<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ACL &#8211; RAGASYS SISTEMAS</title>
	<atom:link href="https://blog.ragasys.es/category/acl/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ragasys.es</link>
	<description>Soporte técnico para las TIC</description>
	<lastBuildDate>Thu, 25 Aug 2016 05:55:07 +0000</lastBuildDate>
	<language>es</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2020/05/logoRGS_18_05_2020.png?fit=32%2C32&#038;ssl=1</url>
	<title>ACL &#8211; RAGASYS SISTEMAS</title>
	<link>https://blog.ragasys.es</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">111701399</site>	<item>
		<title>Access Lists extendidas Cisco IV</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-iv</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-iv#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Thu, 25 Aug 2016 05:55:07 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3988</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iv" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 9: Bloquear el acceso a Internet desde los servidores</li>
<li>Topología actividad 9:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png" data-lbwps-width="997" data-lbwps-height="480" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3989" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea9#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?fit=997%2C480&amp;ssl=1" data-orig-size="997,480" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea9" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?fit=640%2C308&amp;ssl=1" class="aligncenter size-full wp-image-3989" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=640%2C308" alt="aclea9" width="640" height="308" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?w=997&amp;ssl=1 997w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=768%2C370&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 10: Bloquear el acceso cuando se inicia desde el exterior a la red 20.0.0.0/8</li>
<li>Topología actividad 10:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png" data-lbwps-width="1000" data-lbwps-height="505" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3990" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea10#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?fit=1000%2C505&amp;ssl=1" data-orig-size="1000,505" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea10" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?fit=640%2C323&amp;ssl=1" class="aligncenter size-full wp-image-3990" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=640%2C323" alt="aclea10" width="640" height="323" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?w=1000&amp;ssl=1 1000w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=300%2C152&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=768%2C388&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 11: Permitir el tráfico en las redes 20.0.0.0/8 y 40.0.0.0/8 cuando es originado en 30.0.0.0/8</li>
<li>Topología actividad 11:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png" data-lbwps-width="1001" data-lbwps-height="479" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3991" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea11#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?fit=1001%2C479&amp;ssl=1" data-orig-size="1001,479" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea11" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?fit=640%2C306&amp;ssl=1" class="aligncenter size-full wp-image-3991" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=640%2C306" alt="aclea11" width="640" height="306" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?w=1001&amp;ssl=1 1001w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=768%2C368&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/u12uiscnl3dsx05/aclextendida9.pkt?dl=0" target="_blank">ACL Extendida 9</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/38etm44251mzw5h/aclextendida10.pkt?dl=0" target="_blank">ACL Extendida 10</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/3t5gvnwn1dpql0d/aclextendida11.pkt?dl=0" target="_blank">ACL Extendida 11</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-iv/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3988</post-id>	</item>
		<item>
		<title>Access Lists extendidas Cisco III</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-iii</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-iii#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Wed, 24 Aug 2016 05:55:15 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3982</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 5: Bloquear el protocolo ICMP entre los servidores</li>
<li>Topología actividad 5:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png" data-lbwps-width="999" data-lbwps-height="478" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3983" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea5#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?fit=999%2C478&amp;ssl=1" data-orig-size="999,478" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea5" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?fit=640%2C306&amp;ssl=1" class="aligncenter size-full wp-image-3983" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=640%2C306" alt="aclea5" width="640" height="306" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?w=999&amp;ssl=1 999w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=768%2C367&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 6: Bloquear las visitas a la web 30.30.30.30 desde 20.20.20.20</li>
<li>Topología actividad 6:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png" data-lbwps-width="995" data-lbwps-height="441" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3984" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea6#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?fit=995%2C441&amp;ssl=1" data-orig-size="995,441" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea6" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?fit=640%2C284&amp;ssl=1" class="aligncenter size-full wp-image-3984" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=640%2C284" alt="aclea6" width="640" height="284" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=300%2C133&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=768%2C340&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 7: Bloquear tráfico WEB y FTP entre los servidores</li>
