Extended Access List (ACL) for the Cisco CCNA - Part 2

  Рет қаралды 159,005

danscourses

danscourses

Күн бұрын

Пікірлер: 78
@Mandla20
@Mandla20 11 жыл бұрын
My I just say that I was using a study guide, and found it a challenge to understand the inbound & outbound parts of ACL's, untill I surfed this particular vid. I Started with the standard ACL, then on to this one, simply because you make it so easy to understand & like your presentation style. How very good. Thanx a million. Mandla - South Africa.
@kabirsingh1649
@kabirsingh1649 4 жыл бұрын
i really like that you are mentioning , there is a implicit deny all which is a very important thing to keep in mind while configuring acls
@AnasDrifter
@AnasDrifter 11 жыл бұрын
very useful video. I had a confusion of how to put a permission to a specific host and now its clear. I watched all your ACL videos , it tooks about 1 hour but I get it the most. thank you :)
@xx-qu3sn
@xx-qu3sn 8 жыл бұрын
Dan the man, great tutorials, very thorough and well iterated.
@KSADEBO87
@KSADEBO87 12 жыл бұрын
I am getting both the standard & extended ACLs quickly and that's because of you cheers mate
@arvinbriones4032
@arvinbriones4032 2 жыл бұрын
thanks for your tutorial very clear explanation and I understand easily. because u have a actual presentation. this video are one of masterpieces hahaha.
@Arun_Youtube
@Arun_Youtube 4 жыл бұрын
No doubt ....... THE BEST TEACHER. 👍👍 Clear & perfect.
@ytramyornoc
@ytramyornoc 12 жыл бұрын
Cisco recommends that you disable the ACL on the interface before you change the statements in the list.You have ACL 100 enabled on R1's interface fa0/1 for inbound packets. @ 4:24 you delete list 100 so that all packets are allowed through. When you enter a single access-list 100 command and you press Enter, the list exists. The router filters all packets in-bound on fa0/1 based on the one-line list. Therefore you might temporarily filter packets you don’t want to filter. Just a thought...
@yamenkhalil347
@yamenkhalil347 3 жыл бұрын
Thanks for such clear explanation!. Wish you good health and all the best.
@toomajkarimi1131
@toomajkarimi1131 10 жыл бұрын
Amazing and clear explanation thanks a lot. Please keep doing it.
@alrandjr5345
@alrandjr5345 12 жыл бұрын
Great video.........you are providing a great resource for extending my understanding the Cisco literature.
@somasuntharamkokul8517
@somasuntharamkokul8517 2 жыл бұрын
You're doing a great job man... 😘😘😘
@technoplus1512
@technoplus1512 8 жыл бұрын
Dan, I just want to say thanks a million for your videos. You have been a very big help for me. I am new to Cisco concepts and I got an assignment that was a big headache...but...following your videos helped big time. I do have one issue tho...I cant figure out how to do the vPCs. I am using the catalyst 2960-24TT but I cant seem to get the vPC feature enabled. I would really love to get your help. Tnx again and keep up the good work.
@alburaiky
@alburaiky 6 жыл бұрын
LOVE U Man :'( Whatever I score in this exam is 99% thanks to you!
@xxjustinx34xx
@xxjustinx34xx 2 жыл бұрын
Some of the best videos on ACL's. Really wish I saw this before my exam lol. Thank you for this!
@lapper13
@lapper13 12 жыл бұрын
Thanks for this video, it is very helpful! I've been struggling with ACL's in my preperation for the CCNA cert and this cleared up a few things for me:)
@eeshanpandey2829
@eeshanpandey2829 3 жыл бұрын
Great tutorial! Helped me a lot for an assignment!
@9BallGuru
@9BallGuru 5 жыл бұрын
very clear and easy to understand, thank you very much. subscribed to your channel sir
@DanTheMan-yz8zx
@DanTheMan-yz8zx 4 жыл бұрын
Thanks Dan. This is excellent
@getachewbabulo29
@getachewbabulo29 4 жыл бұрын
thanx it is amasing tutorials
@HarshaSiriwardena
@HarshaSiriwardena 11 жыл бұрын
thank u very much, learnt lot from your video tutorials
@edgblades
@edgblades 7 жыл бұрын
Thank you for letting me understand this!!!
@ferenccziryek3642
@ferenccziryek3642 Жыл бұрын
Hi I would like to ask if I connect a third router to right side swich what will be a second router to the switch , how can I configure it inclusive static routing? thank you frank
@ardianlumi7956
@ardianlumi7956 8 жыл бұрын
Hello, Thank you for the video, i have one question. Can i leave the port number empty? Thank you.
@ulkonja
@ulkonja 8 жыл бұрын
lol shqipe
@ferenccziryek3642
@ferenccziryek3642 11 ай бұрын
if I add a second router let say using port 81 will not work is there any chance to do that ? thank you.
