192.168.10.10/24 (GW em branco)192.168.10.101/24192.168.10.102/24192.168.10.10 / máscara 255.255.255.0.index.html com uma mensagem de teste.)http://192.168.10.10.PC1 → Command Prompt: ping 192.168.10.10 deve responder.192.168.20.1/24192.168.20.10/24, GW 192.168.20.1192.168.20.10, máscara /24, Gateway 192.168.20.1.LAN20192.168.20.1192.168.20.10192.168.20.100255.255.255.051 (gera faixa .100-.150)www.empresa.localA192.168.20.10192.168.20.x, GW 192.168.20.1, DNS 192.168.20.10.ping 192.168.20.10 e ping 192.168.20.1.http://www.empresa.local → deve abrir a página do servidor.192.168.10.0/24 (GW 192.168.10.1)192.168.20.0/24 (GW 192.168.20.1)192.168.30.0/24 (GW 192.168.30.1)192.168.30.10/24, GW 192.168.30.1enable
configure terminal
vlan 10
name CLIENTES10
vlan 20
name CLIENTES20
vlan 30
name SERVIDORES
!
interface range fa0/1-2
switchport mode access
switchport access vlan 10
interface range fa0/3-4
switchport mode access
switchport access vlan 20
interface fa0/5
switchport mode access
switchport access vlan 30
!
interface fa0/24
switchport mode trunk
exit
wr
enable
configure terminal
interface g0/0.10
encapsulation dot1Q 10
ip address 192.168.10.1 255.255.255.0
interface g0/0.20
encapsulation dot1Q 20
ip address 192.168.20.1 255.255.255.0
interface g0/0.30
encapsulation dot1Q 30
ip address 192.168.30.1 255.255.255.0
!
interface g0/0
no shutdown
exit
wr
192.168.10.101/102 (GW 192.168.10.1)192.168.20.101/102 (GW 192.168.20.1)192.168.30.10 (GW 192.168.30.1), Services → HTTP: On.ping 192.168.30.10 e abrir http://192.168.30.10.192.168.30.10.Estratégia simples: aplicar ACL apenas na subinterface da VLAN 20, negando HTTP ao servidor.
enable
configure terminal
ip access-list extended BLOQUEIO_V20_HTTP
deny tcp any host 192.168.30.10 eq 80
permit ip any any
!
interface g0/0.20
ip access-group BLOQUEIO_V20_HTTP in
exit
wr
http://192.168.30.10 → DEVE abrir. ping 192.168.30.10 → ok.http://192.168.30.10 → NÃO deve abrir. ping 192.168.30.10 → ok.g0/0.20 (tráfego entrando do VLAN20).permit ip any any após a negação específica.192.168.50.1/24)198.51.100.2/30)198.51.100.1/30 (para R1)200.200.200.1/24 (para rede “Internet”)200.200.200.10/24, GW 200.200.200.1192.168.50.100/24 (GW 192.168.50.1)enable
configure terminal
interface g0/0
ip address 192.168.50.1 255.255.255.0
ip nat inside
no shutdown
interface g0/1
ip address 198.51.100.2 255.255.255.252
ip nat outside
no shutdown
!
ip access-list standard LAN_INSIDE
permit 192.168.50.0 0.0.0.255
!
ip nat inside source list LAN_INSIDE interface g0/1 overload
!
ip route 0.0.0.0 0.0.0.0 198.51.100.1
exit
wr
enable
configure terminal
interface g0/0
ip address 198.51.100.1 255.255.255.252
no shutdown
interface g0/1
ip address 200.200.200.1 255.255.255.0
no shutdown
!
ip route 192.168.50.0 255.255.255.0 198.51.100.2
exit
wr
200.200.200.10/24, GW 200.200.200.1ping 200.200.200.10 (deve responder).http://200.200.200.10 (deve abrir).show ip nat translations → deve exibir mapeamentos inside local → inside global.192.168.50.0/24.ip nat inside/outside nas interfaces corretas e a ACL de origem..pkt (Ex1_v1, Ex1_v2…).