<li>Topología actividad 7:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png" data-lbwps-width="998" data-lbwps-height="447" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3985" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea7#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?fit=998%2C447&amp;ssl=1" data-orig-size="998,447" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea7" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?fit=640%2C287&amp;ssl=1" class="aligncenter size-full wp-image-3985" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=640%2C287" alt="aclea7" width="640" height="287" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?w=998&amp;ssl=1 998w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=300%2C135&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=768%2C344&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 8: Bloquear el acceso a páginas webs exteriores al equipo PC0</li>
<li>Topología actividad 8:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png" data-lbwps-width="1003" data-lbwps-height="502" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3986" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea8#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?fit=1003%2C502&amp;ssl=1" data-orig-size="1003,502" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea8" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?fit=640%2C320&amp;ssl=1" class="aligncenter size-full wp-image-3986" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=640%2C320" alt="aclea8" width="640" height="320" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?w=1003&amp;ssl=1 1003w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=300%2C150&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=768%2C384&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/7ly2e3dohbw5lhf/aclextendida5.pkt?dl=0" target="_blank">ACL Extendida 5</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/4pgucdind0mor1x/aclextendida6.pkt?dl=0" target="_blank">ACL Extendida 6</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/uy921sd6r3vp77q/aclextendida7.pkt?dl=0" target="_blank">ACL Extendida 7</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/6ecxoicmlkzcblx/aclextendida8.pkt?dl=0" target="_blank">ACL Extendida 8</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-iii/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3982</post-id>	</item>
		<item>
		<title>Access Lists extendidas Cisco II</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-ii</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-ii#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 05:46:27 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3976</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-ii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 1: Bloquear la comunicación entre los servidores</li>
<li>Topología actividad 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png" data-lbwps-width="994" data-lbwps-height="427" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3977" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?fit=994%2C427&amp;ssl=1" data-orig-size="994,427" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?fit=640%2C275&amp;ssl=1" class="aligncenter size-full wp-image-3977" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=640%2C275" alt="acle2a1" width="640" height="275" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?w=994&amp;ssl=1 994w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=300%2C129&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=768%2C330&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Bloquear el tráfico entre los PCs</li>
<li>Topología actividad 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png" data-lbwps-width="1002" data-lbwps-height="489" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3978" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?fit=1002%2C489&amp;ssl=1" data-orig-size="1002,489" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?fit=640%2C312&amp;ssl=1" class="aligncenter size-full wp-image-3978" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=640%2C312" alt="acle2a2" width="640" height="312" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?w=1002&amp;ssl=1 1002w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=300%2C146&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=768%2C375&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Bloquear el protocolo ICMP entre equipos</li>
<li>Topología actividad 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png" data-lbwps-width="995" data-lbwps-height="442" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3979" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?fit=995%2C442&amp;ssl=1" data-orig-size="995,442" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?fit=640%2C284&amp;ssl=1" class="aligncenter size-full wp-image-3979" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=640%2C284" alt="acle2a3" width="640" height="284" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=300%2C133&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=768%2C341&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 4: Bloquear el protocolo ICMP a los servidores</li>
<li>Topología actividad 4:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png" data-lbwps-width="995" data-lbwps-height="423" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3980" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a4#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?fit=995%2C423&amp;ssl=1" data-orig-size="995,423" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a4" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?fit=640%2C272&amp;ssl=1" class="aligncenter size-full wp-image-3980" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=640%2C272" alt="acle2a4" width="640" height="272" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=300%2C128&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=768%2C326&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/h0ctgzwxcaqv8wf/aclextendida1.pkt?dl=0" target="_blank">ACL Extendida 1</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/5ovbbp00j8yux1a/aclextendida2.pkt?dl=0" target="_blank">ACL Extendida 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/95xqsb4izyz5szo/aclextendida3.pkt?dl=0" target="_blank">ACL Extendida 3</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/jr2ceruy9f1ss70/aclextendida4.pkt?dl=0" target="_blank">ACL Extendida 4</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-ii/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3976</post-id>	</item>
