Extended Acl list configuration two routers with serial cable with commands 2025

By pgollabala@gmail.com

Published On:

 

 

 

 

Join WhatsApp

Join Now

Extended ACL

Use generic server for iis

Configure all ip address and enable ip routing and make sure all system are pinging with each other.

And even check your are able to get the web page.’

Extended Acl list configuration two routers with serial cable with commands 2025

ACL LIST CONFIGURATION TWO ROUTERS WITH SERIAL CABLE WITH COMMANDS 2025
ACL LIST CONFIGURATION TWO ROUTERS WITH SERIAL CABLE WITH COMMANDS 2025
Extended Acl list configuration two routers with serial cable with commands 2025

 


Extended ACL Configuration on Two Routers Using Serial Cable (2025)

Extended Acl list configuration two routers with serial cable with commands 2025


1. Introduction to Extended ACL

Extended Acl list configuration two routers with serial cable with commands 2025

An Extended Access Control List (ACL) is used to filter network traffic based on multiple conditions, such as:

  • Source IP address
  • Destination IP address
  • Protocol (IP, TCP, UDP, ICMP)
  • Port numbers (HTTP, FTP, SSH, etc.)

Why Extended ACL?

Extended ACLs provide fine-grained control compared to Standard ACLs.

Key Rule

Extended ACLs should be placed as close as possible to the source network.


2. Network Topology

Extended Acl list configuration two routers with serial cable with commands 2025

Devices Used

  • 2 Routers (Cisco)
  • 2 PCs
  • 1 Serial DCE cable
  • 2 Ethernet cables

Topology Diagram (Conceptual)

PC1 ---- R1 =====(Serial Cable)===== R2 ---- PC2

3. IP Addressing Scheme

Extended Acl list configuration two routers with serial cable with commands 2025

Device Interface IP Address Subnet Mask
PC1 NIC 192.168.1.10 255.255.255.0
R1 G0/0 192.168.1.1 255.255.255.0
R1 S0/0/0 10.0.0.1 255.255.255.252
R2 S0/0/0 10.0.0.2 255.255.255.252
R2 G0/0 192.168.2.1 255.255.255.0
PC2 NIC 192.168.2.10 255.255.255.0

4. Objective of Extended ACL

Extended Acl list configuration two routers with serial cable with commands 2025

how to activate office 2016 for free without product key through command prompt 2026

Scenario

  • Allow PC1 (192.168.1.10) to access PC2 (192.168.2.10) using HTTP (port 80)
  • Deny all other traffic
  • Apply Extended ACL on Router R1

5. Basic Router Configuration

Extended Acl list configuration two routers with serial cable with commands 2025

5.1 Configure Router R1

Router> enable
Router# configure terminal
Router(config)# hostname R1

Configure LAN Interface

R1(config)# interface g0/0
R1(config-if)# ip address 192.168.1.1 255.255.255.0
R1(config-if)# no shutdown

Configure Serial Interface

R1(config)# interface s0/0/0
R1(config-if)# ip address 10.0.0.1 255.255.255.252
R1(config-if)# clock rate 64000
R1(config-if)# no shutdown

5.2 Configure Router R2

Router> enable
Router# configure terminal
Router(config)# hostname R2

Configure Serial Interface

R2(config)# interface s0/0/0
R2(config-if)# ip address 10.0.0.2 255.255.255.252
R2(config-if)# no shutdown

Configure LAN Interface

R2(config)# interface g0/0
R2(config-if)# ip address 192.168.2.1 255.255.255.0
R2(config-if)# no shutdown

6. Configure Static Routing

Extended Acl list configuration two routers with serial cable with commands 2025

On Router R1

R1(config)# ip route 192.168.2.0 255.255.255.0 10.0.0.2

On Router R2

R2(config)# ip route 192.168.1.0 255.255.255.0 10.0.0.1

7. Verify Basic Connectivity (Before ACL)

Extended Acl list configuration two routers with serial cable with commands 2025

Ping Test

From PC1:

ping 192.168.2.10

✔ Ping should succeed


8. Extended ACL Theory

Syntax

access-list <100-199> <permit|deny> <protocol> <source> <wildcard> <destination> <wildcard> [port]

