{"id":2113,"date":"2017-12-17T19:20:13","date_gmt":"2017-12-17T10:20:13","guid":{"rendered":"https:\/\/blog.boxcorea.com\/wp\/?p=2113"},"modified":"2017-12-17T19:23:27","modified_gmt":"2017-12-17T10:23:27","slug":"gns3-labs-cisco-access-list","status":"publish","type":"post","link":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113","title":{"rendered":"[GNS3 Labs. &#8211; Cisco] Access List"},"content":{"rendered":"<p>Cisco ACL(access list) \ub9cc\ub4e4\uae30.<\/p>\n<p>access list\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \ud328\ud0b7\uc744 \ube44\uad50 \ubd84\ub958 \ucc98\ub9ac\ud558\ub294 \ud328\ud0b7 \ud544\ud130\uc774\uba70, \ub9ac\uc2a4\ud2b8\uac00 \uc791\uc131\ub418\uba74 \uc778\ud130\ud398\uc774\uc2a4\uc758 inbound \ub610\ub294 outbound \ud2b8\ub798\ud53d\uc5d0 \uc801\uc6a9\ud560 \uc218 \uc788\ub2e4.<br \/>\nACL\uc744 \uc801\uc6a9\ud558\uba74 \uc9c0\uc815\ub41c \uc778\ud130\ud398\uc774\uc2a4\uc5d0\uc11c \uadf8 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\uacfc\ud558\ub294 \ubaa8\ub4e0 \ud328\ud0b7\uc744 \uac80\uc0ac\ud558\uace0 \uc870\uce58\ub97c \ucde8\ud558\uac8c \ub41c\ub2e4.<\/p>\n<p>\ud328\ud0b7\uc774 ACL\uacfc \ube44\uad50\ub420 \ub54c\uc758 \uc138\uac00\uc9c0 \uaddc\uce59<br \/>\n. \ud328\ud0b7\uc740 \ud56d\uc0c1 acl\uacfc \uc21c\uc11c\ub300\ub85c \ube44\uad50\ub41c\ub2e4.<br \/>\n. \ud328\ud0b7\uc740 \uaddc\uce59\uacfc \uc77c\uce58\ub420\ub54c \uae4c\uc9c0\ub9cc \ube44\uad50\ub418\uace0 \uc77c\uce58\ub41c \uc774\ud6c4\ub294 \ube44\uad50\ub418\uc9c0 \uc54a\ub294\ub2e4.<br \/>\n. acl \ub05d\uc5d0\ub294 \uc554\ubb35\uc801\uc73c\ub85c &#8216;deny&#8217;\uac00 \uc788\ub2e4. \uc989 \ud328\ud0b7\uc774 \ubaa8\ub4e0 \uc870\uac74\uacfc \uc77c\uce58\ud558\uc9c0 \uc54a\uc73c\uba74 \ud3d0\uae30\ub41c\ub2e4.<\/p>\n<p>ACL \uc885\ub958<br \/>\n. Standard access list &#8211; \ud2b8\ub798\ud53d \uc885\ub958\uc640 \uad00\uacc4\uc5c6\uc774 source IP \uc8fc\uc18c\ub9cc \uc870\uac74 \ud3c9\uac00\uc5d0 \uc774\uc6a9\ud55c\ub2e4.<br \/>\n. Extend access list &#8211; L3 \ub610\ub294 L4 IP \ud328\ud0b7\uc758 \ud5e4\ub354\ub85c \uc870\uac74\uc744 \ud3c9\uac00\ud55c\ub2e4.<br \/>\n. Named access list &#8211; standard \ub610\ub294 extend access list\uc5d0 \uc774\ub984\uc744 \ubd99\uc778\uac83.<\/p>\n<p>ACL\uc744 \ud328\ud0b7 \ud544\ud130\ub85c \uc774\uc6a9\ud558\ub824\uba74 \ud2b8\ub9ac\ud329\uc744 \ud544\ud130\ud558\ub824\ub294 \ub77c\uc6b0\ud130\uc758 \uc778\ud130\ud398\uc774\uc2a4\uc5d0 \uc801\uc6a9\ud574\uc57c\ud55c\ub2e4. \ub610\ud55c \ud2b8\ub798\ud53d \ubc29\ud5a5\uc744 \uc9c0\uc815\ud574\uc57c\ud55c\ub2e4.<br \/>\n. inbound acl &#8211; acl\uc774 \uc778\ud130\ud398\uc774\uc2a4\uc758 inbound \ud328\ud0b7\uc5d0 \uc801\uc6a9\ub418\uc5c8\uc744\ub54c,  \uadf8 \ud328\ud0b7\uc740 outbound \uc778\ud130\ud398\uc774\uc2a4\ub85c \ub77c\uc6b0\ud305 \ub418\uae30 \uc804\uc5d0 acl\uc5d0 \uc758\ud574 \ucc98\ub9ac\ub41c\ub2e4.\uac70\ubd80\ub41c \ud328\ud0b7\uc740 \ub77c\uc6b0\ud305\uc804\uc5d0 \ud3d0\uae30\ub41c\ub2e4.<br \/>\n. outbound acl &#8211; acl\uc774 \uc778\ud130\ud398\uc774\uc2a4\uc758 outbound \ud328\ud0b7\uc5d0 \uc801\uc6a9\ub418\uc5c8\uc744\ub54c, \uadf8 \ud328\ud0b7\uc740 outbound \uc778\ud130\ud398\uc774\uc2a4\ub85c \ub77c\uc6b0\ud305 \ub41c \ud6c4 \ub2e4\uc74c \ub300\uae30\uc5f4\uc5d0 \ub4e4\uc5b4\uac00\uae30\uc804\uc5d0 acl\uc5d0 \uc758\ud574 \ucc98\ub9ac\ub41c\ub2e4.