		<item>
		<title>Access Lists estándar Cisco II</title>
		<link>https://blog.ragasys.es/access-lists-estandar-cisco-ii</link>
					<comments>https://blog.ragasys.es/access-lists-estandar-cisco-ii#comments</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Mon, 22 Aug 2016 08:03:22 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3970</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy&#8230; <a href="https://blog.ragasys.es/access-lists-estandar-cisco-ii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACLs estándar permiten autorizar o denegar el tráfico desde las direcciones IP de origen, no importan el destino del paquete ni los puertos involucrados.</p>
<ul>
<li>Actividad 1: Prohibir el acceso desde el PC0 a la red 30.0.0.0/8 y permitir todo lo demás</li>
<li>Topología actividad 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png" data-lbwps-width="1012" data-lbwps-height="475" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3971" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?fit=1012%2C475&amp;ssl=1" data-orig-size="1012,475" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?fit=640%2C300&amp;ssl=1" class="aligncenter size-full wp-image-3971" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=640%2C300" alt="aclstd2a1" width="640" height="300" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?w=1012&amp;ssl=1 1012w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=300%2C141&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=768%2C360&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Bloquear el acceso a los equipos 30.0.0.30 Y 30.0.0.31 a la red exterior</li>
<li>Topología actividad 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png" data-lbwps-width="959" data-lbwps-height="447" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3972" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?fit=959%2C447&amp;ssl=1" data-orig-size="959,447" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?fit=640%2C298&amp;ssl=1" class="aligncenter size-full wp-image-3972" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=640%2C298" alt="aclstd2a2" width="640" height="298" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?w=959&amp;ssl=1 959w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=300%2C140&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=768%2C358&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Bloquear el acceso al exterior del equipo 20.0.0.20 y 30.0.030</li>
<li>Topología actividad 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png" data-lbwps-width="999" data-lbwps-height="434" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3973" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?fit=999%2C434&amp;ssl=1" data-orig-size="999,434" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?fit=640%2C278&amp;ssl=1" class="aligncenter size-full wp-image-3973" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=640%2C278" alt="aclstd2a3" width="640" height="278" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?w=999&amp;ssl=1 999w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=300%2C130&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=768%2C334&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/hyn6vhy9dobuhnj/aclestandar1.pkt?dl=0" target="_blank">ACL Standard 1</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/q03bz8nlq4b7frl/aclestandar2.pkt?dl=0" target="_blank">ACL Standard 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/yd34293j91sfvuw/aclestandar3.pkt?dl=0" target="_blank">ACL Standard 3</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-estandar-cisco-ii/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3970</post-id>	</item>
		<item>
		<title>Access Lists extendidas Cisco</title>
		<link>https://blog.ragasys.es/access-list-extendidas-cisco</link>
					<comments>https://blog.ragasys.es/access-list-extendidas-cisco#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Fri, 02 Oct 2015 07:23:35 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=1676</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres ejercicios que hice en tiempo en Cisco Networking Academy con este tipo de&#8230; <a href="https://blog.ragasys.es/access-list-extendidas-cisco" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres ejercicios que hice en tiempo en Cisco Networking Academy con este tipo de listas control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 1: Denegar el tráfico HTTP de los 25 primeros hosts de la red 12.0.0.0/8 hacia el server<br />
que posee la ip 13.0.0.2</li>
<li>Toplogía 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png" data-lbwps-width="902" data-lbwps-height="626" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acle1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1679" data-permalink="https://blog.ragasys.es/access-list-extendidas-cisco/acle1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?fit=902%2C626&amp;ssl=1" data-orig-size="902,626" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?fit=640%2C444&amp;ssl=1" class="aligncenter size-full wp-image-1679" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?resize=640%2C444" alt="acle1" width="640" height="444" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?w=902&amp;ssl=1 902w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?resize=300%2C208&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle1.png?resize=250%2C175&amp;ssl=1 250w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Permitir el tráfico web de todos los hosts de la red 12.0.0.0/8 hacia los hosts pares<br />
