Access Control Lists
Configured and applied standard and extended ACLs on router interfaces to enforce network communication restrictions across subnets. Implemented traffic filters to block DNS, HTTP, and HTTPS access based on source and destination IPs and ports, simulating realistic enterprise security controls.
Tools:- Cisco Packet Tracer
- Router CLI
- Command Prompt
- Web Browser
Skills Demonstrated:- Creating standard numbered ACLs to filter traffic by source
- Creating extended named ACLs to filter traffic by protocol, source, and destination
- Blocking DNS access using both TCP and UDP on port 53
- Combining multiple access rules in a single ACL for shared sources
- Applying ACLs strategically inbound and outbound on router interfaces
- Using the ping utility and browser to test ACL behavior
- Understanding the practical impact of ACLs on real-time communication
- Monitoring ACL matches with the show access-lists command