<\/p>\n<p><!--more--><\/p>\n<p>acl \ub9cc\ub4e4\ub54c\uc758 \uc9c0\uce68.<br \/>\n. \ud558\ub098\uc758 acl\uc5d0\ub294 \ud558\ub098\uc758 \uc778\ud130\ud398\uc774\uc2a4, \ubc29\ud5a5 \ud504\ub85c\ud1a0\ucf5c\ub9cc \ud560\ub2f9\ud560 \uc218 \uc788\ub2e4.<br \/>\n. \ubcf4\ub2e4 \uc138\ubc00\ud55c \ub8f0\uc744 \ub9e8 \uc704\uc5d0 \uc791\uc131\ud55c\ub2e4.<br \/>\n. acl \uc5d0\uc11c \ud55c \uc904\uc744 \uc81c\uac70\ud560 \uc218\uc5c6\uace0 \uc774\ub97c \uc2dc\ub3c4\ud558\uba74 \uc804\uccb4 acl\uc774 \uc0ad\uc81c\ub418\ubbc0\ub85c, \ud14d\uc2a4\ud2b8 \ud3b8\uc9d1\uae30\ub85c \ubbf8\ub9ac \uc791\uc131\ud574\ub450\ub294 \uac83\uc774 \uc88b\ub2e4.<br \/>\n. acl\uc774 permit any \uba85\ub839\uc73c\ub85c \ub05d\ub098\uc9c0 \uc54a\uc73c\uba74, \ubaa8\ub4e0 \ud328\ud0b7\uc740 acl \uc911 \ud558\ub098\ub97c \ub9cc\uc871\ud558\uc9c0 \uc54a\uc73c\uba74 \ud3d0\uae30\ub41c\ub2e4.<br \/>\n. acl\uc744 \ub9cc\ub4e0\ub2e4\uc74c \uc778\ud130\ud398\uc774\uc2a4\uc5d0 \uc801\uc6a9\ud55c\ub2e4.<br \/>\n. acl\uc740 \ub77c\uc6b0\ud130\ub97c \uc9c0\ub098\uac00\ub294 \ud2b8\ub798\ud53d\uc744 \ud544\ud130\ud558\ub3c4\ub85d \uc124\uacc4\ub418\uc5c8\ub2e4. \uadf8\ub798\uc11c \ub77c\uc6b0\ud130\uc5d0\uc11c \ubc1c\uc0dd\ud558\ub294 \ud2b8\ub798\ud53d\uc740 \ud544\ud130\ud558\uc9c0 \uc54a\ub294\ub2e4.<br \/>\n. IP standard acl\uc740 \ubaa9\uc801\uc9c0\uc5d0 \uac00\ub2a5\ud55c \uac00\uae4c\uc774 \ubc30\uce58\ud55c\ub2e4.<br \/>\n. IP extended acl\uc740 \ubc1c\uc2e0\uc9c0\uc5d0 \uac00\ub2a5\ud55c \uac00\uae4c\uc774 \ubc30\uce58\ud55c\ub2e4.<\/p>\n<p>ACL\ub85c \uac10\uc18c\uc2dc\ud0ac \uc218 \uc788\ub294 \ubcf4\uc548\ubb38\uc81c<br \/>\nIP address spoofing, inbound<br \/>\n. IP address spoofing, outbound<br \/>\n. Denial of service (DoS) TCP SYN attacks, blocking external attacks<br \/>\n. DoS TCP SYN attacks, using TCP Intercept<br \/>\n. DoS smurf attacks<br \/>\n. Denying\/filtering ICMP messages, inbound<br \/>\n. Denying\/Filtering ICMP messages, outbound<br \/>\n. Denying\/Filtering Tracerou<\/p>\n<p>\ub0b4\ubd80\ub124\ud2b8\uc6cc\ud06c\ub098 \ud638\uc2a4\ud2b8\uc758 source \uc8fc\uc18c\ub97c \ud3ec\ud568\ud55c \uc678\ubd80 IP\ud328\ud0b7\uc744 \uc0ac\uc124\ub124\ud2b8\uc6cc\ud06c\uc5d0 \ud5c8\uc6a9\ud558\ub294\uac83\uc740 \ubcf4\ud1b5 \uc88b\uc740 \uc0dd\uac01\uc740 \uc544\ub2c8\ub2e4. \ub2e4\uc74c\uc740 \ubcf4\uc548 \ubb38\uc81c\ub97c \uac10\uc18c\ud558\uae30 \uc704\ud574 \uc778\ud130\ub137\uc5d0\uc11c \ub0b4 \ub124\ud2b8\uc6cc\ud06c\ub85c \ub4e4\uc5b4\uc624\ub294 ACL\uc744 \uc124\uc815\ud558\uae30\uc704\ud55c  \uaddc\uce59\uc774\ub2e4.<\/p>\n<p>. \ub0b4\ubd80\ub124\ud2b8\uc6cc\ud06c\uc758 \ubaa8\ub4e0 \ubc1c\uc2e0\uc9c0 \uc8fc\uc18c\ub97c \uac70\ubd80<br \/>\n. \ub85c\uceec \ud638\uc2a4\ud2b8 \uc5b4\ub4dc\ub808\uc2a4(127.0.0.0\/8) \uac70\ubd80<br \/>\n. \uc608\uc57d\ub41c \uc0ac\uc124\uc8fc\uc18c(RFC1918) \uac70\ubd80<br \/>\n. IP \uba40\ud2f0\uce90\uc2a4\ud2b8 \uc5b4\ub4dc\ub808\uc2a4\ubc94\uc704(224.0.0.0\/4) \uac70\ubd80<\/p>\n<p>standard ACL<br \/>\nStandard IP ACL\uc740 \ud328\ud0b7\uc758 \ubc1c\uc2e0\uc9c0(source) IP \uc8fc\uc18c\ub97c \uac80\uc0ac\ud574\uc11c \ub124\ud2b8\uc6cc\ud06c \ud2b8\ub798\ud53d\uc744 \ud544\ud130\ud55c\ub2e4.