que se encuentren dentro de los primeros 55 hosts de la red 13.0.0.0/8</li>
<li>Toplogía 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png" data-lbwps-width="898" data-lbwps-height="598" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acle2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1680" data-permalink="https://blog.ragasys.es/access-list-extendidas-cisco/acle2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png?fit=898%2C598&amp;ssl=1" data-orig-size="898,598" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png?fit=640%2C426&amp;ssl=1" class="aligncenter size-full wp-image-1680" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png?resize=640%2C426" alt="acle2" width="640" height="426" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png?w=898&amp;ssl=1 898w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle2.png?resize=300%2C200&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Permitir el tráfico web de todos los hosts de la red 13.0.0.0/8 hacia las ips<br />
de red 12.0.0.15-31/8</li>
<li>Toplogía 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png" data-lbwps-width="901" data-lbwps-height="559" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acle3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1681" data-permalink="https://blog.ragasys.es/access-list-extendidas-cisco/acle3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png?fit=901%2C559&amp;ssl=1" data-orig-size="901,559" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png?fit=640%2C397&amp;ssl=1" class="aligncenter size-full wp-image-1681" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png?resize=640%2C397" alt="acle3" width="640" height="397" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png?w=901&amp;ssl=1 901w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acle3.png?resize=300%2C186&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<p>El usuario y password que utilizaremos en todas las prácticas para el acceso a los routers y switches es:</p>
<p>Usuario: ragasys</p>
<p>enable password cisco</p>
<p>enable secret class</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/0pw3wmpszp5jwwa/ACL%20Extendidas%201.pkt?dl=0" target="_blank">ACL Extendida 1</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/o8a5svgqilgxyyt/ACL%20Extendidas%202.pkt?dl=0" target="_blank">ACL Extendida 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/ykjjogr1539sxo0/ACL%20Extendidas%203.pkt?dl=0" target="_blank">ACL Extendida 3</a></li>
</ul>
<p>Actividades propuestas por el profesor Julio Andres Valenzuela.</p>
<p>Saludos y espero que os resulte de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-list-extendidas-cisco/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1676</post-id>	</item>
		<item>
		<title>Access Lists estándar Cisco</title>
		<link>https://blog.ragasys.es/access-list-standard-cisco</link>
					<comments>https://blog.ragasys.es/access-list-standard-cisco#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Fri, 02 Oct 2015 06:47:24 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=1671</guid>

					<description><![CDATA[Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres ejercicios que hice en tiempo en Cisco Networking Academy con este tipo de&#8230; <a href="https://blog.ragasys.es/access-list-standard-cisco" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres ejercicios que hice en tiempo en Cisco Networking Academy con este tipo de listas control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACLs estándar permiten autorizar o denegar el tráfico desde las direcciones IP de origen, no importan el destino del paquete ni los puertos involucrados.</p>
<ul>
<li>Actividad 1: Denegar el tráfico de los primeros 33 hosts de la red 12.0.0.0/8 hacia la red 13.0.0.0/8</li>
<li>Topología actividad 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png" data-lbwps-width="903" data-lbwps-height="696" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acls1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1672" data-permalink="https://blog.ragasys.es/access-list-standard-cisco/acls1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png?fit=903%2C696&amp;ssl=1" data-orig-size="903,696" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acls1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png?fit=640%2C493&amp;ssl=1" class="aligncenter size-full wp-image-1672" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png?resize=640%2C493" alt="acls1" width="640" height="493" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png?w=903&amp;ssl=1 903w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls1.png?resize=300%2C231&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Denegar el tráfico de los hosts IMPARES que se encuentren en los 55 primeros hosts de la red 13.0.0.0/8 hacia la red 12.0.0.0/8</li>
<li>Topología actividad 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png" data-lbwps-width="896" data-lbwps-height="710" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acls2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1673" data-permalink="https://blog.ragasys.es/access-list-standard-cisco/acls2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png?fit=896%2C710&amp;ssl=1" data-orig-size="896,710" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acls2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png?fit=640%2C507&amp;ssl=1" class="aligncenter size-full wp-image-1673" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png?resize=640%2C507" alt="acls2" width="640" height="507" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png?w=896&amp;ssl=1 896w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls2.png?resize=300%2C238&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Denegar el tráfico de los hosts PARES que se encuentren en los primeros 21 hosts de la<br />
red 13.0.0.0/8 hacia la red 12.0.0.0/8</li>
