NetSim v14.4 Help

Contents:

  • Access Control Lists (ACLs)
    • Introduction
  • Virtual LAN (VLAN)
    • Introduction
      • When do we need a VLAN?
      • Understanding Access and Trunk Links
  • Public IP Address & NAT (Network Address Translation)
    • Introduction
      • Public Address
      • Private Address
      • Network address translation (NAT)
  • Featured Examples
    • Access Control Lists (ACLs) Examples
      • ACL Example
      • Result and Observations
  • Advanced Routing Experiments in NetSim
  • Reference Documents
  • Latest FAQs
NetSim v14.4 Help
  • Featured Examples

Featured Examples

Access Control Lists (ACLs) Examples

ACL Example

This example models a network and simulates an ACL to understand how ACL filters inbound and outbound traffic at a router’s interface.

The network modelled consists of:

  • Two subnets with 2 wired nodes, 1 router each and 3 applications.

  • ACLs with both permit and deny rules are defined on the interfaces of the router.

NetSim uses the following directions for ACL simulations:

  • The direction of the ACL is set to both. This means the ACL applies to both inbound and outbound traffic.

  • The direction of ACL is set to Inbound. This means the ACL applies to inbound traffic only.

  • The direction of ACL is set to Outbound. This means the ACL applies to outbound traffic only.

Open NetSim, Select Examples->Advanced routing->ACL Configuration then click on the tile in the middle panel to load the example as shown below in Figure-1.

_images/Figure-11.png

Figure-1: List of scenarios for the example of ACL Configuration

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file for ACL as shown Figure-2.

_images/Figure-21.png

Figure-2: Network set up for studying the ACL Configuration

  1. ACL enabled in Network Layer of Router 5 and were configured as follows as shown Figure-3.

_images/Figure-31.png

Figure-3: ACL Configuration for Router 5

  1. ACL enabled in Network Layer of Router 6 and were configured as follows as Figure-4.

_images/Figure-41.png

Figure-4: ACL Configuration for Router 6.

  1. Transport protocol set as UDP for APP_1_CBR and APP_3_CBR.

  2. Transport protocol set as TCP for APP_2_CBR.

  3. Run the Simulation for 10 seconds and observe the throughput obtained for the three applications.

Result and Observations

_images/Figure-51.png

Figure-5: Application Metrics Table in result window.

The throughput for first application is zero, since the ACL blocks OUTBOUND UDP traffic flow in Router 5 from Wired Node 2 to Wired Node 1

The throughput for second application is non-zero, since the ACL ‘Permits’ TCP traffic flow in Router 5 and Router6 from Wired Node 1 to Wired Node 3.

The throughput for the third application is non-zero as ACL ‘Permits’ UDP traffic flow in Route 6 from Wired Node 4 to Wired Node 2.

Previous Next

© Copyright 2025, TETCOS LLP.

Built with Sphinx using a theme provided by Read the Docs.