Showing posts with label CCNA Security. Show all posts
Showing posts with label CCNA Security. Show all posts

Thursday, 5 March 2026

Traffic Filtering on Cisco Routers & Firewalls | Networking Faisalabad

Traffic Filtering Using Cisco Router & Firewall - Layer 2, 3, 4 Security Training by Saeed Ahmad

Traffic Filtering Using Cisco Router & Firewall

Master Layer 2, 3, 4 Filtering • ACLs • Zone-Based Firewall • CBAC

๐ŸŽ“ Learn from Saeed Ahmad | Real CLI Labs | Security Troubleshooting

๐Ÿ“
Online & In-Person Classes
Available Worldwide | Faisalabad Campus

๐Ÿ” What is Traffic Filtering in Cisco Networks?

Traffic filtering is a fundamental security practice that controls data flow across network devices by permitting or denying packets based on predefined rules. In Cisco environments, filtering operates at multiple OSI layers: Layer 2 (MAC addresses), Layer 3 (IP addresses), and Layer 4 (TCP/UDP ports) to enforce security policies, prevent unauthorized access, and mitigate threats.

Our CCNA/CCNP Security Training by Saeed Ahmad provides hands-on mastery of Cisco traffic filtering techniques including Standard/Extended ACLs, MAC ACLs, Zone-Based Policy Firewall (ZBF), Context-Based Access Control (CBAC), and essential troubleshooting commands to verify and debug filtering policies in real-world scenarios.

๐ŸŽฏ What You'll Learn in Traffic Filtering Course

๐Ÿ”—

Layer 2 Filtering

MAC address ACLs, port-security, VLAN ACLs (VACLs) to control traffic at the data link layer.

๐ŸŒ

Layer 3 ACLs

Standard & Extended IP ACLs: filter by source/destination IP, wildcard masks, logging, time-ranges.

Layer 4 Port Filtering

TCP/UDP port-based filtering, established keyword, reflexive ACLs for stateful inspection basics.

๐Ÿ›ก️

Zone-Based Firewall (ZBF)

Modern Cisco firewall policy: zones, zone-pairs, policy-maps, inspect/ drop/ pass actions.

๐Ÿ”

Verification & Troubleshooting

Essential show/debug commands: show access-lists, show zone-pair security, packet-tracer, logging analysis.

๐Ÿงช

Real-World Lab Scenarios

Practice filtering DMZ traffic, block malicious IPs, permit only authorized services, simulate attacks & defenses.

๐Ÿ“š Traffic Filtering Techniques by OSI Layer

๐Ÿ”— Layer 2 Filtering (Data Link)

Use Cases: Prevent MAC spoofing, restrict devices per switch port, isolate VLAN traffic.

Key Commands:
! MAC ACL Creation
Switch(config)# mac access-list extended BLOCK-MAC
Switch(config-ext-macl)# deny host aaaa.bbbb.cccc any
Switch(config-ext-macl)# permit any any

! Apply to Interface
Switch(config-if)# mac access-group BLOCK-MAC in

! Port Security
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 2
Switch(config-if)# switchport port-security violation restrict

๐ŸŒ Layer 3 Filtering (Network)

Use Cases: Block malicious subnets, permit only trusted networks, implement network segmentation.

Standard ACL (Source IP only):
Router(config)# access-list 10 permit 192.168.1.0 0.0.0.255
Router(config)# access-list 10 deny any
Router(config-if)# ip access-group 10 in

Extended ACL (Source/Dest/Protocol):
Router(config)# access-list 100 permit tcp 192.168.10.0 0.0.0.255 host 203.0.113.5 eq 443
Router(config)# access-list 100 deny ip any any log
Router(config-if)# ip access-group 100 out

Time-Based ACL:
Router(config)# time-range WORK-HOURS
Router(config-time-range)# periodic weekdays 9:00 to 17:00
Router(config)# access-list 110 permit tcp any any eq 80 time-range WORK-HOURS

⚡ Layer 4 Filtering (Transport)

Use Cases: Allow HTTP/HTTPS only, block P2P ports, permit established return traffic.

