172.22.31.0/26 Server GO/2 GO/0 GO/1 172.22.34.64/27 R1 172.22.34.96/28 s1 S2 PC1 PC2 Addressing Table Device Interface IP Address Subnet Mask Default Gateway GO/0 172.22.34.65 255.255.255.224 N/A R1 GO/1 172.22.34.97 255.255.255.240 N/A GO/2 172.22.34.1 255.255.255.192 N/A Server NIC 172.22.34.62 255.255.255.192 172.22.34.1 PC1 NIC 172.22.34.66 255.255.255.224 172.22.34.65 PC2 NIC 172.22.34.98 255.255.255.240 172.22.34.97 1. Build and configure given topology using Packet Tracer. L 2. Configure an ACL (100) to permit FTP and ICMP.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
172.22.31.0/26
Server
GO/2
GO/O
GO/1
172.22.34.64/27
R1
172.22.34.96/28
s1
S2
PC1
PC2
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
GO/0
172.22.34.65
255.255.255.224
N/A
R1
GO/1
172.22.34.97
255.255.255.240
N/A
GO/2
172.22.34.1
255.255.255.192
N/A
Server
NIC
172.22.34.62
255.255.255.192
172.22.34.1
PC1
NIC
172.22.34.66
255.255.255.224
172.22.34.65
PC2
NIC
172.22.34.98
255.255.255.240
172.22.34.97
1. Build and configure given topology using Packet Tracer.
2. Configure an ACL (100) to permit FTP and 1CMP.
3. Filter the ACL that allows traffic belonging to 172.22.34.64/27 network.
4. Configure the destination address. Filtering traffic for a single destination, which is the
server.
5. All other traffic is denied, by default.
6. Verify the access list.
7. Apply the ACL on the correct interface to filter traffic (R1). The traffic that ACL 100
applies to is inbound from the network connected to the Gigabit Ethernet 0/0 interface.
8. Verify the ACL implementation.
9. Configure an extended ACL to permit HTTP and ICMP from PC2 LAN. All devices on
the PC2 LAN need TCP access. Filter www traffic.
10. Create a second access list statement to permit ICMP traffic from PC2 to Server.
11. Verify that access list HTTP_ONLY contains the correct statements.
12. Apply the ACL on the correct interface to filter traffic (R1).
13. Verify the ACL implementation.
Transcribed Image Text:172.22.31.0/26 Server GO/2 GO/O GO/1 172.22.34.64/27 R1 172.22.34.96/28 s1 S2 PC1 PC2 Addressing Table Device Interface IP Address Subnet Mask Default Gateway GO/0 172.22.34.65 255.255.255.224 N/A R1 GO/1 172.22.34.97 255.255.255.240 N/A GO/2 172.22.34.1 255.255.255.192 N/A Server NIC 172.22.34.62 255.255.255.192 172.22.34.1 PC1 NIC 172.22.34.66 255.255.255.224 172.22.34.65 PC2 NIC 172.22.34.98 255.255.255.240 172.22.34.97 1. Build and configure given topology using Packet Tracer. 2. Configure an ACL (100) to permit FTP and 1CMP. 3. Filter the ACL that allows traffic belonging to 172.22.34.64/27 network. 4. Configure the destination address. Filtering traffic for a single destination, which is the server. 5. All other traffic is denied, by default. 6. Verify the access list. 7. Apply the ACL on the correct interface to filter traffic (R1). The traffic that ACL 100 applies to is inbound from the network connected to the Gigabit Ethernet 0/0 interface. 8. Verify the ACL implementation. 9. Configure an extended ACL to permit HTTP and ICMP from PC2 LAN. All devices on the PC2 LAN need TCP access. Filter www traffic. 10. Create a second access list statement to permit ICMP traffic from PC2 to Server. 11. Verify that access list HTTP_ONLY contains the correct statements. 12. Apply the ACL on the correct interface to filter traffic (R1). 13. Verify the ACL implementation.
Expert Solution
steps

Step by step

Solved in 5 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY