How to Configure ACL On Layer 3 Switch in Packet Tracer

Access Control Lists (ACLs) play a pivotal role in network security, facilitating the management of traffic flow within a network. The configuration of ACLs allows for the specification of permissions of traffic to subnetwork or individual host devices, such as servers.

To create an ACL, one must define permissions (rules) on the router or Layer 3 switch that is close to the designated host or nearest to the source host, depending on the type of ACL being configured.

There are various types of ACLs, including standard ACL, standard-numbered ACL, extended ACL, and extended-numbered ACL, each of which is covered in a separate post below.

Similar to the way we configure ACL on Cisco routers, we can also configure ACL on layer 3 switch and control traffic flow in our network. The only difference is that we need to enable IP routing and turn the layer 3 switchport to a routed port while configuring the static route on the layer 3 switch.

Network Topology

The network topology we will be making use of is as shown below. As you can see, it consists of two layer 3 switches and three PCs, each connected to the layer 3 switch.

ALSO READ:  How to Configure RIP on Layer 3 Switch in Packet Tracer

A network comprising of two layer 3 switchets

 

Here is a video on how to configure ACL on layer 3 switch;

Configuration Objectives

The objective of this configuration is to:

  1. Configure a Standard Named ACL on Multilayer Switch0 to deny traffic from PC0 to the network (192.168.2.0/24) while permitting all other traffic.
  2. Configure a Standard Named ACL on Multilayer Switch 1 to deny traffic from PC3 to the network (192.168.3.0/24) while permitting all other traffic.

How to Configure ACL On Layer 3 Switch

Here are steps to configure ACL on layer 3 Switch;

Step 1: Configure static Route on each layer 3 switch

Enter the following command on the 2 layer 3 switch to configure the static route. If you are curious to know what each command does, you can read our post on how to configure a static route on the Layer 3 switch.

Remember to use the IP address assigned to the vlan1 as the default gateway IP address for PCS attached to each of the layer 3 switches.

Multilayer Switch0

Switch#conf t
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.2.1 255.255.255.0
Switch(config-if)#no shut
Switch(config-if)#exit
Switch(config)#ip routing
Switch(config)#int fa0/1
Switch(config-if)#no switchport
Switch(config-if)#ip address 192.168.1.2 255.255.255.0
Switch(config-if)#no shut
Switch(config-if)#exit
Switch(config)#ip route 192.168.3.0 255.255.255.0 192.168.1.1

Multilayer Switch1

Switch#conf t
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.3.1 255.255.255.0
Switch(config-if)#no shut
Switch(config-if)#exit
Switch(config)#ip routing
Switch(config)#int fa0/1
Switch(config-if)#no switchport
Switch(config-if)#ip address 192.168.1.1 255.255.255.0
Switch(config-if)#no shut
Switch(config-if)#exit
Switch(config)#ip route 192.168.2.0 255.255.255.0 192.168.1.2

Step 2: Configure ACL on Multilayer Switch0 to deny traffic from PC0.

Switch>en
Switch#conf t
Switch(config)#ip access-list standard FILTER_ACL
Switch(config-std-nacl)#deny 192.168.3.2
Switch(config-std-nacl)#permit any
Switch(config-std-nacl)#int fa0/1
Switch(config-if)#ip access-group FILTER_ACL in 

The commands above create an ACL with the name Filter_ACL and define a rule that denies traffic from 192.168.3.2 and permits all other traffic. The last command applies the ACL to the FA0/1 interface of Multilayer Switch 0.

ALSO READ:  Standard Numbered ACL Configuration in Packet Tracer

Step 3: Configure ACL on Multilayer Switch1 to deny traffic from PC3.

Switch>en
Switch#conf t
Switch(config)#ip access-list standard FILTER_ACL2
Switch(config-std-nacl)#deny 192.168.2.2
Switch(config-std-nacl)#permit any
Switch(config-std-nacl)#int fa0/1
Switch(config-if)#ip access-group FILTER_ACL2 in

The commands above create an ACL with the name Filter_ACL2 and define a rule that denies traffic from 192.168.2.2 and permits all other traffic. The last command applies the ACL to the FA0/1 interface of Multilayer Switch1

Step 4: Test the configuration

To test the configuration, I have pings from PC0 to PC4, and as you can see below, the pings failed because of the ACL rule configured on Multilayer Switch 0.

Ping reply from pc4

Also, I have pinged from PC3 to PC0, and as you can see, the ping failed because of the ACL rule configured on multilayer switch 1.

ALSO READ:  TCP Communication: How to Send TCP Traffic in Packet Tracer

Ping reply from pc2

Related Posts;

  1. Standard Numbered ACL Configuration in Packet Tracer
  2. Extended Numbered ACL Configuration in Packet Tracer
  3. Extended Named ACL Configuration in Packet Tracer

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top