Compare cert salaries and plan your next career move
descender421 wrote: » I may be going crazy as I keep looking at this example in the Cisco Press ICND2 book and don't understand the reasoning. Basically for standard access lists, you want to put it as close as you can to the destination address right? For this example (if I could put it into words or get the diagram on here, I would), it appears he is using the router closest to the source IP address for both the access lists. This, in turn, makes it so that an IP address can't even get outside it's own network. This will probably only make sense to owners of the book, but if you anyone can enlighten me I would very much appreciate it. Thanks!
R1(config)#access-list 1 deny 10.0.1.1 0.0.0.0 R1(config)#access-list 1 permit any R1(config)#interface s0/0/0 R1(config-if)#ip access-group 1 out
descender421 wrote: » In his example, he is making the access list applicable to the closest router instead of the one closest to the destination. Or am I still way off here? Thanks for the example by the way.
hiddenknight821 wrote: » It should be the latter. You apply the ACL rule closest to the destination. How would you know which router is closer to you if you are not standing near any of them? It has nothing to do with whether you are physically close to the router or not. Remember, packets operate on layer 3. Thus they use IP addresses. So, you should only be concern with source/destination IP address when making ACL rules. I should also include sockets for extended ACL.
descender421 wrote: » Sorry, by closer I should have said default gateway. So would this still be correct? I'm looking for an entry on the errata but there isn't one, so I'm guessing he's correct. But still doesn't make much sense.
descender421 wrote: » I understand the reasoning with what you're saying and agree with it. I also have read through the chapter 2 times. However, in the example from the book, Odom is saying something else. Basically, if he were using your diagram there, he would claim the best place to put the standard access list would be on R3's Fa0/0 subnet and to leave it as outbound. With this, it would make it to where that host in that subnet couldn't even communicate with anyone outside of its own subnet. Which yes, it is successful in completing the objective, but to me that goes overboard. I wish I could scan the example so I could put it on here so then it might help out more. Thanks for helping out btw.
interface serial 0 ip access-group 3 out ! interface serial 1 ip access-group 3 out ! interface ethernet 0 ip access-group 4 out ! access-list 3 remark meets criteria 1 access-list 3 deny host 10.1.2.1 access-list 3 permit any ! access-list 4 remark meets criteria 2 access-list 4 deny 10.1.3.0 0.0.0.255 access-list 4 permit any
hiddenknight821 wrote: » After reviewing the example from the book again, I believe I finally understand where you got caught off guard. You were wondering why Odom's didn't follow his own "golden" implementation rule. Well, I can tell you the configuration he implemented would work, but he didn't follow his rule exactly as he would probably expect us to implement the access-list 3 ACL rule on Albuquerque's E0 interface using the ip access-group 3 out command. No need to implement this on the other interfaces. Damn this sneaky bastard. You ought to send him an email and ask him why he dishonored his own rule. Most of us believe that most people would stand by their own principles.
pham0329 wrote: » It's probably an error. If Seville loses it's link to Albuquerque, the routing protocol would reconverge and it would use its s1 interface to reach Albuquerque. With his implementation, this wouldn't be possible because his ACL would block everything. The same applies to Yosemite if it loses its connection to Seville
hiddenknight821 wrote: » To be honest with you, I don't see how it's an error. Did you read the pages on this? To me it makes perfect sense. What I said was not exactly an indication of error. It's merely something the author overlooked. His configuration would work for sure 100%, but my suggestion would work just as good, which is what he "meant to use" in the first place.
pham0329 wrote: » I'm not really sure what you're trying to say. If your configuration is what he really "meant" to use, how is it not an error on his part? I didn't mean error as in he made a syntax error, I meant his configurations are wrong. Even though his config would work, the application of it is wrong. I didn't really reread the section on standard ACL, I just read the example and its requirements. The three requirements wereSam is not allowed access to Bugs or Daffy Hosts on Seville Ethernet are not allowed access to hosts on the Yosemite Ethernet All other combinations are allowed The third objective is to allow any other combination, which is kind of dumb because even if you allow Sam to access Elmer, if Elmer is blocked from replying, you're essential blocking the communication between those two. But anyhow, any other combinations are allowed and if the WAN link between Yosemite and Seville goes down, Yosemite would have to use Albuquerque to get to Seville, and that's not possible with the ACL he configured. If Seville loses its WAN to Albuquerque, it needs to use Yosemite to get to Albuquerque, and that's also not possible with his configuration. The objective of those requirements are to block access to the LAN connected to the routers, not to the routers themselves.
wave wrote: » The part of this question (page 252) that caught me out was the rule that "Hosts on the Seville Ethernet are not allowed access to hosts on the Yosemite Ethernet" The rule was access-list 110 deny ip 10.1.2.0 0.0.0.255 10.1.3.0 0.0.0.255 Which is applied to the E0 on Yosemite....It seemed kind of strange but then replicated it with my lab and the rule worked just as Odom said it would. Standard ACL - placed close to the destination Extended ACL - placed close to the source
wave wrote: » The part of this question (page 252) that caught me out was the rule that "Hosts on the Seville Ethernet are not allowed access to hosts on the Yosemite Ethernet"
Compare salaries for top cybersecurity certifications. Free download for TechExams community.