<br \/>\n\uc544\ub798 \uad6c\uc131\uc73c\ub85c Standare ACL\uc744 \uc2dc\ud5d8 \ud574 \ubcf8\ub2e4<br \/>\n<a href=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2114\" data-permalink=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\/acl-1\" data-orig-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\" data-orig-size=\"543,416\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"acl-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png\" data-large-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\" src=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png\" alt=\"\" width=\"300\" height=\"230\" class=\"alignnone size-medium wp-image-2114\" srcset=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png 300w, https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png 543w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>access-list ? \uba85\ub839\uc73c\ub85c \uc0ac\uc6a9\uac00\ub2a5\ud55c acl \ubc88\ud638\ub97c \ud655\uc778 \ud560 \uc218 \uc788\ub2e4.<\/p>\n<p>switch1(config)#access-list ?<br \/>\n  <1-99>            IP standard access list<br \/>\n  <100-199>         IP extended access list<br \/>\n  <1000-1099>       IPX SAP access list<br \/>\n  <1100-1199>       Extended 48-bit MAC address access list<br \/>\n  <1200-1299>       IPX summary address access list<br \/>\n  <1300-1999>       IP standard access list (expanded range)<br \/>\n  <200-299>         Protocol type-code access list<br \/>\n  <2000-2699>       IP extended access list (expanded range)<br \/>\n  <2700-2799>       MPLS access list<br \/>\n  <300-399>         DECnet access list<br \/>\n  <400-499>         XNS standard access list<br \/>\n  <500-599>         XNS extended access list<br \/>\n  <600-699>         Appletalk access list<br \/>\n  <700-799>         48-bit MAC address access list<br \/>\n  <800-899>         IPX standard access list<br \/>\n  <900-999>         IPX extended access list<br \/>\n  dynamic-extended  Extend the dynamic ACL absolute timer<br \/>\n  rate-limit        Simple rate-limit specific access list<\/p>\n<p>switch1 segment\uc5d0\uc11c VPCS-3\uc73c\ub85c\uc758 \ud1b5\uc2e0 \ucc28\ub2e8 ACL<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >switch1#conf t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nswitch1(config)#access-list 10 deny 192.168.10.13\r\nswitch(config)#access-list 10 permit any\r\n<\/pre>\n<p>\uc124\uc815 \ud655\uc778<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >switch1#sh access-list\r\nStandard IP access list 10\r\n    10 deny   192.168.10.13\r\n    20 permit any\r\nswich1#<\/pre>\n<p>\uc774 \uc124\uc815\uc744 e0\/0 \ud3ec\ud2b8\uc5d0 \uc801\uc6a9\ud558\uba74, VPCS-1 VPCS-2 \uc640 VPCS-3\uc758 \ud1b5\uc2e0\uc740 \uc774\ub8e8\uc5b4\uc9c0\uc9c0 \uc54a\ub294\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >switch1#conf t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nswitch1(config)#int e0\/0\r\nswitch1(config-if)#ip access-group 10 in\r\nswitch1(config-if)#end\r\nswitch1#<\/pre>\n<p>VPCS-2\uc640 VPCS-3, VPCS-4 \uc758 \ud1b5\uc2e0 \ud655\uc778<br \/>\nacl \uc124\uc815\uc5d0 \ub530\ub77c\uc11c, switch1\uc744 \ud1b5\ud574\uc11c\ub294 VPCS-3(192.168.10.13)\uacfc\ub294 \ud1b5\uc2e0\uc774 \ub418\uc9c0 \uc54a\ub294\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >VPCS-2&gt; sh ip\r\n\r\nNAME        : VPCS-2[1]\r\nIP\/MASK     : 192.168.10.12\/24\r\nGATEWAY     : 0.0.0.0\r\nDNS         :\r\nMAC         : 00:50:79:66:68:02\r\nLPORT       : 10010\r\nRHOST:PORT  : 127.0.0.1:10011\r\nMTU:        : 1500\r\n\r\nVPCS-2&gt; ping 192.168.10.13\r\n192.168.10.13 icmp_seq=1 timeout\r\n192.168.10.13 icmp_seq=2 timeout\r\n192.168.10.13 icmp_seq=3 timeout\r\n192.168.10.13 icmp_seq=4 timeout\r\n192.168.10.13 icmp_seq=5 timeout\r\n\r\nVPCS-2&gt; ping 192.168.10.14\r\n84 bytes from 192.168.10.14 icmp_seq=1 ttl=64 time=3.247 ms\r\n84 bytes from 192.168.10.14 icmp_seq=2 ttl=64 time=1.353 ms\r\n84 bytes from 192.168.10.14 icmp_seq=3 ttl=64 time=0.800 ms\r\n84 bytes from 192.168.10.14 icmp_seq=4 ttl=64 time=0.848 ms\r\n84 bytes from 192.168.10.14 icmp_seq=5 ttl=64 time=0.703 ms\r\n\r\nVPCS-2&gt;\r\n<\/pre>\n<p>\ud2b9\uc815 \ud638\uc2a4\ud2b8\uc5d0\uc11c\ub9cc \ub77c\uc6b0\ud130\ub098 \uc2a4\uc704\uce58 telnet\/ssh \uc811\uc18d \ud5c8\uc6a9\ud558\uae30<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Router(config-if)#exit\r\nRouter(config)#access-list 20 permit host 192.168.10.11\r\nRouter(config)#line vty 0 4\r\nRouter(config-line)#access-class 20 in\r\nRouter(config-line)#end<\/pre>\n<p>Extended acl\uc740 source, destination \uc8fc\uc18c\ubfd0\uc544\ub2c8\ub77c \ud504\ub85c\ud1a0\ucf5c\uacfc \ud3ec\ud2b8\ubc88\ud638\ub3c4 \uba85\uc2dc\ud560 \uc218 \uc788\ub2e4. \uc544\ub798\ucc98\ub7fc \ud655\uc778\uc774 \uac00\ub2a5\ud558\ub2e4.<br \/>\nRouter(config)#access-list 110  ?<br \/>\n  deny     Specify packets to reject<br \/>\n  dynamic  Specify a DYNAMIC list of PERMITs or DENYs<br \/>\n  permit   Specify packets to forward<br \/>\n  remark   Access list entry comment<\/p>\n<p>Router(config)#access-list 110  deny ?<br \/>\n  <0-255>       An IP protocol number<br \/>\n  ahp           Authentication Header Protocol<br \/>\n  eigrp         Cisco&#8217;s EIGRP routing protocol<br \/>\n  esp           Encapsulation Security Payload<br \/>\n  gre           Cisco&#8217;s GRE tunneling<br \/>\n  icmp          Internet Control Message Protocol<br \/>\n  igmp          Internet Gateway Message Protocol<br \/>\n  ip            Any Internet Protocol<br \/>\n  ipinip        IP in IP tunneling<br \/>\n  nos           KA9Q NOS compatible IP over IP tunneling<br \/>\n  object-group  Service object group<br \/>\n  ospf          OSPF routing protocol<br \/>\n  pcp           Payload Compression Protocol<br \/>\n  pim           Protocol Independent Multicast<br \/>\n  tcp           Transmission Control Protocol<br \/>\n  udp           User Datagram Protocol<\/p>\n<p>\uacc4\uc18d \uc635\uc158\uacfc ? \ub97c \uc774\uc6a9\ud558\uc5ec \ud655\uc778\uc774 \uac00\ub2a5\ud558\ub2e4.<\/p>\n<p>ACL examples<br \/>\n<a href=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2115\" data-permalink=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\/acl-2\" data-orig-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2.png\" data-orig-size=\"679,533\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"acl-2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2-300x235.png\" data-large-file=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2.png\" src=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2-300x235.png\" alt=\"\" width=\"300\" height=\"235\" class=\"alignnone size-medium wp-image-2115\" srcset=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2-300x235.png 300w, https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-2.png 679w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>* Standard ACL \uc608<\/p>\n<p>Wolf LAN\uc758 \ub2e8\uc77c\ud638\uc2a4\ud2b8(192.168.20.2)\ub9cc Fox LAN\uc73c\ub85c \uc811\uadfc \uac00\ub2a5\ud558\ub3c4\ub85d acl \uc124\uc815<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Wolf#conf t\r\nEnter configuration commands, one per line.  End with CNTL\/Z.\r\nWolf(config)#access-list 10 permit 192.168.20.2 0.0.0.0\r\nWolf(config)#int e0\/0\r\nWolf(config-if)#ip access-group 10 in\r\nWolf(config-if)#end<\/pre>\n<p>\uc124\uc815 \ud655\uc778<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Wolf#sh access-list\r\nStandard IP access list 10\r\n    10 permit 192.168.20.2 (20 matches)\r\nWolf#sh ip int e0\/0\r\nEthernet0\/0 is up, line protocol is up\r\n ...\r\n   Outgoing access list is not set\r\n  Inbound  access list is 10\r\n ...\r\n<\/pre>\n<p>Fox LAN\uc5d0\uc11c Wolf LAN\uc758 \ud2b9\uc815 \ud638\uc2a4\ud2b8\ub85c\ub9cc ping \uc774 \uac00\ub2a5\ud568\uc744 \ud655\uc778\ud560 \uc218 \uc788\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >VPCS&gt; sh ip\r\n\r\nNAME        : VPCS[1]\r\nIP\/MASK     : 192.168.10.2\/24\r\nGATEWAY     : 192.168.10.1\r\nDNS         :\r\nMAC         : 00:50:79:66:68:00\r\nLPORT       : 10012\r\nRHOST:PORT  : 127.0.0.1:10013\r\nMTU:        : 1500\r\n\r\nVPCS&gt; ping 192.168.20.2\r\n84 bytes from 192.168.20.2 icmp_seq=1 ttl=61 time=18.433 ms\r\n84 bytes from 192.168.20.2 icmp_seq=2 ttl=61 time=18.711 ms\r\n84 bytes from 192.168.20.2 icmp_seq=3 ttl=61 time=19.271 ms\r\n84 bytes from 192.168.20.2 icmp_seq=4 ttl=61 time=18.682 ms\r\n84 bytes from 192.168.20.2 icmp_seq=5 ttl=61 time=16.832 ms\r\n\r\nVPCS&gt; ping 192.168.20.3\r\n192.168.20.3 icmp_seq=1 timeout\r\n192.168.20.3 icmp_seq=2 timeout\r\n192.168.20.3 icmp_seq=3 timeout\r\n192.168.20.3 icmp_seq=4 timeout\r\n192.168.20.3 icmp_seq=5 timeout\r\n<\/pre>\n<p>* Extended ACL \uc608<\/p>\n<p>\ud638\uc2a4\ud2b8 VPCS-1(192.168.10.2)\uac00 Wolf \ub77c\uc6b0\ud130(172.16.10.6)\uc5d0 \ub300\ud55c telnet \uc811\uc18d\uc744 \uae08\uc9c0\uc2dc\ud0a4\uc9c0\ub9cc, Ping\uc740 \ud560 \uc218 \uc788\ub3c4\ub85d \uc124\uc815.<br \/>\nIP extended acl\uc740 \ubc1c\uc2e0\uc9c0(source)\uc5d0 \uac00\uae5d\uac8c \ubc30\uce58\ud574\uc57c \ud558\ubbc0\ub85c Fox \ub77c\uc6b0\ud130\uc5d0 acl\uc744 \ucd94\uac00\ud55c\ub2e4.<\/p>\n<pre class=\"lang:sh highlight:0 decode:true \" >Fox(config)#access-list 110 deny tcp host 192.168.10.2 host 172.16.10.6 eq telnet log\r\nFox(config)#access-list 110 permit ip any 0.0.0.0 255.255.255.255\r\nFox(config)#int e0\/0\r\nFox(config-if)#ip access-group 110 in\r\nFox(config-if)#end<\/pre>\n<p>\ucc38\uace0<br \/>\n<a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/access-lists\/26448-ACLsamples.html#anc8\">https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/ip\/access-lists\/26448-ACLsamples.html#anc8<\/a> \uc5d0\uc11c \ub2e4\uc591\ud55c \uc608\ub97c \ubcfc \uc218 \uc788\ub2e4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco ACL(access list) \ub9cc\ub4e4\uae30. access list\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \ud328\ud0b7\uc744 \ube44\uad50 \ubd84\ub958 \ucc98\ub9ac\ud558\ub294 \ud328\ud0b7 \ud544\ud130\uc774\uba70, \ub9ac\uc2a4\ud2b8\uac00 \uc791\uc131\ub418\uba74 \uc778\ud130\ud398\uc774\uc2a4\uc758 inbound \ub610\ub294 outbound \ud2b8\ub798\ud53d\uc5d0 \uc801\uc6a9\ud560 \uc218 \uc788\ub2e4. ACL\uc744 \uc801\uc6a9\ud558\uba74 \uc9c0\uc815\ub41c \uc778\ud130\ud398\uc774\uc2a4\uc5d0\uc11c \uadf8 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\uacfc\ud558\ub294 \ubaa8\ub4e0 \ud328\ud0b7\uc744 \uac80\uc0ac\ud558\uace0 \uc870\uce58\ub97c \ucde8\ud558\uac8c \ub41c\ub2e4. \ud328\ud0b7\uc774 ACL\uacfc \ube44\uad50\ub420 \ub54c\uc758 \uc138\uac00\uc9c0 \uaddc\uce59 . \ud328\ud0b7\uc740 \ud56d\uc0c1 acl\uacfc \uc21c\uc11c\ub300\ub85c \ube44\uad50\ub41c\ub2e4. . \ud328\ud0b7\uc740 \uaddc\uce59\uacfc \uc77c\uce58\ub420\ub54c \uae4c\uc9c0\ub9cc \ube44\uad50\ub418\uace0 \uc77c\uce58\ub41c &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[388],"tags":[400,399,377],"class_list":["post-2113","post","type-post","status-publish","format-standard","hentry","category-network","tag-access-list","tag-cisco-acl","tag-gns3","item-wrap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[GNS3 Labs. - Cisco] Access List - Blog-boxcorea<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[GNS3 Labs. - Cisco] Access List - Blog-boxcorea\" \/>\n<meta property=\"og:description\" content=\"Cisco ACL(access list) \ub9cc\ub4e4\uae30. access list\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \ud328\ud0b7\uc744 \ube44\uad50 \ubd84\ub958 \ucc98\ub9ac\ud558\ub294 \ud328\ud0b7 \ud544\ud130\uc774\uba70, \ub9ac\uc2a4\ud2b8\uac00 \uc791\uc131\ub418\uba74 \uc778\ud130\ud398\uc774\uc2a4\uc758 inbound \ub610\ub294 outbound \ud2b8\ub798\ud53d\uc5d0 \uc801\uc6a9\ud560 \uc218 \uc788\ub2e4. ACL\uc744 \uc801\uc6a9\ud558\uba74 \uc9c0\uc815\ub41c \uc778\ud130\ud398\uc774\uc2a4\uc5d0\uc11c \uadf8 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\uacfc\ud558\ub294 \ubaa8\ub4e0 \ud328\ud0b7\uc744 \uac80\uc0ac\ud558\uace0 \uc870\uce58\ub97c \ucde8\ud558\uac8c \ub41c\ub2e4. \ud328\ud0b7\uc774 ACL\uacfc \ube44\uad50\ub420 \ub54c\uc758 \uc138\uac00\uc9c0 \uaddc\uce59 . \ud328\ud0b7\uc740 \ud56d\uc0c1 acl\uacfc \uc21c\uc11c\ub300\ub85c \ube44\uad50\ub41c\ub2e4. . \ud328\ud0b7\uc740 \uaddc\uce59\uacfc \uc77c\uce58\ub420\ub54c \uae4c\uc9c0\ub9cc \ube44\uad50\ub418\uace0 \uc77c\uce58\ub41c &hellip; Continue reading\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\" \/>\n<meta property=\"og:site_name\" content=\"Blog-boxcorea\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-17T10:20:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-12-17T10:23:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"543\" \/>\n\t<meta property=\"og:image:height\" content=\"416\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"snowffox\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"snowffox\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\"},\"author\":{\"name\":\"snowffox\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\"},\"headline\":\"[GNS3 Labs. &#8211; Cisco] Access