Lab Runbook: Configure Named Standard IPv4 ACLs
A step-by-step command reference for completing Cisco NetAcad Network Defense Lab 4.5.5 in Packet Tracer. Covers creating and applying a named standard ACL on R1 to restrict File Server access, with full command sets, expected outputs, and verification steps.
title: "Lab Runbook: Configure Named Standard IPv4 ACLs" description: "A step-by-step command reference for completing Cisco NetAcad Network Defense Lab 4.5.5 in Packet Tracer. Covers creating and applying a named standard ACL on R1 to restrict File Server access, with full command sets, expected outputs, and verification steps." date: "2026-05-04" category: "Networking" tags: ["ACL", "IPv4", "Cisco", "Packet Tracer", "Network Defense", "Access Control", "Security"] author: "Stephen Nnamani" readingTime: "8 min" image: "/images/blog/named-standard-ipv4-acl-topology.png"
About This Runbook
This is a step-by-step breakdown of the tasks required to complete Lab 4.5.5: Packet Tracer - Configure Named Standard IPv4 ACLs from the Cisco NetAcad Network Defense course. It is intended to help students who are struggling to work through the lab independently.
This runbook is text-only and will not be accompanied by a video explanation. It focuses purely on the commands and configuration sequence needed to reach a 100% score.
Educational Use Notice: This document is produced for non-profit and educational purposes only. All lab content, topology, and objectives are the intellectual property of Cisco Systems / Cisco Networking Academy. This runbook is shared in the spirit of peer learning and is not intended for commercial use.
Credits: Lab content sourced from Cisco Networking Academy (NetAcad), Network Defense course. Shared with fellow students of the Per Scholas cybersecurity programme.
Addressing Table
| Device | Interface | IP Address | Subnet Mask | Default Gateway | |---|---|---|---|---| | R1 | F0/0 | 192.168.10.1 | 255.255.255.0 | N/A | | R1 | F0/1 | 192.168.20.1 | 255.255.255.0 | N/A | | R1 | E0/0/0 | 192.168.100.1 | 255.255.255.0 | N/A | | R1 | E0/1/0 | 192.168.200.1 | 255.255.255.0 | N/A | | File Server | NIC | 192.168.200.100 | 255.255.255.0 | 192.168.200.1 | | Web Server | NIC | 192.168.100.100 | 255.255.255.0 | 192.168.100.1 | | PC0 | NIC | 192.168.20.3 | 255.255.255.0 | 192.168.20.1 | | PC1 | NIC | 192.168.20.4 | 255.255.255.0 | 192.168.20.1 | | PC2 | NIC | 192.168.10.3 | 255.255.255.0 | 192.168.10.1 |
Objectives
- Configure and apply a named standard ACL on R1
- Verify that the ACL permits only the correct hosts to reach the File Server
Background / Scenario
The senior network administrator has asked you to create a standard named ACL to protect the File Server. The File Server hosts the database for web applications and should only be accessible to two hosts: PC1 (the Web Manager workstation at 192.168.20.4) and the Web Server (at 192.168.100.100). All other traffic to the File Server must be denied.
Part 1: Configure and Apply a Named Standard ACL
Step 1: Verify Connectivity Before the ACL is Applied
Before configuring anything, confirm all three workstations can reach both servers. Open the command prompt on each PC and ping both server addresses.
From PC0 (192.168.20.3):
ping 192.168.100.100
ping 192.168.200.100
From PC1 (192.168.20.4):
ping 192.168.100.100
ping 192.168.200.100
From PC2 (192.168.10.3):
ping 192.168.100.100
ping 192.168.200.100
Expected output: All pings succeed. If any fail, check that the router interfaces are up and IP addresses match the addressing table before proceeding.
Step 2: Configure the Named Standard ACL on R1
Click on R1 in the topology and open the CLI tab.
