Enter the statement that denies ICMP access from PC3 to Server2.Enter the statement that denies ICMP access from PC3 to Server1.Refer to the addressing table for the IP address of PC3. Enter the statement that denies access from PC2 to Server2, only for FTP (port 21 only).Enter the statement that denies access from PC2 to Server1, only for FTP (port 21 only).Refer to the addressing table for the IP address of PC2. RT1(config- ext – nacl )# deny tcp host 172.31.1.101 host 64.103.255.254 eq 443 Step 2: Deny PC2 to access FTP services on Server1 and Server2. Enter the statement that denies access from PC1 to Server 2, only for HTTPS.Refer to the addressing table for the IP address of Server 2. Enter the statement that denies access from PC1 to Server 2, only for HTTP.Next, enter the statement that denies access from PC1 to Server 1, only for HTTPS (port 443).Refer to the addressing table for the IP address of PC1 and Server1. Begin the ACL configuration with a statement that denies access from PC1 to Server 1, only for HTTP (port 80).What is the command to begin the configuration of an extended access list with the name ACL ? Four access control statements are required.
Create a named extended IP access list on router RT1 which will deny PC1 access to the HTTP and HTTPS services of Server1 and Server2.Step 1: Deny PC1 access to HTTP and HTTP S services on Server1 and Server2. Note: For scoring purposes, you must configure the statements in the order specified in the following steps. Block ICMP access from PC3 to Server1 and Server2.Block FTP access from PC2 to Server1 and Server2.The servers are inside the cloud and you only know their IP addresses. Block HTTP and HTTPS access from PC1 to Server1 and Server2.Instructions Part 1: Configure a Named Extended ACLĬonfigure one named ACL to implement the following policy: In this scenario, specific devices on the LAN are allowed to various services on servers located on the i nternet. Part 2: Apply and Verify the Extended ACL Background / Scenario