List\",\"datePublished\":\"2017-12-17T10:20:13+00:00\",\"dateModified\":\"2017-12-17T10:23:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\"},\"wordCount\":381,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png\",\"keywords\":[\"access list\",\"Cisco ACL\",\"gns3\"],\"articleSection\":[\"Network(\ub124\ud2b8\uc6cc\ud06c)\"],\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\",\"url\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\",\"name\":\"[GNS3 Labs. - Cisco] Access List - Blog-boxcorea\",\"isPartOf\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png\",\"datePublished\":\"2017-12-17T10:20:13+00:00\",\"dateModified\":\"2017-12-17T10:23:27+00:00\",\"author\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage\",\"url\":\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\",\"contentUrl\":\"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png\",\"width\":543,\"height\":416},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.boxcorea.com\/wp\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[GNS3 Labs. &#8211; Cisco] Access List\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#website\",\"url\":\"https:\/\/blog.boxcorea.com\/wp\/\",\"name\":\"Blog-boxcorea\",\"description\":\"Simple is Beautiful!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.boxcorea.com\/wp\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a\",\"name\":\"snowffox\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g\",\"caption\":\"snowffox\"},\"url\":\"https:\/\/blog.boxcorea.com\/wp\/archives\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[GNS3 Labs. - Cisco] Access List - Blog-boxcorea","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113","og_locale":"ko_KR","og_type":"article","og_title":"[GNS3 Labs. - Cisco] Access List - Blog-boxcorea","og_description":"Cisco ACL(access list) \ub9cc\ub4e4\uae30. access list\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \ud328\ud0b7\uc744 \ube44\uad50 \ubd84\ub958 \ucc98\ub9ac\ud558\ub294 \ud328\ud0b7 \ud544\ud130\uc774\uba70, \ub9ac\uc2a4\ud2b8\uac00 \uc791\uc131\ub418\uba74 \uc778\ud130\ud398\uc774\uc2a4\uc758 inbound \ub610\ub294 outbound \ud2b8\ub798\ud53d\uc5d0 \uc801\uc6a9\ud560 \uc218 \uc788\ub2e4. ACL\uc744 \uc801\uc6a9\ud558\uba74 \uc9c0\uc815\ub41c \uc778\ud130\ud398\uc774\uc2a4\uc5d0\uc11c \uadf8 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\uacfc\ud558\ub294 \ubaa8\ub4e0 \ud328\ud0b7\uc744 \uac80\uc0ac\ud558\uace0 \uc870\uce58\ub97c \ucde8\ud558\uac8c \ub41c\ub2e4. \ud328\ud0b7\uc774 ACL\uacfc \ube44\uad50\ub420 \ub54c\uc758 \uc138\uac00\uc9c0 \uaddc\uce59 . \ud328\ud0b7\uc740 \ud56d\uc0c1 acl\uacfc \uc21c\uc11c\ub300\ub85c \ube44\uad50\ub41c\ub2e4. . \ud328\ud0b7\uc740 \uaddc\uce59\uacfc \uc77c\uce58\ub420\ub54c \uae4c\uc9c0\ub9cc \ube44\uad50\ub418\uace0 \uc77c\uce58\ub41c &hellip; Continue reading","og_url":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113","og_site_name":"Blog-boxcorea","article_published_time":"2017-12-17T10:20:13+00:00","article_modified_time":"2017-12-17T10:23:27+00:00","og_image":[{"width":543,"height":416,"url":"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png","type":"image\/png"}],"author":"snowffox","twitter_card":"summary_large_image","twitter_misc":{"Written by":"snowffox","Est. reading