{"id":273,"date":"2026-05-03T16:40:57","date_gmt":"2026-05-03T14:40:57","guid":{"rendered":"https:\/\/eryann.fr\/?p=273"},"modified":"2026-05-03T17:04:51","modified_gmt":"2026-05-03T15:04:51","slug":"lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/","title":{"rendered":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT"},"content":{"rendered":"\n<p>Je vous propose ici le lab packet tracer que j&rsquo;ai r\u00e9alis\u00e9 pour p\u00e9parer l&rsquo;\u00e9preuve E6 du BTS Ciel. Je vous joins deux fichiers pkt, un vierge et l&rsquo;autre enti\u00e8rement param\u00e9tr\u00e9. <\/p>\n\n\n\n<p>>> <a href=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/pkt_bts_E6.zip\">https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/pkt_bts_E6.zip<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png\" alt=\"\" class=\"wp-image-291\" srcset=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png 1024w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-300x200.png 300w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-768x512.png 768w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"429\" src=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235-1024x429.png\" alt=\"\" class=\"wp-image-281\" srcset=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235-1024x429.png 1024w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235-300x126.png 300w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235-768x322.png 768w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235-1536x644.png 1536w, https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/Capture-decran-2026-05-03-163235.png 1568w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\/<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Le mot de passe utilis\u00e9 est pwd<\/p>\n\n\n\n<p>Le login pour ssh est admin et pwd en mot de passe<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>R\u00e9seaux :<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>VLAN<\/th><th>R\u00e9seau<\/th><th>Plage utilisable<\/th><th>Broadcast<\/th><\/tr><\/thead><tbody><tr><td>VLAN 10<\/td><td>10.0.0.0\/26<\/td><td>10.0.0.1 \u2192 10.0.0.62<\/td><td>10.0.0.63<\/td><\/tr><tr><td>VLAN 20<\/td><td>10.0.0.64\/26<\/td><td>10.0.0.65 \u2192 10.0.0.126<\/td><td>10.0.0.127<\/td><\/tr><tr><td>VLAN 30 (DMZ)<\/td><td>10.0.0.128\/26<\/td><td>10.0.0.129 \u2192 10.0.0.190<\/td><td>10.0.0.191<\/td><\/tr><tr><td>VLAN 99 (Admin)<\/td><td>10.0.0.192\/26<\/td><td>10.0.0.193 \u2192 10.0.0.254<\/td><td>10.0.0.255<\/td><\/tr><tr><td>WAN<\/td><td>16.0.0.0\/24<\/td><td>16.0.0.1 \u2192 16.0.0.254<\/td><td>16.0.0.255<\/td><\/tr><tr><td>INTERNET<\/td><td>192.168.0.0\/24<\/td><td>192.168.0.1 \u2192 192.168.0.254<\/td><td>192.168.0.255<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Plan d&rsquo;adressage :<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Zone<\/th><th>VLAN<\/th><th>\u00c9quipement<\/th><th>Interface<\/th><th>Adresse IP<\/th><th>Masque<\/th><th>Passerelle<\/th><\/tr><\/thead><tbody><tr><td>WAN<\/td><td>&#8211;<\/td><td>R1<\/td><td>G0\/0<\/td><td>16.0.0.1<\/td><td>255.255.255.0<\/td><td>&#8211;<\/td><\/tr><tr><td>WAN<\/td><td>&#8211;<\/td><td>R2<\/td><td>G0\/0\/1<\/td><td>16.0.0.2<\/td><td>255.255.255.0<\/td><td>&#8211;<\/td><\/tr><tr><td>LAN1<\/td><td>VLAN 10<\/td><td>R1<\/td><td>G0\/1.10<\/td><td>10.0.0.62<\/td><td>255.255.255.192<\/td><td>&#8211;<\/td><\/tr><tr><td>LAN1<\/td><td>VLAN 10<\/td><td>PC user<\/td><td>&#8211;<\/td><td>10.0.0.x<\/td><td>255.255.255.192<\/td><td>10.0.0.62<\/td><\/tr><tr><td>LAN2<\/td><td>VLAN 20<\/td><td>R1<\/td><td>G0\/1.20<\/td><td>10.0.0.126<\/td><td>255.255.255.192<\/td><td>&#8211;<\/td><\/tr><tr><td>LAN2<\/td><td>VLAN 20<\/td><td>PC user<\/td><td>&#8211;<\/td><td>10.0.0.x<\/td><td>255.255.255.192<\/td><td>10.0.0.126<\/td><\/tr><tr><td>DMZ<\/td><td>VLAN 30<\/td><td>R1<\/td><td>G0\/1.30<\/td><td>10.0.0.190<\/td><td>255.255.255.192<\/td><td>&#8211;<\/td><\/tr><tr><td>DMZ<\/td><td>VLAN 30<\/td><td>Serveur web<\/td><td>&#8211;<\/td><td>10.0.0.129<\/td><td>255.255.255.192<\/td><td>10.0.0.190<\/td><\/tr><tr><td>ADMIN<\/td><td>VLAN 99<\/td><td>R1<\/td><td>G0\/1.99<\/td><td>10.0.0.254<\/td><td>255.255.255.192<\/td><td>&#8211;<\/td><\/tr><tr><td>ADMIN<\/td><td>VLAN 