00:10:38,240 --> 00:10:44,690 Let's take a look at another configuration example on a topology now on rather one. 89 00:10:44,690 --> 00:10:53,730 We are defining an access list standard access list and we are denying the host to that 5. 90 00:10:54,210 --> 00:10:54,850 OK. 91 00:10:54,890 --> 00:10:57,280 This guy will be denied. 92 00:10:57,980 --> 00:11:01,980 And we're permuting any other traffic. 93 00:11:02,020 --> 00:11:15,670 Ok then we are getting into the interface mode interface gig 0 0 which is here and we are implementing 94 00:11:15,700 --> 00:11:19,570 the access list to inbound. 95 00:11:19,760 --> 00:11:23,030 That means in that in this direction. 96 00:11:23,030 --> 00:11:28,080 So PC to will be denied. 97 00:11:28,080 --> 00:11:37,190 For example what if it wants to communicate with the PC Wan to that the standard access list configuration 98 00:11:37,190 --> 00:11:45,910 for example as you know access list one denying the host 2.6 for this example which is the right thing 99 00:11:46,550 --> 00:11:50,210 then the access list one is Poorman thing. 100 00:11:50,350 --> 00:11:54,640 Any we are permitting any other things. 101 00:11:54,810 --> 00:12:04,040 So if you want to added this configuration we are typing the show Oxus list command and we are seeing 102 00:12:04,040 --> 00:12:13,000 the sequence number in here as you can see skirt's number 10 is denying this holes and sequence number 103 00:12:13,030 --> 00:12:15,990 20 is permitting anything else. 104 00:12:16,340 --> 00:12:18,880 So if you want to edit it we are typing. 105 00:12:18,890 --> 00:12:30,410 I pay taxes and standard one then note 10 which means we are letting this through. 106 00:12:30,840 --> 00:12:39,110 And we are typing in denying holes down 41 to that five maybe. 107 00:12:39,110 --> 00:12:40,000 All right. 108 00:12:40,170 --> 00:12:47,620 This is how that is to provide the access list to where the standard Access is configuration. 109 00:12:47,670 --> 00:12:56,190 We can use the show access lists command and we can also use the Sharpy interface and the related interface 110 00:12:56,190 --> 00:12:56,800 command. 111 00:12:56,940 --> 00:13:05,500 And we can see that if there is an embargoed or outbound access was applied to that interface. 112 00:13:06,540 --> 00:13:14,610 Let's go ahead with the extended IP for access lists extended access list performs packet filtering 113 00:13:14,610 --> 00:13:22,650 based on Sarsour address destination address protocols and the port numbers Itzig. 114 00:13:22,710 --> 00:13:29,970 It's good that the extent of the ACLU are implemented rather which is closest to source address for 115 00:13:30,020 --> 00:13:39,360 f and c and here's the range that we can use for the extended access lists extends access lists are 116 00:13:39,530 --> 00:13:41,120 Pletcher interfaces. 117 00:13:41,130 --> 00:13:50,510 BI I picked this group name number in and out statements as well as in the standard access list and 118 00:13:50,500 --> 00:14:00,810 there is the configuration example access lists this time 100 which is in this range as you can see 119 00:14:01,490 --> 00:14:19,940 is the name the TZP traffic which is coming from this sarce and going to this destination for the ports 120 00:14:20,180 --> 00:14:26,890 it Khune to 23 which is the telnet part. 121 00:14:26,930 --> 00:14:38,450 I can also read this statement in here Access is 190 TCAP same thing same thing say it coolant too I 122 00:14:38,450 --> 00:14:43,470 can write the porticos names start protocols names as well directly. 123 00:14:43,610 --> 00:14:46,400 For example telnet for example. 