<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ACL archivos - RAGASYS SISTEMAS</title>
	<atom:link href="https://blog.ragasys.es/tag/acl/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ragasys.es/tag/acl</link>
	<description>Soporte técnico para las TIC</description>
	<lastBuildDate>Thu, 25 Aug 2016 05:55:07 +0000</lastBuildDate>
	<language>es</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2020/05/logoRGS_18_05_2020.png?fit=32%2C32&#038;ssl=1</url>
	<title>ACL archivos - RAGASYS SISTEMAS</title>
	<link>https://blog.ragasys.es/tag/acl</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">111701399</site>	<item>
		<title>Access Lists extendidas Cisco IV</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-iv</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-iv#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Thu, 25 Aug 2016 05:55:07 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3988</guid>

					<description><![CDATA[<p>Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iv" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iv">Access Lists extendidas Cisco IV</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 9: Bloquear el acceso a Internet desde los servidores</li>
<li>Topología actividad 9:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png" data-lbwps-width="997" data-lbwps-height="480" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3989" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea9#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?fit=997%2C480&amp;ssl=1" data-orig-size="997,480" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea9" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?fit=640%2C308&amp;ssl=1" class="aligncenter size-full wp-image-3989" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=640%2C308" alt="aclea9" width="640" height="308" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?w=997&amp;ssl=1 997w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea9.png?resize=768%2C370&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 10: Bloquear el acceso cuando se inicia desde el exterior a la red 20.0.0.0/8</li>
<li>Topología actividad 10:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png" data-lbwps-width="1000" data-lbwps-height="505" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3990" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea10#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?fit=1000%2C505&amp;ssl=1" data-orig-size="1000,505" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea10" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?fit=640%2C323&amp;ssl=1" class="aligncenter size-full wp-image-3990" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=640%2C323" alt="aclea10" width="640" height="323" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?w=1000&amp;ssl=1 1000w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=300%2C152&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea10.png?resize=768%2C388&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 11: Permitir el tráfico en las redes 20.0.0.0/8 y 40.0.0.0/8 cuando es originado en 30.0.0.0/8</li>
<li>Topología actividad 11:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png" data-lbwps-width="1001" data-lbwps-height="479" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3991" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iv/aclea11#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?fit=1001%2C479&amp;ssl=1" data-orig-size="1001,479" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea11" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?fit=640%2C306&amp;ssl=1" class="aligncenter size-full wp-image-3991" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=640%2C306" alt="aclea11" width="640" height="306" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?w=1001&amp;ssl=1 1001w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea11.png?resize=768%2C368&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/u12uiscnl3dsx05/aclextendida9.pkt?dl=0" target="_blank">ACL Extendida 9</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/38etm44251mzw5h/aclextendida10.pkt?dl=0" target="_blank">ACL Extendida 10</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/3t5gvnwn1dpql0d/aclextendida11.pkt?dl=0" target="_blank">ACL Extendida 11</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iv">Access Lists extendidas Cisco IV</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-iv/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3988</post-id>	</item>
		<item>
		<title>Access Lists extendidas Cisco III</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-iii</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-iii#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Wed, 24 Aug 2016 05:55:15 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3982</guid>

					<description><![CDATA[<p>Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iii">Access Lists extendidas Cisco III</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 5: Bloquear el protocolo ICMP entre los servidores</li>
<li>Topología actividad 5:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png" data-lbwps-width="999" data-lbwps-height="478" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3983" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea5#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?fit=999%2C478&amp;ssl=1" data-orig-size="999,478" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea5" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?fit=640%2C306&amp;ssl=1" class="aligncenter size-full wp-image-3983" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=640%2C306" alt="aclea5" width="640" height="306" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?w=999&amp;ssl=1 999w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=300%2C144&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea5.png?resize=768%2C367&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 6: Bloquear las visitas a la web 30.30.30.30 desde 20.20.20.20</li>
<li>Topología actividad 6:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png" data-lbwps-width="995" data-lbwps-height="441" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3984" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea6#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?fit=995%2C441&amp;ssl=1" data-orig-size="995,441" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea6" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?fit=640%2C284&amp;ssl=1" class="aligncenter size-full wp-image-3984" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=640%2C284" alt="aclea6" width="640" height="284" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=300%2C133&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea6.png?resize=768%2C340&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 7: Bloquear tráfico WEB y FTP entre los servidores</li>
<li>Topología actividad 7:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png" data-lbwps-width="998" data-lbwps-height="447" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3985" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea7#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?fit=998%2C447&amp;ssl=1" data-orig-size="998,447" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea7" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?fit=640%2C287&amp;ssl=1" class="aligncenter size-full wp-image-3985" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=640%2C287" alt="aclea7" width="640" height="287" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?w=998&amp;ssl=1 998w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=300%2C135&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea7.png?resize=768%2C344&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 8: Bloquear el acceso a páginas webs exteriores al equipo PC0</li>
<li>Topología actividad 8:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png" data-lbwps-width="1003" data-lbwps-height="502" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3986" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-iii/aclea8#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?fit=1003%2C502&amp;ssl=1" data-orig-size="1003,502" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclea8" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?fit=640%2C320&amp;ssl=1" class="aligncenter size-full wp-image-3986" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=640%2C320" alt="aclea8" width="640" height="320" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?w=1003&amp;ssl=1 1003w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=300%2C150&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclea8.png?resize=768%2C384&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/7ly2e3dohbw5lhf/aclextendida5.pkt?dl=0" target="_blank">ACL Extendida 5</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/4pgucdind0mor1x/aclextendida6.pkt?dl=0" target="_blank">ACL Extendida 6</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/uy921sd6r3vp77q/aclextendida7.pkt?dl=0" target="_blank">ACL Extendida 7</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/6ecxoicmlkzcblx/aclextendida8.pkt?dl=0" target="_blank">ACL Extendida 8</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-iii">Access Lists extendidas Cisco III</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-iii/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3982</post-id>	</item>
		<item>
		<title>Access Lists extendidas Cisco II</title>
		<link>https://blog.ragasys.es/access-lists-extendidas-cisco-ii</link>
					<comments>https://blog.ragasys.es/access-lists-extendidas-cisco-ii#respond</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 05:46:27 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3976</guid>

					<description><![CDATA[<p>Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien&#8230; <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-ii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-ii">Access Lists extendidas Cisco II</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs extendidas, voy a subir cuatro actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACL extendidas filtran los paquetes IP en función de varios atributos, como por ejemplo, tipo de protocolo, direcciones IP de origen, direcciones IP de destino, puertos TCP o UDP de origen, puertos TCP o UDP de destino e información opcional de tipo de protocolo para un control más exhasutivo.</p>
<ul>
<li>Actividad 1: Bloquear la comunicación entre los servidores</li>
<li>Topología actividad 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png" data-lbwps-width="994" data-lbwps-height="427" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3977" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?fit=994%2C427&amp;ssl=1" data-orig-size="994,427" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?fit=640%2C275&amp;ssl=1" class="aligncenter size-full wp-image-3977" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=640%2C275" alt="acle2a1" width="640" height="275" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?w=994&amp;ssl=1 994w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=300%2C129&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a1.png?resize=768%2C330&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Bloquear el tráfico entre los PCs</li>
<li>Topología actividad 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png" data-lbwps-width="1002" data-lbwps-height="489" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3978" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?fit=1002%2C489&amp;ssl=1" data-orig-size="1002,489" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?fit=640%2C312&amp;ssl=1" class="aligncenter size-full wp-image-3978" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=640%2C312" alt="acle2a2" width="640" height="312" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?w=1002&amp;ssl=1 1002w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=300%2C146&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a2.png?resize=768%2C375&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Bloquear el protocolo ICMP entre equipos</li>
<li>Topología actividad 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png" data-lbwps-width="995" data-lbwps-height="442" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3979" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?fit=995%2C442&amp;ssl=1" data-orig-size="995,442" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?fit=640%2C284&amp;ssl=1" class="aligncenter size-full wp-image-3979" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=640%2C284" alt="acle2a3" width="640" height="284" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=300%2C133&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a3.png?resize=768%2C341&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 4: Bloquear el protocolo ICMP a los servidores</li>
<li>Topología actividad 4:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png" data-lbwps-width="995" data-lbwps-height="423" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3980" data-permalink="https://blog.ragasys.es/access-lists-extendidas-cisco-ii/acle2a4#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?fit=995%2C423&amp;ssl=1" data-orig-size="995,423" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="acle2a4" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?fit=640%2C272&amp;ssl=1" class="aligncenter size-full wp-image-3980" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=640%2C272" alt="acle2a4" width="640" height="272" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?w=995&amp;ssl=1 995w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=300%2C128&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/acle2a4.png?resize=768%2C326&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/h0ctgzwxcaqv8wf/aclextendida1.pkt?dl=0" target="_blank">ACL Extendida 1</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/5ovbbp00j8yux1a/aclextendida2.pkt?dl=0" target="_blank">ACL Extendida 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/95xqsb4izyz5szo/aclextendida3.pkt?dl=0" target="_blank">ACL Extendida 3</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/jr2ceruy9f1ss70/aclextendida4.pkt?dl=0" target="_blank">ACL Extendida 4</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-extendidas-cisco-ii">Access Lists extendidas Cisco II</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-extendidas-cisco-ii/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3976</post-id>	</item>
		<item>
		<title>Access Lists estándar Cisco II</title>
		<link>https://blog.ragasys.es/access-lists-estandar-cisco-ii</link>
					<comments>https://blog.ragasys.es/access-lists-estandar-cisco-ii#comments</comments>
		
		<dc:creator><![CDATA[Jose Ramon Ramos Gata]]></dc:creator>
		<pubDate>Mon, 22 Aug 2016 08:03:22 +0000</pubDate>
				<category><![CDATA[ACL]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Switching]]></category>
		<category><![CDATA[IOS Cisco]]></category>
		<category><![CDATA[Packet Tracer]]></category>
		<category><![CDATA[Router Cisco]]></category>
		<category><![CDATA[Routing & Switching]]></category>
		<guid isPermaLink="false">http://blog.ragasys.es/?p=3970</guid>

					<description><![CDATA[<p>Hola a tod@s. En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy&#8230; <a href="https://blog.ragasys.es/access-lists-estandar-cisco-ii" class="more-link">Continuar leyendo <span class="meta-nav">&#8594;</span></a></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-estandar-cisco-ii">Access Lists estándar Cisco II</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hola a tod@s.</p>
<p>En esta entrada vamos a ver un poco de ACLs (Listas de control de acceso), en este caso ACLs estándar, voy a subir tres actividades con este tipo de listas de control de acceso, les vendrán muy bien a los estudiantes del CCNA para prácticar.</p>
<p>Las ACLs estándar permiten autorizar o denegar el tráfico desde las direcciones IP de origen, no importan el destino del paquete ni los puertos involucrados.</p>
<ul>
<li>Actividad 1: Prohibir el acceso desde el PC0 a la red 30.0.0.0/8 y permitir todo lo demás</li>
<li>Topología actividad 1:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png" data-lbwps-width="1012" data-lbwps-height="475" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3971" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a1#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?fit=1012%2C475&amp;ssl=1" data-orig-size="1012,475" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a1" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?fit=640%2C300&amp;ssl=1" class="aligncenter size-full wp-image-3971" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=640%2C300" alt="aclstd2a1" width="640" height="300" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?w=1012&amp;ssl=1 1012w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=300%2C141&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a1.png?resize=768%2C360&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 2: Bloquear el acceso a los equipos 30.0.0.30 Y 30.0.0.31 a la red exterior</li>
<li>Topología actividad 2:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png" data-lbwps-width="959" data-lbwps-height="447" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3972" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a2#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?fit=959%2C447&amp;ssl=1" data-orig-size="959,447" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a2" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?fit=640%2C298&amp;ssl=1" class="aligncenter size-full wp-image-3972" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=640%2C298" alt="aclstd2a2" width="640" height="298" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?w=959&amp;ssl=1 959w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=300%2C140&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a2.png?resize=768%2C358&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<ul>
<li>Actividad 3: Bloquear el acceso al exterior del equipo 20.0.0.20 y 30.0.030</li>
<li>Topología actividad 3:</li>
</ul>
<p><a href="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png" data-lbwps-width="999" data-lbwps-height="434" data-lbwps-srcsmall="https://blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png"><img data-recalc-dims="1" loading="lazy" decoding="async" data-attachment-id="3973" data-permalink="https://blog.ragasys.es/access-lists-estandar-cisco-ii/aclstd2a3#main" data-orig-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?fit=999%2C434&amp;ssl=1" data-orig-size="999,434" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="aclstd2a3" data-image-description="" data-image-caption="" data-large-file="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?fit=640%2C278&amp;ssl=1" class="aligncenter size-full wp-image-3973" src="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=640%2C278" alt="aclstd2a3" width="640" height="278" srcset="https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?w=999&amp;ssl=1 999w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=300%2C130&amp;ssl=1 300w, https://i0.wp.com/blog.ragasys.es/wp-content/uploads/2016/08/aclstd2a3.png?resize=768%2C334&amp;ssl=1 768w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></p>
<p>Para poder ver el diseño lógico y físico de la red necesitaréis el software packet tracer.</p>
<ul>
<li>Link de descarga actividad 1: <a href="https://www.dropbox.com/s/hyn6vhy9dobuhnj/aclestandar1.pkt?dl=0" target="_blank">ACL Standard 1</a></li>
<li>Link de descarga actividad 2: <a href="https://www.dropbox.com/s/q03bz8nlq4b7frl/aclestandar2.pkt?dl=0" target="_blank">ACL Standard 2</a></li>
<li>Link de descarga actividad 3: <a href="https://www.dropbox.com/s/yd34293j91sfvuw/aclestandar3.pkt?dl=0" target="_blank">ACL Standard 3</a></li>
</ul>
<p>Actividades propuestas por el profesor Manuel Castaño Guillén.</p>
<p>Saludos y espero que os sea de ayuda <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>La entrada <a href="https://blog.ragasys.es/access-lists-estandar-cisco-ii">Access Lists estándar Cisco II</a> se publicó primero en <a href="https://blog.ragasys.es">RAGASYS SISTEMAS</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.ragasys.es/access-lists-estandar-cisco-ii/feed</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3970</post-id>	</item>
	</channel>
</rss>
