Reference no: EM13477470
A small company is using the topology shown below. Minimal security measures have been implemented. Assume that the 200.100.0.0/16 network represents the Internet. The Dallas and Chicago hosts need to be protected from specific types of malicious traffic from the Internet.
Create ACL to meet the requirements of the security demands
Modify existing ACL to meet additional security requirements
Task 1-Apply the ACL to meet initial requirements
1. If you are applying an extended ACL to deny specific packets, where should you apply it? Explain your answer.
2. If you are writing an ACL with multiples access-list commands, what order do you follow to write the commands?
3. What portnumbers do ftp and http servers use? Why does ftp server use two port numbers?
4. In which interface and direction would you apply the ACL in Chicago router? Why?
5. What is the hiddenaccess-list command that exist in all ACL?
6. Copy below Chicago router's running-config file from page 2, and add the commands needed to create and apply the ACL in the router.
Task 2-Apply the ACL to meet later requirements
7. Write below the commands needed to modify the ACL in Chicago router.