5.5.2 Lab - Configure and Verify Extended IPv4 ACLs Submission Document
5.5.2 Lab - Configure and Verify Extended IPv4 ACLs Submission Document
Topology
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1
G0/0/1.20 10.20.0.1 255.255.255.0
N/A
R1
G0/0/1.30 10.30.0.1 255.255.255.0
N/A
R1
G0/0/1.40 10.40.0.1 255.255.255.0
N/A
R1
G0/0/1.1000 N/A N/A
N/A
R1
Loopback1 172.16.1.1 255.255.255.0
R2 G0/0/1 10.20.0.4 255.255.255.0 N/A
S1 VLAN 20 10.20.0.2 255.255.255.0 10.20.0.1
S2 VLAN 20 10.20.0.3 255.255.255.0 10.20.0.1
PC-A NIC 10.30.0.10 255.255.255.0 10.30.0.1
PC-B NIC 10.40.0.10 255.255.255.0 10.40.0.1
VLAN Table
VLAN Name Interface Assigned
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure and Verify Extended Access Control Lists
Background / Scenario
You have been tasked with configuring access control lists on small company’s network. ACLs are one of the
simplest and most direct means of controlling layer 3 traffic. R1 will be hosting an internet connection
(simulated by interface Loopback 1) and sharing the default route information to R2. After initial configuration
is complete, the company has some specific traffic security requirements that you are responsible for
implementing.
Note: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.4
(universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2)
(lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model
and Cisco IOS version, the commands available and the output produced might vary from what is shown in
the labs. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: Ensure that the routers and switches have been erased and have no startup configurations. If you are
unsure contact your instructor.
Required Resources
2 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
2 PCs (Windows with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Instructions
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
a. Create and name the required VLANs on each switch from the table above.
b. Configure the management interface and default gateway on each switch using the IP address
information in the Addressing Table.
c. Assign all unused ports on the switch to the Parking Lot VLAN, configure them for static access mode,
and administratively deactivate them.
Note: The interface range command is helpful to accomplish this task with as few commands as
necessary.
a. Change the switchport mode on interface F0/1 to force trunking. Make sure to do this on both switches.
b. As a part of the trunk configuration, set the native vlan to 1000 on both switches. You may see error
messages temporarily while the two interfaces are configured for different native VLANs.
c. As another part of trunk configuration, specify that VLANs 20, 30, 40, and 1000 are allowed to cross the
trunk.
d. Issue the show interfaces trunk command to verify trunking ports, the Native VLAN and allowed VLANs
across the trunk.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
Step 2: Configure the R2 interface g0/0/1 using the address from the table and a default route
with the next hop 10.20.0.1
Close configuration window
a. Create a local user with the username SSHadmin and the encrypted password $cisco123!
b. Use ccna-lab.com as the domain name.
c. Generate crypto keys using a 1024-bit modulus.
d. Configure the first five VTY lines on each device to support SSH connections only and to authenticate to
the local user database.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
1. Paste in a screenshot (to include the time and date) of your NetLab screen with Lab 5.5.2 open.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
Highlight your entire running config in the R1 window. From the drop-down menu for R1, select
Copy Selected Text.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
no aaa new-model
no ip domain lookup
ip domain name ccna-lab.com
login on-success log
subscriber templating
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-244286773
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-244286773
revocation-check none
rsakeypair TP-self-signed-244286773
crypto pki certificate chain TP-self-signed-244286773
certificate self-signed 01
3082032E 30820216 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32343432 38363737 33301E17 0D323530 34323130 31333831
335A170D 33303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3234 34323836
37373330 82012230 0D06092A 864886F7 0D010101 05000382 010F0030 82010A02
82010100 A8465887 383060B1 FADF60CE E614D296 8A687F86 38F43D12 89929081
D915B8B7 5144CEC3 F1210D80 6F378587 DFDC3F73 C7936A39 F20B2ED3 282ABEA4
6E8A2539 8A5E2E8F DA52AF80 17367BC7 8EF68483 2B596AC6 DC9233F1 107434E9
79FD43D6 152A500C AC23139E 81DBA4E2 D164C727 5C0E0053 06B4F71C 3470CE69
57E84059 E461A674 8C5EEC4D 1036F422 B10BD72A E538B97C 5E6F6B0E DA4EE555
AC11D20A B32A6D76 5ED9382C 2E5BE0CF 5EE108E3 F47B107C 03C4E726 2E46126A
8228797D 52546EE6 0BFC9443 83EB21B6 961339B4 4F0865B1 BF8A4D8B 7852704F
6C73DB93 B5278F01 024FC8E9 1BC33953 D967E251 46287B2C 9FC39D70 13CF4EFE
70C1AF13 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F
0603551D 23041830 16801485 2E75FCD5 8305B468 467A4995 601119D9 9AE25030
1D060355 1D0E0416 0414852E 75FCD583 05B46846 7A499560 1119D99A E250300D
06092A86 4886F70D 01010505 00038201 01002D82 1D5EE94A 5E5598EA 8C79D198
AE7157E0 7B3F4E6F 909A87B9 980EBCEF 07852236 73E3C114 FE5BE126 D24A7443
FC1EA2B7 84933032 7FF025AA C5E4D2AD 37F31289 2CA27934 5A69B2A5 640A9FC8
C3DC1C37 CA26130B F72313F4 02384E8F 1FF053F8 D28AEEB4 3C2C0A91 5B9BA6C6
28A9ACA8 920E24EB DC1EE4A6 B55BCB63 06AE0C4A 1C57350F 5170BE98 4503B457
933E016F AA61A6EA 85D48BB8 990EA4B2 EB2DB400 A0B6BEE0 865B8734 75F5C6E8
661A938B D645F588 88F7F960 BFC71E5F 6175AFED A65A5351 54002C25 6AC4C65E
C75F8BAE 8061305B D1660A71 A0EA73A8 DD200F2E C32A0204 3CB6D922 68293DA2
53DBC2DA E47221CC B2A850E1 D86BC75A 7B83
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
quit
license udi pid ISR4221/K9 sn FJC2339A1NN
license accept end user agreement
license boot suite FoundationSuiteK9
license boot level appxk9
license boot level securityk9
no license smart enable
diagnostic bootup level minimal
spanning-tree extend system-id
username SSHadmin secret 5 $1$p63j$mvXQ1ovNLCcrw2qyu5DoF0
redundancy
mode none
interface Loopback1
ip address 172.16.1.1 255.255.255.0
interface GigabitEthernet0/0/0
no ip address
negotiation auto
interface GigabitEthernet0/0/1
no ip address
negotiation auto
interface GigabitEthernet0/0/1.20
description Management Network
encapsulation dot1Q 20
ip address 10.20.0.1 255.255.255.0
interface GigabitEthernet0/0/1.30
description Operations Network
encapsulation dot1Q 30
ip address 10.30.0.1 255.255.255.0
ip access-group 102 in
interface GigabitEthernet0/0/1.40
description Sales Network
encapsulation dot1Q 40
ip address 10.40.0.1 255.255.255.0
ip access-group 101 in
interface GigabitEthernet0/0/1.1000
description Native VLAN
encapsulation dot1Q 1000 native
ip forward-protocol nd
no ip http server
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
Highlight your entire running config in theR2 window. From the drop-down menu forR2, select
Copy Selected Text.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 11 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 12 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
no ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.20.0.1
control-plane
line con 0
password 7 14141B180F0B
logging synchronous
login
transport input none
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password 7 13061E010803
login local
transport input ssh
line vty 5 15
password 7 045802150C2E
login
end
6. On S1, run the following command in priviledged EXEC mode:
show run | exclude !
Highlight your entire running config in the S1 window. From the drop-down menu for S1, select
Copy Selected Text.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 13 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 14 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
interface FastEthernet0/2
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/3
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/4
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/5
switchport trunk native vlan 1000
switchport trunk allowed vlan 20,30,40,1000
switchport mode trunk
interface FastEthernet0/6
switchport access vlan 30
switchport mode access
interface FastEthernet0/7
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/8
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/9
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/10
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/11
switchport access vlan 999
switchport mode access
shutdown
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 15 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
interface FastEthernet0/12
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/13
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/14
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/15
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/16
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/17
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/18
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/19
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/20
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/21
switchport access vlan 999
switchport mode access
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 16 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
shutdown
interface FastEthernet0/22
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/23
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/24
switchport access vlan 999
switchport mode access
shutdown
interface GigabitEthernet0/1
switchport access vlan 999
switchport mode access
shutdown
interface GigabitEthernet0/2
switchport access vlan 999
switchport mode access
shutdown
interface Vlan1
no ip address
interface Vlan20
ip address 10.20.0.2 255.255.255.0
ip default-gateway 10.20.0.1
ip http server
ip http authentication local
ip http secure-server
line con 0
password 7 05080F1C2243
logging synchronous
login
line vty 0 4
password 7 14141B180F0B
login local
transport input ssh
line vty 5 15
password 7 121A0C041104
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 17 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
login
end
Highlight your entire running config in the S2 window. From the drop-down menu for S2, select
Copy Selected Text.
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 18 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 19 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 20 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
interface FastEthernet0/16
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/17
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/18
switchport access vlan 40
switchport mode access
interface FastEthernet0/19
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/20
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/21
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/22
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/23
switchport access vlan 999
switchport mode access
shutdown
interface FastEthernet0/24
switchport access vlan 999
switchport mode access
shutdown
interface GigabitEthernet0/1
switchport access vlan 999
switchport mode access
shutdown
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 21 of 22 www.netacad.com
Lab - Configure and Verify Extended IPv4 ACLs
interface GigabitEthernet0/2
switchport access vlan 999
switchport mode access
shutdown
interface Vlan1
no ip address
interface Vlan20
ip address 10.20.0.3 255.255.255.0
ip default-gateway 10.20.0.1
ip http server
ip http authentication local
ip http secure-server
line con 0
password 7 110A1016141D
logging synchronous
login
line vty 0 4
password 7 045802150C2E
login local
transport input ssh
line vty 5 15
password 7 0822455D0A16
login
end
End of document
2017 - 2025 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 22 of 22 www.netacad.com