Example

access-list 100 permit tcp 192.168.1.10 0.0.0.0 192.168.2.10 0.0.0.0 eq 80

9. Configure Extended ACL on Router R1

Extended Acl list configuration two routers with serial cable with commands 2025

Step 1: Create Extended ACL

R1(config)# access-list 100 permit tcp 192.168.1.10 0.0.0.0 192.168.2.10 0.0.0.0 eq 80

Step 2: Deny All Other Traffic

R1(config)# access-list 100 deny ip any any

⚠ Even though there is an implicit deny, explicit deny is best practice for clarity.


10. Apply Extended ACL to Interface

Extended ACL should be applied near the source, so apply it on R1 LAN interface (G0/0) inbound.

R1(config)# interface g0/0
R1(config-if)# ip access-group 100 in

11. Verify ACL Configuration

11.1 Check ACL

R1# show access-lists

11.2 Check Interface

R1# show ip interface g0/0

12. Testing the Extended ACL

Extended Acl list configuration two routers with serial cable with commands 2025

Test 1: HTTP Access (Allowed)

  • Open browser on PC1
  • Access http://192.168.2.10

✔ Should work


Test 2: Ping (Denied)

ping 192.168.2.10

❌ Ping should fail (ICMP denied)


Test 3: FTP or SSH (Denied)

❌ Access blocked


13. Named Extended ACL (Optional – 2025 Best Practice)

Extended Acl list configuration two routers with serial cable with commands 2025

Symantec Ghost Boot CD 12.0 Build 11436 x86 (Win10PE) 2026 windows backup c drive or all files through ghost iso

Create Named ACL

R1(config)# ip access-list extended WEB-ACCESS
R1(config-ext-nacl)# permit tcp host 192.168.1.10 host 192.168.2.10 eq 80
R1(config-ext-nacl)# deny ip any any

Apply Named ACL

R1(config)# interface g0/0
R1(config-if)# ip access-group WEB-ACCESS in

14. Common Mistakes & Troubleshooting

Extended Acl list configuration two routers with serial cable with commands 2025

Mistake 1: Wrong Direction

✔ Use in on source interface

Mistake 2: Wrong Wildcard Mask

  • Subnet mask: 255.255.255.0
  • Wildcard: 0.0.0.255

Mistake 3: Forgetting Routing

✔ Ensure static routes are configured


15. Remove or Modify ACL

Extended Acl list configuration two routers with serial cable with commands 2025

Remove ACL from Interface

R1(config)# interface g0/0
R1(config-if)# no ip access-group 100 in

Delete ACL

R1(config)# no access-list 100

16. Real-Time Use Cases

  • Block social media traffic
  • Allow only secure services
  • Control department-wise access
  • Improve network security
  • Enterprise firewall rules

17. Interview Questions (Quick)

Q:

Why Extended ACL is placed near source?
A: To stop unwanted traffic early and save bandwidth.

Q: ACL range?
A: 100–199 & 2000–2699


18. Conclusion

Extended ACLs are powerful tools for network security and traffic control.
In this guide, you learned:

✔ Two-router serial configuration
✔ Static routing
✔ Extended ACL syntax
✔ Real-time implementation
✔ Verification & troubleshooting


If you want:

  • Packet Tracer lab file
  • Featured image
  • Telugu version
  • MCQs or interview questions
  • HTML blog format

👉 Just tell me 👍

video link to click here

please subscribe my website to click here

Vyapar billing software available for all types of indian business to download free trial 7 days

ex 2

 

R0

Router(config)#access-list 110 deny tcp 10.0.0.0 0.255.255.255 host 40.0.0.3 eq www

Router(config)#access-list 110 permit tcp any any

Router(config)#access-list 110 permit icmp any any

Router(config)#int s1/0

Router(config-if)#ip access-group 110 out

 

Leave a Comment