ACL Standard Cisco adalah sebuah daftar akses kontrol yang digunakan untuk menyaring lalu lintas jaringan berdasarkan Source IP Address.
Router(config)# access-list [ACL_NUMBER] [permit | deny] [SOURCE_IP] [WILDCARD_MASK]
Contoh:
Router(config)# access-list 10 permit 192.168.1.100 0.0.0.0
Router(config)# ip access-list standard [ACL_NAME] Router(config-std-nacl)# permit [source] [wildcard-mask] Router(config-std-nacl)# deny [source] [wildcard-mask]
contoh:
Router(config)# ip access-list standard BLOCK_LAN1 Router(config-std-nacl)# deny 192.168.1.0 0.0.0.255 Router(config-std-nacl)# permit any Router(config-std-nacl)# exit
Router(config)# interface <nama_interface> Router(config-if)# access-list <nomor_acl>/<named_acl> in/out
Contoh:
Router(config)# interface FastEthernet0/0 Router(config-if)# access-list 10 in
Router(config)# interface GigabitEthernet 0/0 Router(config-if)# ip access-group BLOCK_LAN1 in
Router# show access-lists
Tujuan:
Standar ACL umumnya - jika tidak selalu - ditempatkan paling dekat dengan tujuan. Sedangkan Extended ACL ditempatkan paling dekat dengan sumber.
R2(config)#access-list 10 deny 192.168.1.0 0.0.0.255 R2(config)#access-list 10 permit any
R2(config)#interface f0/1 R2(config-if)#ip access-group 10 out R2(config-if)#exit
R2(config)#access-list 20 deny 192.168.2.0 0.0.0.255 R2(config)#access-list 20 permit any
R2(config)#interface fa0/0 R2(config-if)#ip access-group 20 out R2(config-if)#exit
* Tets ping LAN1 ke Server A & B
PC-A1> show ip NAME : PC-A1[1] IP/MASK : 192.168.1.2/24 GATEWAY : 192.168.1.1 DNS : MAC : 00:50:79:66:68:2c LPORT : 20000 RHOST:PORT : 127.0.0.1:30000 MTU : 1500 PC-A1> ping 10.0.1.2 84 bytes from 10.0.1.2 icmp_seq=1 ttl=62 time=95.125 ms 84 bytes from 10.0.1.2 icmp_seq=2 ttl=62 time=65.038 ms 84 bytes from 10.0.1.2 icmp_seq=3 ttl=62 time=60.712 ms 84 bytes from 10.0.1.2 icmp_seq=4 ttl=62 time=63.358 ms 84 bytes from 10.0.1.2 icmp_seq=5 ttl=62 time=50.142 ms PC-A1> ping 10.0.2.2 *172.16.1.2 icmp_seq=1 ttl=254 time=45.899 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=2 ttl=254 time=32.774 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=3 ttl=254 time=45.168 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=4 ttl=254 time=34.268 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=5 ttl=254 time=42.260 ms (ICMP type:3, code:13, Communication administratively prohibited)
* Tets ping LAN2 ke Server A & B
PC-B1> show ip NAME : PC-B1[1] IP/MASK : 192.168.2.2/24 GATEWAY : 192.168.2.1 DNS : DHCP SERVER : 192.168.2.1 DHCP LEASE : 67259, 86400/43200/75600 MAC : 00:50:79:66:68:2d LPORT : 20000 RHOST:PORT : 127.0.0.1:30000 MTU : 1500 PC-B1> ping 10.0.1.2 *172.16.1.2 icmp_seq=1 ttl=254 time=46.086 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=2 ttl=254 time=47.608 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=3 ttl=254 time=47.629 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=4 ttl=254 time=46.073 ms (ICMP type:3, code:13, Communication administratively prohibited) *172.16.1.2 icmp_seq=5 ttl=254 time=46.126 ms (ICMP type:3, code:13, Communication administratively prohibited) PC-B1> ping 10.0.2.2 84 bytes from 10.0.2.2 icmp_seq=1 ttl=62 time=83.063 ms 84 bytes from 10.0.2.2 icmp_seq=2 ttl=62 time=67.256 ms 84 bytes from 10.0.2.2 icmp_seq=3 ttl=62 time=61.611 ms 84 bytes from 10.0.2.2 icmp_seq=4 ttl=62 time=61.236 ms 84 bytes from 10.0.2.2 icmp_seq=5 ttl=62 time=62.238 ms