99<\/td><td>Switch S1<\/td><td>VLAN99<\/td><td>10.0.0.194<\/td><td>255.255.255.192<\/td><td>10.0.0.254<\/td><\/tr><tr><td>ADMIN<\/td><td>VLAN 99<\/td><td>Poste admin<\/td><td>&#8211;<\/td><td>10.0.0.x<\/td><td>255.255.255.192<\/td><td>10.0.0.254<\/td><\/tr><tr><td>INTERNET<\/td><td>&#8211;<\/td><td>R2<\/td><td>G0\/0\/0<\/td><td>192.168.0.1<\/td><td>255.255.255.0<\/td><td>&#8211;<\/td><\/tr><tr><td>INTERNET<\/td><td>&#8211;<\/td><td>PC externe<\/td><td>&#8211;<\/td><td>192.168.0.4<\/td><td>255.255.255.0<\/td><td>192.168.0.1<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Dessous les fichiers de config extrait de Cisco packet tracer un petit peu remastoris\u00e9 pour les rendre plus compact<\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>! ################################\n! #          Switch S1\n! ################################\n\n!\nservice password-encryption\nhostname S1\nenable secret 5 $1$mERr$hC1uXYrHXKKdh8\/JQHjjK\/\n!\n!\n!\nip ssh version 2\nip ssh time-out 60\nno ip domain-lookup\nip domain-name eryann.lan\n!\nusername admin secret 5 $1$mERr$hC1uXYrHXKKdh8\/JQHjjK\/\n\n! \ncrypto ke generate rsa\n\nline vty 0 15\n exec-timeout 5 0\n login local\n transport input ssh\n\n\n!\nspanning-tree mode pvst\nspanning-tree extend system-id\n!\ninterface FastEthernet0\/1\n switchport access vlan 10\n switchport mode access\n switchport port-security\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n switchport port-security mac-address sticky 0000.0C62.961A\n!\ninterface FastEthernet0\/2\n switchport access vlan 10\n switchport mode access\n switchport port-security\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n switchport port-security mac-address sticky 0003.E447.17DC\n!\ninterface FastEthernet0\/3\n switchport access vlan 20\n switchport mode access\n switchport port-security\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n switchport port-security mac-address sticky 0002.4AA1.2EDB\n!\ninterface FastEthernet0\/4\n switchport access vlan 30\n switchport mode access\n switchport port-security\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n!\ninterface FastEthernet0\/5\n switchport access vlan 99\n switchport mode access\n switchport port-security\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n switchport port-security mac-address sticky 000A.4160.1000\n!\ninterface range FastEthernet0\/6-24\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n shutdown\n!\ninterface FastEthernet0\/24\n switchport port-security mac-address sticky \n switchport port-security violation restrict \n shutdown\n!\ninterface GigabitEthernet0\/1\n switchport trunk allowed vlan 10,20,30,99\n switchport mode trunk\n!\ninterface GigabitEthernet0\/2\n shutdown\n!\ninterface Vlan1\n no ip address\n shutdown\n!\ninterface Vlan99\n ip address 10.0.0.194 255.255.255.192\n!\nip default-gateway 10.0.0.254\n!\n!\n!\nend\n\n<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>! ################################\n! #          Routeur R2\n! ################################\n\n!\nversion 15.1\nno service timestamps log datetime msec\nno service timestamps debug datetime msec\nservice password-encryption\n!\nhostname R1\n!\nenable secret 5 $1$mERr$hC1uXYrHXKKdh8\/JQHjjK\/\n\n!\nusername admin privilege 15 secret 5 $1$mERr$hC1uXYrHXKKdh8\/JQHjjK\/\n\n!\ncrypto ke generate rsa\n!\nip ssh version 2\nip ssh time-out 60\nno ip domain-lookup\nip domain-name eryann.lan\n!\n!\nline vty 0 15\n exec-timeout 5 0\n login local\n transport input ssh\n!\nspanning-tree mode pvst\n!\n!\ninterface GigabitEthernet0\/0\n ip address 16.0.0.1 255.255.255.0\n ip access-group ACL-WAN in\n ip nat outside\n duplex auto\n speed auto\n!\ninterface GigabitEthernet0\/1\n no ip address\n ip nat inside\n duplex auto\n speed auto\n!\ninterface GigabitEthernet0\/1.10\n encapsulation dot1Q 10\n ip address 10.0.0.62 255.255.255.192\n ip access-group ACL-LAN-USER-SERVER in\n ip nat inside\n!\ninterface GigabitEthernet0\/1.20\n encapsulation dot1Q 20\n ip address 10.0.0.126 255.255.255.192\n ip access-group ACL-LAN-USER-SERVER in\n ip nat inside\n!\ninterface GigabitEthernet0\/1.30\n encapsulation dot1Q 30\n ip address 10.0.0.190 255.255.255.192\n ip access-group ACL-LAN-USER-SERVER in\n ip nat inside\n!