Port-Based Filtering:
Router(config)# access-list 120 permit tcp any any eq 22
Router(config)# access-list 120 permit tcp any any eq 443
Router(config)# access-list 120 deny tcp any any range 1 1023
Router(config)# access-list 120 permit udp any any eq 53

Established Keyword (Stateful-like):
Router(config)# access-list 130 permit tcp any any established
! Allows return traffic for sessions initiated from inside

Reflexive ACL (Basic Stateful):
Router(config)# ip access-list extended OUTBOUND
Router(config-ext-nacl)# permit tcp 192.168.1.0 0.0.0.255 any reflect USER-TRAFFIC
Router(config)# ip access-list extended INBOUND
Router(config-ext-nacl)# evaluate USER-TRAFFIC

๐Ÿ›ก️ Zone-Based Policy Firewall (Advanced)

Modern Approach: Define security zones, create zone-pairs, apply policy-maps with inspect/drop/pass actions.

ZBF Configuration Steps:
! 1. Define Zones
Router(config)# zone security INSIDE
Router(config)# zone security OUTSIDE
Router(config)# zone security DMZ

! 2. Assign Interfaces to Zones
Router(config-if)# zone-member security INSIDE

! 3. Create Class-Maps (Traffic Classification)
Router(config)# class-map type inspect match-any WEB-TRAFFIC
Router(config-cmap)# match protocol http
Router(config-cmap)# match protocol https

! 4. Create Policy-Map (Actions)
Router(config)# policy-map type inspect INSIDE-OUT
Router(config-pmap)# class type inspect WEB-TRAFFIC
Router(config-pmap-c)# inspect
Router(config-pmap-c)# class class-default
Router(config-pmap-c)# drop

! 5. Apply to Zone-Pair
Router(config)# zone-pair security INSIDE-OUT source INSIDE destination OUTSIDE
Router(config-zone-pair)# service-policy type inspect INSIDE-OUT

๐Ÿ”ง Essential Commands: Verify & Troubleshoot Filtering

✅ Verification Commands

ACL Verification:
Router# show access-lists [ACL-NUMBER] ! View ACL entries & hit counts
Router# show ip interface [interface] ! Check applied ACLs per interface
Router# show running-config | section access-list ! Filter ACL config

Zone-Based Firewall:
Router# show zone-pair security ! View active zone-pairs
Router# show policy-map type inspect zone-pair [name] ! Show policy actions
Router# show class-map type inspect ! List traffic classes

Layer 2 Filtering:
Switch# show mac access-group ! Display MAC ACL assignments
Switch# show port-security interface [interface] ! Port-security status
Switch# show vlan access-map ! VACL configuration

Packet Testing:
Router# ping [ip] source [interface] ! Test connectivity with source IP
Router# telnet [ip] [port] source [interface] ! Test TCP port access
Router# debug ip packet [ACL-NUMBER] detail ! Real-time packet debugging*
*Use debug commands cautiously in production!

๐Ÿšจ Troubleshooting Checklist

  • ACL not working? → Check direction (in/out), interface assignment, implicit deny at end
  • Hit counts not increasing? → Verify traffic matches ACL criteria; use log keyword for visibility
  • ZBF dropping legitimate traffic? → Confirm zone assignments, policy-map actions, inspect vs pass
  • Port-security blocking devices? → Check violation mode (shutdown/restrict/protect), MAC table
  • Logging not showing? → Enable logging buffered or syslog server; verify ACL has log keyword
  • Performance impact? → Place most-specific ACEs first; avoid excessive logging; use hardware ACLs if available

๐Ÿ† Why Learn Traffic Filtering with CCNAGuru Saeed Ahmad

๐Ÿ‘จ‍๐Ÿ’ป Security-Focused Instructor

Saeed Ahmad specializes in Cisco security implementations with real enterprise firewall & ACL deployments.