124 00:14:46,670 --> 00:14:55,040 Then the same thing as the standard Access is that I'm getting into the interface mode and am typing 125 00:14:55,040 --> 00:15:05,980 the IP access group number of days sale and inbound or outbound as the direction and here is the same 126 00:15:06,010 --> 00:15:17,130 text as we can see the access list and access number permit or deny the protocols named sources rest 127 00:15:17,170 --> 00:15:24,080 and the wild card of the source then the port operator and source port. 128 00:15:24,160 --> 00:15:32,030 And the answer is destination and destination wild card pool operator and the destination port. 129 00:15:32,030 --> 00:15:43,180 Again you get to it better by this example in here as you can see here with an access list configuration 130 00:15:43,180 --> 00:15:54,850 which is an excellent one in the first stateman access is 100 is permitting the TCAP traffic coming 131 00:15:54,850 --> 00:15:56,060 from 132 00:15:59,300 --> 00:16:10,640 this number by díaz wild card which means everything beginning with these three portions. 133 00:16:10,640 --> 00:16:14,370 And via the net we are permitting this through a big way. 134 00:16:14,410 --> 00:16:21,440 It's going through this horse directly. 135 00:16:21,590 --> 00:16:32,270 I can also use in your sound San Juan one of four with a wildcard mask of 0 0 instead of here. 136 00:16:32,450 --> 00:16:35,620 But I can also use force for simplicity. 137 00:16:35,610 --> 00:16:46,580 HOST The host keyword and the host IP address with an equivalent of W W W port. 138 00:16:46,810 --> 00:16:47,720 OK. 139 00:16:47,870 --> 00:16:57,890 That means actually permit TCAP traffic from this guy from this network to port 80 which is the HTP 140 00:16:57,890 --> 00:17:06,530 port on the host 10 1 1 and 2 or 4 OK. 141 00:17:06,730 --> 00:17:08,770 Let's go ahead with the second. 142 00:17:10,470 --> 00:17:13,420 Is 100 per minute. 143 00:17:13,470 --> 00:17:26,010 IP this guy is permuting the traffic from this network while it's going through this network. 144 00:17:26,290 --> 00:17:27,520 OK. 145 00:17:27,580 --> 00:17:36,950 Permit the traffic for on this network slushed 24 to that network slashed two and four. 146 00:17:37,030 --> 00:17:48,370 OK let's go ahead with this third denied teensy piece ok from the 147 00:17:51,260 --> 00:18:02,610 host this time again as you can see that any year I'm using the one that my 268 that won that one with 148 00:18:02,610 --> 00:18:16,000 the 0 0 0 0 wildcard mask which means actually this IP address I'm focusing all of these bets and the 149 00:18:16,010 --> 00:18:29,670 destination will be what 10 on one to another of to four a cool and to £23 which is town and Port. 150 00:18:29,770 --> 00:18:30,380 OK. 151 00:18:30,550 --> 00:18:37,980 And denying the terminal traffic sourced by this destination is here. 152 00:18:39,210 --> 00:18:43,090 OK let's go with the fourth one in the fourth step. 153 00:18:43,090 --> 00:18:48,430 We're using another D-Nice statement from the this. 154 00:18:48,570 --> 00:18:59,800 Horst to this first there is a missing statement and there may be in here there is a 0 0 0 0 as well 155 00:19:01,060 --> 00:19:05,570 within a cube of to 80 which means air support. 156 00:19:05,590 --> 00:19:12,670 And in the last statement we are seeing and access at least 100 per minute. 157 00:19:12,750 --> 00:19:24,140 IP any any and this any key word means if you want to match all sources or all destinations subs to 158 00:19:24,230 --> 00:19:33,130 the entire source or destination elements of command with keywords any Let's go with another configuration 159 00:19:33,130 --> 00:19:34,570 example. 160 00:19:34,570 --> 00:19:45,280 Create an access list that will per math this subnet for TCAP sessions OK. 161 00:19:45,590 --> 00:19:55,920 Create an access list that will deny telnet sessions to actually these costs for this host. 162 00:19:56,030 --> 00:20:08,970 Create an access list that will permit any IP traffic R.K. access this while wandering one will permit 163 00:20:11,530 --> 00:20:13,620 to TCAP sessions 164 00:20:17,030 --> 00:20:22,610 from this network. 