time":"3\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#article","isPartOf":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113"},"author":{"name":"snowffox","@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a"},"headline":"[GNS3 Labs. &#8211; Cisco] Access List","datePublished":"2017-12-17T10:20:13+00:00","dateModified":"2017-12-17T10:23:27+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113"},"wordCount":381,"commentCount":0,"image":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage"},"thumbnailUrl":"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png","keywords":["access list","Cisco ACL","gns3"],"articleSection":["Network(\ub124\ud2b8\uc6cc\ud06c)"],"inLanguage":"ko-KR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.boxcorea.com\/wp\/archives\/2113#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113","url":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113","name":"[GNS3 Labs. - Cisco] Access List - Blog-boxcorea","isPartOf":{"@id":"https:\/\/blog.boxcorea.com\/wp\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage"},"image":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage"},"thumbnailUrl":"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1-300x230.png","datePublished":"2017-12-17T10:20:13+00:00","dateModified":"2017-12-17T10:23:27+00:00","author":{"@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a"},"breadcrumb":{"@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.boxcorea.com\/wp\/archives\/2113"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#primaryimage","url":"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png","contentUrl":"https:\/\/blog.boxcorea.com\/wp\/wp-content\/uploads\/2017\/12\/acl-1.png","width":543,"height":416},{"@type":"BreadcrumbList","@id":"https:\/\/blog.boxcorea.com\/wp\/archives\/2113#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.boxcorea.com\/wp"},{"@type":"ListItem","position":2,"name":"[GNS3 Labs. &#8211; Cisco] Access List"}]},{"@type":"WebSite","@id":"https:\/\/blog.boxcorea.com\/wp\/#website","url":"https:\/\/blog.boxcorea.com\/wp\/","name":"Blog-boxcorea","description":"Simple is Beautiful!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.boxcorea.com\/wp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Person","@id":"https:\/\/blog.boxcorea.com\/wp\/#\/schema\/person\/6d8e12df2429d663a0a4e8362fbb650a","name":"snowffox","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c0787be58ea7e470b1a6f5ea8ce367c7913809648a00e0c15faace5220902ffb?s=96&d=retro&r=g","caption":"snowffox"},"url":"https:\/\/blog.boxcorea.com\/wp\/archives\/author\/admin"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wGXL-y5","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/comments?post=2113"}],"version-history":[{"count":3,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2113\/revisions"}],"predecessor-version":[{"id":2118,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/posts\/2113\/revisions\/2118"}],"wp:attachment":[{"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/media?parent=2113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/categories?post=2113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.boxcorea.com\/wp\/wp-json\/wp\/v2\/tags?post=2113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}