Cisco ICND2 – Configure and apply access control lists based on network filtering requirements

I have created two access lists, one extended and one standard. The first is an extended access to stop PC1 ( from FTPing to the FTP server

On Router1 – the access-list has been placed on Fa0/0 as its the closest to the source.

configure terminal
access-list 101 deny tcp any eq ftp host
access-list 101 permit ip any any
interface fa0/0
ip access-group 101 in

When creating an access-list, if a match isn’t found then there is an explicit deny. As can see from above I have created a permit for any IP traffic  Without these lines, OSPF wasn’t being advertised and I had no way of testing PC1 could ping the FTP server to verify connectivity and to ensure that FTP was indeed being blocked and not all traffic.

The next access list is an standard access list, the point of this one is to deny host from communicating with the network. However, host can ping the network.

On Router0 I have placed the access list on the Fa0/0 as this is the closest to the destination.

configure terminal
access-list 1 deny host
access-list 1 permit any
interface fa0/0
ip access-group 1 out

Cisco ICND2 – Describe the purpose and types of access control lists

Describe the purpose and types of access control lists – Access lists are used to restrict or allow access to traffic via an interface. You may want to allow redirect port 25 (SMTP) to your Exchange server and allow traffic to flow in and out of the port. This is possible with access lists.

There are two types of access lists standard and extended.


Standard access lists filter based on source IP address. Telnet, Web, SMTP etc cannot be filtered by a standard access list. Standard access-lists can be created between 1-99 and 1300-1999. An example:

configure terminal
access-list 1 permit


Extended access list can filter by source, destination and port. Extended access lists can be created byween 100-199 and 2000-2699.

configure terminal
access-list 100 permit tcp any eq 25 host

Both standard and extended access lists can be placed either inbound or outbound on an interface allowing for greater control on what packets can be sent/received.

configure terminal
interface s0/0
ip access-group 100 in
ip access-group 100 out

Cisco ICND2 – Implement basic router security

Basic router security includes but not limited to:

    • Configuring an enable secret
configure terminal
enable secret 'password'
      • Secure passwords
configure terminal
service password-encryption
    • Displaying a motd
configure terminal
banner #motd#
banner #login#
    • Locking down the console port
configure terminal
line console 0
password 'password'
    • Configuring terminal lines for remote access
configure terminal
line vty 0 4
password 'password'
transport input telnet ssh (remove telnet for ssh only)

Cisco ICND2 – Verify configuration and connectivity using ping, traceroute, and telnet or SSH

Listed below is a quick list of tools that can be used to troubleshoot connectivity issue.


Ping can be used to verify connectivity between end devices. Note – A device such as a firewall may block the ICMP packet.


Shows routing paths from source to destination on a PC.


Telnet can be used to connect to a router/switch although data is sent in plain text


Same as Telnet, but data is encrypted.

Ipconfig /all

Display IP information that can be verified against network documentation. IP/Subnet mask/Default gateway information can be seen. DNS/WINS is also provided.

arp -a

Shows the MAC address table from a PC.

show ip arp

Shows the MAC address table from a router/switch.