
Configure and Modify Standard IPv4 ACLs

Configure and Modify Standard IPv4 ACLs – Cisco Packet Tracer Lab
This lab demonstrates my ability to plan, configure, verify, and modify standard numbered and named IPv4 access control lists (ACLs) in a simulated enterprise network. Using best practices, I applied ACLs to control traffic between LAN segments and across routers while adapting to evolving business requirements.
Objectives
-
Verify baseline connectivity between devices before applying ACLs
-
Configure both numbered and named standard ACLs
-
Apply ACLs to the correct interfaces and directions
-
Use wildcard masks to define matching criteria
-
Modify an existing ACL to reflect a policy change
-
Test and verify access control results
Network Overview
The network contains three routers (R1, R3, and Edge), four switches (S1–S4), and multiple PCs, simulating a small enterprise layout. All routers are pre-configured with IP addresses and routing using EIGRP. ACLs are applied only to R1 and R3 as part of the internal policy enforcement; the ISP-owned Edge router is not modifiable.
Part 1: Baseline Connectivity
Before applying any ACLs, I verified full connectivity across all devices using ping tests.
-
PC-A was able to ping both PC-C and PC-D
-
R1 successfully pinged PC-C and PC-D
-
PC-C was able to ping PC-A and PC-B
-
R3 successfully pinged PC-A and PC-B
-
All PCs were able to reach the external server at
209.165.200.254
This ensured the network was functioning correctly before applying traffic filtering.
Part 2: Configure and Verify Standard Numbered and Named ACLs
Step 1: Numbered Standard ACL on R3
Policy: Allow only traffic from 192.168.10.0/24
and 192.168.20.0/24
to access the 192.168.30.0/24
network. Deny all others.
Configuration:
Applied to:
-
R3
interfaceg0/0/0
(facing the192.168.30.0
LAN) -
Direction:
out
Verification:
Results:
-
Ping from PC-A and PC-B to PC-C succeeded
-
Ping from PC-D to PC-C was denied (as expected)
-
Ping from R1 to PC-C also failed, proving ACL effectiveness
Step 2: Named Standard ACL on R1
Policy:
-
Permit PC-C (
192.168.30.3
) to access the192.168.10.0/24
network -
Permit the entire
192.168.40.0/24
network to access the same -
All other access should be denied (added later)
Configuration:
Applied to:
-
R1
interfaceg0/0/0
(LAN interface toward192.168.10.0/24
) -
Direction:
out
Verification:
Test Results:
-
PC-C was able to ping PC-A (allowed by ACL)
-
Extended ping from R3 using
192.168.30.1
as source to PC-A failed (denied as intended) -
PC-D successfully pinged PC-A (allowed by the second rule)
Part 3: Modify a Standard Named ACL
New Requirement: Allow return traffic from the 209.165.200.224/27
network to access 192.168.10.0/24
. An explicit deny any
must also be added to follow consistent policy.
Modification Using Line Numbers:
Verification:
Results:
-
PC-A was now able to successfully ping the external server at
209.165.200.254
-
ACL match counters confirmed the correct lines were triggered
Final ACL: BRANCH-OFFICE-POLICY
No reapplication of the ACL was needed, as modifications took effect in-place.
Reflection
Why Use Extended ACLs?
Standard ACLs only filter based on source IP. Extended ACLs allow filtering based on source and destination IPs, protocols, and port numbers. They are useful when you need precise control over specific services like HTTP, FTP, or ICMP.
Why Use Named ACLs Over Numbered ACLs?
Named ACLs are easier to manage and update. They support line numbers and remarks, allowing clearer documentation and easier modification. This is especially valuable in large or frequently changing networks.
Skills Demonstrated
-
Creation of both numbered and named standard IPv4 ACLs
-
Use of wildcard masks to define source networks
-
Proper ACL interface placement and direction
-
Modification of ACLs in-place using line numbers
-
Verification using
show access-lists
andshow ip interface