Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Sunday, 2 February 2014
Practice ACL Configuration
This Tutorial will Show you how to Work with Extended ACL
- First Of all i will Configure all routers and hosts with the following ip addresses.
router0 fa0/0 172.16.10.1/24
router0 s 2/0 192.168.4.5/30
router1 fa0/0 172.30.10.1/24
router1 s2/0 192.168.4.6/30
pc0 172.16.10.5/24
pc1 172.30.10.20/24
Set the clock rate to 9600.
2) Configure RIP on both routers so there is full reach-ability to and from all networks.
commands:
Router0:
router rip
version 2
network 172.16.0.0
network 192.168.4.0
Router1:
router rip
version 2
network 172.30.0.0
network 192.168.4.0
3) Verify that all routers and hosts can ping all interfaces. Do at your Own.
4) Deny all telnet sessions coming in on router0's 2/0 interface. This will deny telnet sessions from both router1 and pc1. Permit all other traffic. Use "101" as the number for the ACL. Apply the ACL to the appropriate interface.
Commands:
access-list 101 deny tcp any any eq telnet
access-list 101 permit ip any any
5) Verify that the ACL is working.
And Bingo My ACL is working. That's it.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Hello folks, How are you all. Today I'm here to bring you on of the most amazing hacking news or trick you can say. So let's begin ...
-
OPEN MS-DOS Source Code Early tech fans might remember the good 'ol days of Microsoft MS-DOS, the company's first operating s...
-
SEA Comes Close to Owning Facebook hello everyone, this time i'm bringing you the most recent news around the world about facebo...
-
In previous tutorial we learned that there are many different methods of making connection to router. Now in this Tutorial i'm going to...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Hello, everyone Today I'm going to explain About how to make connection to router using different approaches. So, here we go. As...
-
Hello there. Here comes one amazing thing that you must know. Yes, now anyone can track your phone with just a small, cheap set up. That...
-
Google has begun a Glass at Work initiative, asking businesses how they're working with Glass, and the kinds of applications they...
Categories
ACL
APPS AND SOFTWARE
Account Hacking
Adobe Flash Player
Android
BREAKING NEWS
Basic Networking
Bluetooth Hacking
Bus Tupology
CCNA
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
FTP
FTP Server
GOOGLE GLASS
Google Hacking
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
algorithms
ccna discovery
ccna exploration
facebook
hacking tool
internet and network security
packet tracer tutorial
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment