Configuring Standard ACLs in Cisco Routers
Nerd cafe
Introduction to Standard ACLs
Access Control Lists (ACLs) in Cisco routers are used to filter traffic based on defined rules. A Standard ACL is a simple form of ACL that filters traffic based on source IP addresses only. It does not consider destination IP or other criteria.
In this guide, we will:
Understand the concept of Standard ACLs
Set up a practical GNS3 lab scenario
Configure Standard ACLs step by step
Test and verify the configuration
Step 1: Lab Topology in GNS3
We will simulate a small network using 1 router, 1 switch and 2 PCs.
Network Topology:

Objective:
Allow PC1 (192.168.1.100) to access Router (R1).
Deny PC2 (192.168.1.200) from reaching Router (R1).
Step 2: GNS3 Device Configuration
Assign IP addresses to the interfaces of Router (R1)
R1#configure terminal
R1(config)#interface fastEthernet 0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shutdown
Step 3: Configuring Standard ACL on Router1
Create an ACL to allow PC1 and deny PC2
R1(config)#access-list 10 permit 192.168.1.100 0.0.0.0
R1(config)#access-list 10 deny 192.168.1.200 0.0.0.0
R1(config)#access-list 10 permit any
Explanation:
access-list 10 permit 192.168.1.100 0.0.0.0
→ Allows PC1 to communicateaccess-list 10 deny 192.168.1.200 0.0.0.0
→ Blocks PC2 from communicationaccess-list 10 permit any
→ Ensures all other traffic is allowed
Apply the ACL to the interface
R1(config)#interface fastEthernet 0/0
R1(config-if)#ip access-group 10 in
Explanation:
ip access-group 10 in
→ Applies ACL 10 to incoming traffic on FastEthernet0/0.
Step 4: Verifying the Configuration
Check the ACL
R1#show access-lists
Standard IP access list 10
10 permit 192.168.1.100
20 deny 192.168.1.200
30 permit any
R1#
Test connectivity
PC1 should be able to PING Router (R1)
PC1> ping 192.168.1.1
84 bytes from 192.168.1.1 icmp_seq=1 ttl=255 time=9.702 ms
84 bytes from 192.168.1.1 icmp_seq=2 ttl=255 time=9.840 ms
^C
PC1>
PC2 should NOT be able to PING Router1
PC2> ping 192.168.1.1
*192.168.1.1 icmp_seq=1 ttl=255 time=11.651 ms (ICMP type:3, code:13, Communication administratively prohibited)
*192.168.1.1 icmp_seq=2 ttl=255 time=5.817 ms (ICMP type:3, code:13, Communication administratively prohibited)
*192.168.1.1 icmp_seq=3 ttl=255 time=3.315 ms (ICMP type:3, code:13, Communication administratively prohibited)
^C
PC2>
Keywords
Standard ACL
, Cisco ACL
, Access Control List
, Cisco Router
, IP filtering
, network security
, CCNA
, GNS3 simulation
, ACL configuration
, permit IP
, deny IP
, Cisco commands
, access-list 10
, router security
, packet filtering
, subnet ACL
, IP access-group
, inbound ACL
, network filtering
, ACL verification
, سیسکو
Last updated