R1> enable
R1# configure terminal
R1(config)# ip access-list standard File_Server_Restrictions
R1(config-std-nacl)# permit host 192.168.20.4
R1(config-std-nacl)# permit host 192.168.100.100
R1(config-std-nacl)# deny any
R1(config-std-nacl)# exit
What this does:
ip access-list standard File_Server_Restrictionscreates a named standard ACL. Standard ACLs filter based on source IP address only.permit host 192.168.20.4allows PC1 (the Web Manager workstation) through.permit host 192.168.100.100allows the Web Server through.deny anyblocks all other source addresses. This statement is explicit but Packet Tracer scores it as a required entry.
Important: The ACL name
File_Server_Restrictionsis case-sensitive. The permit and deny statements must be entered in this exact order. Both are scored.
Verify the ACL before applying it:
R1# show access-lists
Expected output:
Standard IP access list File_Server_Restrictions
10 permit host 192.168.20.4
20 permit host 192.168.100.100
30 deny any
If the IPs are wrong or the order is different, delete the ACL and re-enter it:
R1(config)# no ip access-list standard File_Server_RestrictionsThen repeat Step 2 from the beginning.
Step 3: Apply the Named ACL to the Interface
Apply the ACL outbound on the F0/1 interface:
R1# configure terminal
R1(config)# interface f0/1
R1(config-if)# ip access-group File_Server_Restrictions out
R1(config-if)# end
What this does: Attaches the ACL to the outbound direction of F0/1. Traffic leaving R1 through this interface will be checked against the ACL before being forwarded.
Note: In a production network, applying an ACL to an active interface without a maintenance window is not recommended. In this lab environment it is safe to apply directly.
Save the configuration:
R1# copy running-config startup-config
Part 2: Verify the ACL Implementation
Step 1: Confirm ACL Configuration and Interface Binding
R1# show access-lists
R1# show ip interface f0/1
In the output of show ip interface f0/1, look for:
Outgoing access list is File_Server_Restrictions
This confirms the ACL is bound to the correct interface in the correct direction.
Step 2: Verify ACL Behaviour
Test from each workstation to confirm the ACL is working as intended.
From PC0 (192.168.20.3) — should be blocked from File Server:
ping 192.168.100.100 (Web Server — should succeed)
ping 192.168.200.100 (File Server — should fail)
From PC1 (192.168.20.4) — should reach both servers:
ping 192.168.100.100 (Web Server — should succeed)
ping 192.168.200.100 (File Server — should succeed)
From PC2 (192.168.10.3) — should be blocked from File Server:
ping 192.168.100.100 (Web Server — should succeed)
ping 192.168.200.100 (File Server — should fail)
After testing, run show access-lists again to see the match counters:
R1# show access-lists
Each statement will show how many packets matched it, confirming the ACL is actively filtering traffic.
Quick Reference: What the ACL Permits and Denies
| Source Host | IP Address | File Server Access | Web Server Access | |---|---|---|---| | PC1 (Web Manager) | 192.168.20.4 | Permitted | Permitted | | Web Server | 192.168.100.100 | Permitted | N/A | | PC0 | 192.168.20.3 | Denied | Permitted | | PC2 | 192.168.10.3 | Denied | Permitted |
Complete Command Summary
enable
configure terminal
ip access-list standard File_Server_Restrictions
permit host 192.168.20.4
permit host 192.168.100.100
deny any
exit
interface f0/1
ip access-group File_Server_Restrictions out
end
copy running-config startup-config
Completion Check
When done, click Check Results in the lab interface. Your score should be 100%.
If not 100%, the most common issues are:
- ACL name typed incorrectly (
File_Server_Restrictionsis case-sensitive) - Permit statements entered in the wrong order (PC1 must come before Web Server)
deny anystatement missing (Packet Tracer scores this explicitly)- ACL applied to the wrong interface or wrong direction (must be outbound on F0/1)
ip access-groupcommand missing from the interface entirely