@ahsansyed4146
@ahsansyed4146 8 жыл бұрын
thanku so much sir :) #danscourses you solved my problem
@felixacostazea4710
@felixacostazea4710 5 жыл бұрын
Very useful. THnaks!
@mikropono
@mikropono 6 жыл бұрын
Hello sir. Tnx for the video. May I ask if we can apply more than one access group in an interface? And if we can, how will it treat the individual conditions set in access lists. Many thanks in advance.
@Yazzero77
@Yazzero77 9 жыл бұрын
Dan plz how did u give R0 to 3 interfaces its allows only 2 interfaces, how did you give Eth0/0/0...plz help me
@drobinson92562
@drobinson92562 9 жыл бұрын
I don't know if this was stated, but it would have been better to have the extended access list deny access instead of permit as all traffic is already permitted. Thoughts?
@benjaminburga6017
@benjaminburga6017 10 жыл бұрын
thank you for the video...very useful
@behzadkhayam4956
@behzadkhayam4956 6 жыл бұрын
Thanks a whole lot
@alvinaazam1
@alvinaazam1 11 жыл бұрын
II am working on project, and has to implement extended acl, class map and service policy. I need to make difference between pc and laptop because the PC plays the role of an FTP server and it must be 2 times more bandwidth than the Laptop0. I need to Change the configuration to be able to provide this service through the use of access-list . I am not exactly getting what does it mean.? Thanks in advance
@postplatform
@postplatform 11 жыл бұрын
THX your method is very cool, thx a lot
@kunalsharma8453
@kunalsharma8453 6 жыл бұрын
Much appreciated! Thank you !
@ابوحاسن-ه9س
@ابوحاسن-ه9س 3 жыл бұрын
Thank you for letting
@omobuukola
@omobuukola 11 жыл бұрын
Thank you Dan. Awesome
@melissaazofeifa2041
@melissaazofeifa2041 9 жыл бұрын
Really nice your explanation, everything worked for me! But I have a question... What if I want to give the destination the permission to access all the sources, but I don't want 2 of the sources (for example 192.168.2.100 and 192.168.2.101, as you did) access the destination? Is that possible?
@GurukiranS
@GurukiranS 9 жыл бұрын
+Melissa Azofeifa Since you have not applied any access list commands on your destination router, your destination router will be able to reach you. As simple as that! There is no special permission required.
@melissaazofeifa2041
@melissaazofeifa2041 8 жыл бұрын
+Gurukiran S Thank you!
@jamesmartinez1134
@jamesmartinez1134 12 жыл бұрын
Do you have the packet tracer for this demonstration to download??
@multiverse7778
@multiverse7778 11 жыл бұрын
Nice Video ... Thank you so much..
@luisolias2595
@luisolias2595 11 жыл бұрын
Congratulations!! . I like your videos a lot! . :-)
@yhytuncer
@yhytuncer 10 жыл бұрын
you are the best Dan thank you so much
@ricbondoc1745
@ricbondoc1745 5 жыл бұрын
Whyd we place eq 80 again? I was kinda lost on that part
@naurification
@naurification 6 жыл бұрын
whats the difference between putting "ip access-group 100 out" vs "ip access-group 100 in" on an interface? like what effect does that do?
@davidadams2395
@davidadams2395 6 жыл бұрын
It depends on your goal. In this case, we are placing the ACL closest to the source, which means the inbound port on R1, fa0/1. Outbound on R1's fa0/0 port would work in this case (Extended ACL) because there are granular options, but placing it farther from its source would use more bandwidth and, per function of Extended ACLs, be less logical. Always adhere to design _best practices._
@chuyennbk
@chuyennbk 8 жыл бұрын
thank you very much
@7kruser7
@7kruser7 5 жыл бұрын
saludo profe pasten
@md.tariqulislammanon7823
@md.tariqulislammanon7823 8 жыл бұрын
why it's port 80 ?can anyone explain it.. ? and i doing evrything exactly same but can't access server (192.168.1.254 ) ......????
@Nevz00
@Nevz00 8 жыл бұрын
+Md. Tariqul Islam Menon Port 80 is the port for HTTP. In networking, different ports has different functions :) You can't access the server because you are only allowing access to that particular port on that IP. Not the whole functionality of the server :D
@TuanChuot
@TuanChuot 6 жыл бұрын
search keyword port number list and google will show you why
@slupo14
@slupo14 10 жыл бұрын
Thank you so much :)
@victorinoilucillo3138
@victorinoilucillo3138 6 жыл бұрын
What if I ping 2.100 from 4.100. Is it get block? If yes. Why is it? Only the 1.100 is configured to be denied.
@ismailmohamed7357
@ismailmohamed7357 4 жыл бұрын
As long as you are trying to ping the denied host,the ping will be successful since the traffic is coming the opposite direction to the blocked interface.