<li>Topología actividad 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png" data-lbwps-width="894" data-lbwps-height="697" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/10/acls3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="1674" data-permalink="https://blog.ragasys.es/access-list-standard-cisco/acls3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png?fit=894%2C697&amp;ssl=1" data-orig-size="894,697" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acls3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png?fit=640%2C499&amp;ssl=1" class="aligncenter size-full wp-image-1674" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png?resize=640%2C499" alt="acls3" width="640" height="499" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png?w=894&amp;ssl=1 894w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/10/acls3.png?resize=300%2C234&amp;ssl=1 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<p>El usuario y password que utilizaremos en todas las prácticas para el acceso a los routers y switches es:</p>
<p>Usuario: ragasys</p>
<p>enable password cisco</p>
<p>enable secret class</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/3b9t7lmn4ofphxj/ACL%20standard%201.pkt?dl=0" target="_blank">ACL Standard 1</a></li>
<li>Link de descarga actividad 2:<a href="https://www.dropbox.com/s/fx1eu9zbvmp69ah/ACL%20standard%202.pkt?dl=0" target="_blank"> ACL Standard 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/1tcgxtfawy4ax57/ACL%20Standard%203.pkt?dl=0" target="_blank">ACL Standard 3</a></li>
</ul>
<p>Actividades propuestas por el profesor Julio Andres Valenzuela</p>
<p>Saludos y espero que os resulte de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-list-standard-cisco/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1671</post-id>	</item>
		<item>
		<title>Diseño de una LAN jerárquica &#8211; Redes Convergentes</title>
		<link>https://blog.ragasys.es/diseno-de-una-lan-jerarquica</link>
					<comments>https://blog.ragasys.es/diseno-de-una-lan-jerarquica#comments</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Sat, 16 May 2015 11:47:05 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Etherchannel]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[VLAN]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[LAN Jerarquica]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Redes convergentes]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=58</guid>

					<description><![CDATA[Hola a todos. En esta entrada veremos un diseño bastante interesante sobre como montar una topología de red jerárquica, en mi opinión, antes de montar cualquier infraestructura de servidores ya sean físicos o virtualizados con VMware, Hyper-V o cualquier otra&#8230; <a href="https://blog.ragasys.es/diseno-de-una-lan-jerarquica" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a>]]></description>
										<content:encoded><![CDATA[<p>Hola a todos.</p>
<p>En esta entrada veremos un diseño bastante interesante sobre como montar una topología de red jerárquica, en mi opinión, antes de montar cualquier infraestructura de servidores ya sean físicos o virtualizados con VMware, Hyper-V o cualquier otra tecnología de virtualización, tenemos que tener unos buenos cimientos a nivel de networking y en ésta topología que diseñé hace algunos meses os muestro como tener bien construidos unos cimientos sobre los que se apoyará nuestra infraestructura VMware vSphere que veremos más adelante.</p>
<p>El diseño de las redes modernas se basan en redes convergentes de este tipo dónde tenemos múltiples redes con múltiples servicios, en este caso, tenemos una red de DATOS, otra de VoIP y otra de VIDEO dónde podemos montar nuestro circuito cerrado de televisión (CCTV).</p>
<p>Con este diseño se resume prácticamente lo más importante que se ve en el CCNA:</p>
<ul>
<li>Configuraciones básicas de routers y switches</li>
<li>Enrutamiento estático</li>
<li>Protocolos de enrutamiento</li>
<li>STP</li>
<li>VLANs</li>
<li>VTP</li>
<li>ACLs &#8211; Listas de control de acceso</li>
<li>DHCP, DNS</li>
</ul>
<p>y parte del CCNP como switches de capa 3 o etherchannel.</p>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg" data-lbwps-width="1743" data-lbwps-height="823" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="59" data-permalink="https://blog.ragasys.es/diseno-de-una-lan-jerarquica/lan-jerarquica#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?fit=1743%2C823&amp;ssl=1" data-orig-size="1743,823" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="LAN jerarquica" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?fit=640%2C303&amp;ssl=1" class=" size-full wp-image-59 aligncenter" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?resize=640%2C302" alt="LAN jerarquica" width="640" height="302" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?w=1743&amp;ssl=1 1743w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?resize=300%2C142&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?resize=1024%2C484&amp;ssl=1 1024w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2015/05/LAN-jerarquica.jpg?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>El usuario y password que utilizaremos en esta práctica para el acceso a los routers y switches es:</p>
<p>Usuario: jramos</p>
<p>password: cisco</p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<p>Aquí os dejo el link de descarga de esta topología de red LAN Jerárquica:<a href="https://www.dropbox.com/s/r2ugjaktw747cap/Dise%C3%B1o%20LAN%20jerarquica%20Cisco%20con%20ACLs%20y%20Etherchannel.pkt?dl=0" target="_blank">LAN jerarquica con ACL y Etherchannel</a></p>
<p>Aquí os dejo otro link de descarga de la misma topología pero sin etherchannel y con ACLs:<a href="https://www.dropbox.com/s/47wh78otvpsqssv/Dise%C3%B1o%20LAN%20jerarquica%20Cisco%20con%20ACLs.pkt?dl=0" target="_blank">LAN jerarquica con ACL sin Etherchannel</a></p>
<p>Aquí os dejo otro link de descarga de la misma topología pero sin etherchannel y sin ACLs: <a href="https://www.dropbox.com/s/zhzcb2hk6bf907p/Dise%C3%B1o%20LAN%20jerarquica%20Cisco%20sin%20ACLs.pkt?dl=0" target="_blank">LAN jerarquica sin ACL ni Etherchannel</a></p>
<p>Espero que os sea de ayuda ya que me llevo un tiempo poder desarrollar este diseño.</p>
<p>Saludos.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/diseno-de-una-lan-jerarquica/feed</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">58</post-id>	</item>
	</channel>
</rss>