๐Ÿ”ฌ Live CLI Labs

Configure ACLs, ZBF, and troubleshooting on real Cisco IOS devices—not just theory or simulators.

๐Ÿ“œ CCNA/CCNP Security Prep

Aligned with Cisco exam objectives: security fundamentals, ACLs, firewall technologies, troubleshooting.

๐Ÿ›ก️ Threat Simulation Labs

Practice defending against spoofing, DoS, unauthorized access using realistic attack scenarios.

๐Ÿ• Flexible Learning

Morning/evening/weekend batches. Online sessions recorded for lifetime access + offline labs in Faisalabad.

๐ŸŽฏ Job-Ready Skills

Graduates secure roles as Network Security Engineers, SOC Analysts, and Cisco Support Specialists.

๐Ÿ“‹ Traffic Filtering Course Curriculum

Module 1: Security Fundamentals & Threat Modeling
Module 2: Layer 2 Filtering: MAC ACLs & Port-Security
Module 3: Standard & Extended IP ACLs (Layer 3)
Module 4: Layer 4 Filtering: TCP/UDP Ports & Stateful Basics
Module 5: Zone-Based Policy Firewall (ZBF) Deep Dive
Module 6: Verification Commands & Logging Strategies
Module 7: Troubleshooting Methodologies & Debug Techniques
Module 8: Capstone Lab: Secure Enterprise Network Design

๐ŸŽ“ CCNA Training Investment

Complete CCNA Course

PKR 45,000
  • ✅ Full CCNA 200-301 Curriculum
  • ✅ Load Balancing & Redundancy Labs
  • ✅ Real Equipment Practice
  • ✅ Study Materials & Videos
  • ✅ Exam Preparation
Enroll Now
POPULAR

CCNA + Load Balancing Masterclass

PKR 55,000
  • ✅ Everything in CCNA Course
  • ✅ Advanced HSRP/VRRP/GLBP
  • ✅ ECMP & Traffic Engineering
  • ✅ 1-on-1 Mentoring Sessions
  • ✅ Job Placement Assistance
  • ✅ Certification Guarantee
Get Started

* Installment plans available | Free demo class | 100% money-back guarantee

❓ Frequently Asked Questions

Q: What's the difference between standard and extended ACLs?

Standard ACLs (1-99, 1300-1999) filter only by source IP address. Extended ACLs (100-199, 2000-2699) filter by source/destination IP, protocol, port numbers, and support advanced options like logging and time-ranges—making them far more granular for security policies.

Q: When should I use Zone-Based Firewall instead of ACLs?

Use ZBF for complex, stateful security policies requiring application awareness, multiple security zones (Inside/Outside/DMZ), and centralized policy management. ACLs remain ideal for simple, stateless filtering on routers or as a first line of defense.

Q: How do I verify if my ACL is actually blocking traffic?

Use show access-lists [number] to check hit counts on each ACE. If hits don't increment, traffic isn't matching that rule. Add the log keyword to generate syslog messages for matched packets. Use debug ip packet cautiously for real-time analysis in lab environments.

Q: Does this course cover Cisco ASA or only IOS routers?

This course focuses on IOS-based routers and switches (CCNA/CCNP level). We cover ASA concepts briefly for context, but deep ASA/FTD training is offered in our advanced CCNP Security & Firewall specialization course.

Secure Your Network with Cisco Traffic Filtering!

Join CCNAGuru Saeed Ahmad's hands-on training and master Layer 2/3/4 filtering, ACLs, Zone-Based Firewall, and professional troubleshooting techniques used by enterprise network engineers.

๐Ÿ“ Location: Online & Faisalabad Campus | ⏰ Timings: Flexible Batches
๐Ÿ” Search: Cisco traffic filtering course | ACL configuration training | Layer 2 3 4 security | CCNA firewall labs

๐ŸŽฏ Top-Rated Cisco Security Training in Pakistan

ACL Mastery
Zone-Based Firewall
Troubleshooting Pro
Job-Ready Skills

Share this course: