SlideShare une entreprise Scribd logo
1  sur  6
2
TEAM MEMBERS NAMES:
 P.VENKATASAI
 S.AMIT KUMAR
 BOITINI YAO HUBERT
 CHRISTIAN HERMANN
PROJECT DESCRIPTION:
 ACLs are one of the main features of today’s
internetwork router. which are defined by the
network administrator.
 In this project we configure a standard and
Extended ACLs in a private network to
provide security for the network of the
organization by providing traffic flow control.
3
 What is ACL ?
 Acl is a set of rules which will allow or deny specific traffic moving through the router.
 It is also called as a packet filtering firewall
 HOW MANY TYPES OF ACLS?
There are two main different types of Access-list namely:
Standard Access-list – These are the Access-list which are made using the source IP address only. These ACLs permit or deny the entire
protocol suite. ...
Extended Access-list – These are the ACL which uses both source and destination IP address.
 IDENTIFICATION
We have two categories:
 Numbered
 Named
 ACLs can be configured to apply to inbound traffic and outbound traffic:
 Inbound ACLs – Incoming packets are processed before they are routed to the outbound interface.
 Outbound ACLs – Incoming packets are routed to the outbound interface, and then they are processed through the outbound ACL.
 What is implicit deny in ACL?
The router tests packets against the conditions in the ACL one at a time. ... If no conditions match, the router rejects the packet because of
an implicit deny also called as hidden rule
 Why use ACLs
 Limits network traffic to increase network performance.
 Controls which type of traffic are forwarded or blocked by the router.
 Ability to control which areas a client access.
 ACLs provide security for network access and can block a host or a network
 It is also used to protect the network from denial of service (DOS)attacks..etc
Project life cycle
 Create topology
 Configure the router
 Standard ACL
 Extended ACL
 Testing the topology
 troubleshoot
 Implement on real
devices
4
Acl project
scenario by
using cisco
packet
tracer
5
employee
manager
employee
HR
EMPLOYEE
MANAGERIn this topology we used
standard and extended
ACLs.
Employees can not get
Access to the manager
And HR
The managers have access
Only to the employees
Network
The HR has full access
on employees and
Managers
6

Contenu connexe

Plus de Technical Hub

Layer wise network security
Layer wise network securityLayer wise network security
Layer wise network securityTechnical Hub
 
Result management system
Result management systemResult management system
Result management systemTechnical Hub
 
Passive footprinting
Passive footprintingPassive footprinting
Passive footprintingTechnical Hub
 
Automatic generation of 50 addresses
Automatic generation of 50 addressesAutomatic generation of 50 addresses
Automatic generation of 50 addressesTechnical Hub
 
Technical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub
 

Plus de Technical Hub (8)

Layer wise network security
Layer wise network securityLayer wise network security
Layer wise network security
 
Resume builder
Resume builderResume builder
Resume builder
 
Result management system
Result management systemResult management system
Result management system
 
Passive footprinting
Passive footprintingPassive footprinting
Passive footprinting
 
Co cubes analysis
Co cubes analysisCo cubes analysis
Co cubes analysis
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Automatic generation of 50 addresses
Automatic generation of 50 addressesAutomatic generation of 50 addresses
Automatic generation of 50 addresses
 
Technical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational InstitutionsTechnical Hub @ Aditya Educational Institutions
Technical Hub @ Aditya Educational Institutions
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Controlled access to network using access control lists(acl)

  • 1.
  • 2. 2 TEAM MEMBERS NAMES:  P.VENKATASAI  S.AMIT KUMAR  BOITINI YAO HUBERT  CHRISTIAN HERMANN PROJECT DESCRIPTION:  ACLs are one of the main features of today’s internetwork router. which are defined by the network administrator.  In this project we configure a standard and Extended ACLs in a private network to provide security for the network of the organization by providing traffic flow control.
  • 3. 3  What is ACL ?  Acl is a set of rules which will allow or deny specific traffic moving through the router.  It is also called as a packet filtering firewall  HOW MANY TYPES OF ACLS? There are two main different types of Access-list namely: Standard Access-list – These are the Access-list which are made using the source IP address only. These ACLs permit or deny the entire protocol suite. ... Extended Access-list – These are the ACL which uses both source and destination IP address.  IDENTIFICATION We have two categories:  Numbered  Named  ACLs can be configured to apply to inbound traffic and outbound traffic:  Inbound ACLs – Incoming packets are processed before they are routed to the outbound interface.  Outbound ACLs – Incoming packets are routed to the outbound interface, and then they are processed through the outbound ACL.  What is implicit deny in ACL? The router tests packets against the conditions in the ACL one at a time. ... If no conditions match, the router rejects the packet because of an implicit deny also called as hidden rule  Why use ACLs  Limits network traffic to increase network performance.  Controls which type of traffic are forwarded or blocked by the router.  Ability to control which areas a client access.  ACLs provide security for network access and can block a host or a network  It is also used to protect the network from denial of service (DOS)attacks..etc
  • 4. Project life cycle  Create topology  Configure the router  Standard ACL  Extended ACL  Testing the topology  troubleshoot  Implement on real devices 4
  • 5. Acl project scenario by using cisco packet tracer 5 employee manager employee HR EMPLOYEE MANAGERIn this topology we used standard and extended ACLs. Employees can not get Access to the manager And HR The managers have access Only to the employees Network The HR has full access on employees and Managers
  • 6. 6