165 00:20:22,610 --> 00:20:23,920 From this subnetwork 166 00:20:27,000 --> 00:20:28,830 to any destination. 167 00:20:29,350 --> 00:20:36,380 OK as you can see here the wildcard mask is 0 0 0 15. 168 00:20:36,550 --> 00:20:45,120 This time for slushed 28 OK Slish 20. 169 00:20:45,160 --> 00:21:07,980 It means 255 2:55 255 and 240 to convert this guy to a wildcard mask we can use 0 0 0 and 55. 170 00:21:08,120 --> 00:21:09,140 OK. 171 00:21:09,660 --> 00:21:20,310 So if we add all these guys to each other the end result will be to worth to you for 255 and 250 five. 172 00:21:20,400 --> 00:21:21,320 OK. 173 00:21:21,540 --> 00:21:32,550 In the second we are writing it denies access is one on one denying TZP from any source. 174 00:21:33,910 --> 00:21:47,040 To the destination was this guy with equal and Port of 23 which means tell that and in the third statement 175 00:21:47,110 --> 00:21:55,690 we are creating an access that will permit any IP address Trevitt which is access this 100 on one permit 176 00:21:56,020 --> 00:22:00,980 IP any Annie. 177 00:22:01,000 --> 00:22:05,350 Here is another configuration example for you. 178 00:22:05,490 --> 00:22:15,330 Arcade's saying as a block just tell that traffic coming from PC one and going to PC to OK this guy 179 00:22:16,970 --> 00:22:19,270 will be our source. 180 00:22:20,560 --> 00:22:30,420 And here will be our destination or other one I'm running an external access list. 181 00:22:30,710 --> 00:22:44,570 Oxus is one or one denied TZP host from PC Wan to PC to with the equivalent of telnet. 182 00:22:45,030 --> 00:22:53,670 And as I told you in our first slide we should have at least one spermine statement for each access 183 00:22:53,670 --> 00:23:02,460 list and I'm writing the access this 100 percent IP any any which is permitting any other traffic from 184 00:23:03,670 --> 00:23:05,430 different from the sky. 185 00:23:05,500 --> 00:23:09,460 And we're also implementing these IP addresses. 186 00:23:09,520 --> 00:23:15,850 I'm sorry this access to the E-Man direction of the first Internet 0 1 187 00:23:18,590 --> 00:23:21,110 25 extended access configuration. 188 00:23:21,110 --> 00:23:29,320 We can use the sure access list command as you can see and we can display them and we can also use your 189 00:23:29,320 --> 00:23:34,350 IP interface and the related interface name as well. 190 00:23:35,930 --> 00:23:39,640 Let's go with the IP version 6 to 8 sales. 191 00:23:39,710 --> 00:23:41,730 We can't just use name. 192 00:23:41,750 --> 00:23:51,050 The ACL for the IP version 6 that works and we have the similar logic with IP version for extended ACL 193 00:23:51,650 --> 00:24:00,680 but any year we don't have any wildcard mask and we are using the IP version 6 traffic filter command 194 00:24:01,040 --> 00:24:04,200 to apply to access list to do later. 195 00:24:04,200 --> 00:24:12,770 The interface is the configuration example and we are type in first I perversions 6 axis lists for this 196 00:24:12,770 --> 00:24:23,360 time and the name of Texas is we have just named a scale for IP version 6 and we are denying more a 197 00:24:23,360 --> 00:24:29,270 host with an IP address of this and with an IP address of this. 198 00:24:29,270 --> 00:24:34,930 And this guy will be our source with the destination of this IP address. 199 00:24:34,940 --> 00:24:44,840 And we are permitting any other traffic and to implement this as safely to our interface. 200 00:24:44,840 --> 00:24:49,320 We are using IP version 6 traffic filter command. 201 00:24:49,370 --> 00:24:55,340 Instead of using IP access group command in RPV for a sales. 21287

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.