@MrShaun8915
@MrShaun8915 12 жыл бұрын
How do you know when to use the command of "tcp, IP, udp"?
@REET911
@REET911 11 жыл бұрын
much appreciated.
@gregenterprises
@gregenterprises 9 жыл бұрын
I had to do a no access-list 1 on R0, in order to get that address to ping. This was set in the Video prior, extended access list, which there was not mention to do this prior to setting up the extended access list in this Video. Please make a note. Thanks...
@rashthunher
@rashthunher 5 жыл бұрын
Thanks sir
@mustaphazero4929
@mustaphazero4929 5 жыл бұрын
thanks man
@alvinaazam1
@alvinaazam1 11 жыл бұрын
whenever i am writing this command as mention in video for my access-list 106 access-list 106 deny any any (% Invalid input detected at '^' marker). why?
@danscourses
@danscourses 11 жыл бұрын
You forgot the protocol. It should be. access-list 106 deny ip any any
@alvinaazam1
@alvinaazam1 11 жыл бұрын
thanks I did. It works now
@AnasDrifter
@AnasDrifter 11 жыл бұрын
you should to put (ip) after deny anyways you can use question mark for help :)
@aaridmohamed3290
@aaridmohamed3290 10 жыл бұрын
if extended list you shoud write IP deny any any no deny any any
@rsambhuvlogs
@rsambhuvlogs 9 жыл бұрын
+alveena azam use this---> ?
@ingiben4889
@ingiben4889 5 жыл бұрын
i am confused :( all this time it is the server granting access to port 80, i thought it was the network on the right doing that
@fatimzahraennaoui3310
@fatimzahraennaoui3310 6 жыл бұрын
thank you
@geekchaser
@geekchaser 9 жыл бұрын
Thank you!
@slims173
@slims173 10 жыл бұрын
Thank you so much for your help, you're the best Sir. Please, I have a question : why can't we ping to the SERVER even we can reach it ? Thank's in advance.
@uzzwaldeb
@uzzwaldeb 11 жыл бұрын
nice
@gregenterprises
@gregenterprises 9 жыл бұрын
The Video is great, however I ran into a problem trying to ping the interface 192.168.1.100. According to the blog it has to do with R0's deny statement. Did I miss something? learningnetwork.cisco.com/thread/79091
@RobFos
@RobFos 7 жыл бұрын
Its kinda fucked up that an entire access list has to be deleted to then set the order properly for the access list. What if this was real world situation, and your access list was huge ? Would you delete your entire access list of the entire company, to then spend most likely days on end to rebuild the access list all over again, just to add things to the list and put it in order.... There has to be a simpler way of doing this and setting proper order instead of having to delete the entire list..... This is what I gathered by this video, which is daunting to find out that you have to delete the entire list in order to create an updated list thats in order.
@predator2483
@predator2483 6 жыл бұрын
Robert Foster in the real world you would save the acl with a text editor, so if any changes need to be made you would edit it in the text editor and copy/paste it in to command line. Also you would use a named acl with remarks.
@eminersin3663
@eminersin3663 10 жыл бұрын
salma akasbi because ping use icmp protocol he only permitted tcp protocol thatswhy we cant ping server its cuz of impilictly deny rule
@abdelhamidelmejdoubi7995
@abdelhamidelmejdoubi7995 9 жыл бұрын
si prmit 192.168.2.100 ,192.168.2.200 via 192.168.1.0 deny any any
@jchamburgueso
@jchamburgueso 11 жыл бұрын
Great video... Stop saying right?
Standard Access List (ACL) for the Cisco CCNA - Part 1
13:15
danscourses
Рет қаралды 673 М.
NAT basics for beginners CCNA - Part 1
13:35
danscourses
Рет қаралды 376 М.
СКОЛЬКО ПАЛЬЦЕВ ТУТ?
00:16
Masomka
Рет қаралды 1,5 МЛН
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 62 МЛН
МЕНЯ УКУСИЛ ПАУК #shorts
00:23
Паша Осадчий
Рет қаралды 1,7 МЛН
Extended Access List (ACL) for the Cisco CCNA - Part 1
9:10
danscourses
Рет қаралды 268 М.
DO NOT design your network like this!! // FREE CCNA // EP 6
19:36
NetworkChuck
Рет қаралды 3,3 МЛН
Standard Access List (ACL) for the Cisco CCNA - Part 3
8:48
danscourses
Рет қаралды 152 М.
TCP Established ACL - Advanced ACLs Part 1
11:58
danscourses
Рет қаралды 62 М.
How Data moves through the Internet - Networking Fundamentals
26:47
Practical Networking
Рет қаралды 369 М.
Access Control Lists | Cisco CCNA 200-301
13:28
CertBros
Рет қаралды 120 М.
Standard Access List (ACL) for the Cisco CCNA - Part 2
12:27
danscourses
Рет қаралды 235 М.
NAT basics for beginners CCNA - Part 2
12:36
danscourses
Рет қаралды 140 М.