\ninterface GigabitEthernet0\/1.40\n no ip address\n shutdown\n!\ninterface GigabitEthernet0\/1.99\n encapsulation dot1Q 99\n ip address 10.0.0.254 255.255.255.192\n ip access-group ACL-LAN-ADMIN in\n ip nat inside\n!\ninterface Vlan1\n no ip address\n shutdown\n!\nip nat inside source static tcp 10.0.0.129 80 16.0.0.1 80 \nip nat inside source static tcp 10.0.0.129 443 16.0.0.1 443 \nip classless\nip route 0.0.0.0 0.0.0.0 16.0.0.2 \n!\nip flow-export version 9\n!\n!\nip access-list extended ACL-WAN\n permit tcp any host 16.0.0.1 eq www\n permit tcp any host 16.0.0.1 eq 443\n permit tcp 10.0.0.128 0.0.0.63 any established\n permit tcp any 10.0.0.0 0.0.0.255 established\n deny ip 10.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255\n deny ip any any\n\nip access-list extended ACL-LAN-ADMIN\n permit ip 10.0.0.192 0.0.0.63 10.0.0.0 0.0.0.255\n deny ip any any\n\nip access-list extended ACL-LAN-USER-SERVER\n permit tcp 10.0.0.0 0.0.0.63 host 10.0.0.129 eq www\n permit tcp 10.0.0.64 0.0.0.63 host 10.0.0.129 eq www\n permit tcp 10.0.0.128 0.0.0.63 any established\n deny ip 10.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255\n permit ip 10.0.0.0 0.0.0.63 any\n deny ip any any\n!\n!\n!\nend\n\n<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Pour le routeur R2, configuration minimale :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>les ip pour les interfaces actives<\/li>\n\n\n\n<li>la route par d\u00e9faut<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>! ################################\n! #          Routeur R2\n! ################################\n\n!\nversion 16.6.4\nno service timestamps log datetime msec\nno service timestamps debug datetime msec\nno service password-encryption\n!\nhostname R2\n!\n!\nip cef\nno ipv6 cef\n!\n!\nspanning-tree mode pvst\n!\n!\ninterface GigabitEthernet0\/0\/0\n ip address 192.168.0.1 255.255.255.0\n duplex auto\n speed auto\n!\ninterface GigabitEthernet0\/0\/1\n ip address 16.0.0.2 255.255.255.0\n duplex auto\n speed auto\n!\ninterface GigabitEthernet0\/0\/2\n no ip address\n duplex auto\n speed auto\n!\ninterface Vlan1\n no ip address\n!\nip classless\nip route 0.0.0.0 0.0.0.0 16.0.0.1 \n!\nip flow-export version 9\n!\n!\n!\nline con 0\n!\nline aux 0\n!\nline vty 0 4\n login\n!\n!\nend\n\n<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>Nota, S2 n&rsquo;est pas configur\u00e9 et sert de switch simple.<\/p>\n\n\n\n<p>En test :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PC1 lit la page web de Server 2 &#8211; 192.168.0.2<\/li>\n\n\n\n<li>PC2 n&rsquo;arrive pas \u00e0 lire page web de Server 2  car il n&rsquo;a pas acc\u00e8s \u00e0 internet<\/li>\n\n\n\n<li>PC3 lit la page web de Server 3 &#8211; en tapant l&rsquo;adresse IP du routeur 1 16.0.0.1<\/li>\n\n\n\n<li>PC1 et PC2 lisent la page web de Server 3 &#8211; 10.0.0.129<\/li>\n<\/ul>\n\n\n\n<p>>> si vous voulez vous amuser, vous pouvez modifier les ACL pour que le laptop0 admin puisse faire des ping sur le r\u00e9seau interne.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Explication du fonctionnement du lab<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Architecture g\u00e9n\u00e9rale<\/h2>\n\n\n\n<p>Ce lab met en \u0153uvre une architecture classique compos\u00e9e de :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>- un switch L2 (S1) pour la segmentation r\u00e9seau<br>- un routeur R1 pour le routage inter-VLAN, NAT\/PAT et filtrage<br>- un routeur R2 simulant Internet<br>- un serveur web plac\u00e9 en DMZ<\/code><\/pre>\n\n\n\n<p>L\u2019objectif est de reproduire une infrastructure r\u00e9aliste avec s\u00e9paration des usages et exposition contr\u00f4l\u00e9e d\u2019un service.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Segmentation r\u00e9seau (VLAN)<\/h2>\n\n\n\n<p>Le switch S1 segmente le r\u00e9seau en plusieurs VLAN :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>VLAN 10 : utilisateurs<br>VLAN 20 : utilisateurs<br>VLAN 30 : serveurs (DMZ)<br>VLAN 99 : administration<\/code><\/pre>\n\n\n\n<p>Chaque port est affect\u00e9 \u00e0 un VLAN via :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>switchport access vlan X<\/code><\/pre>\n\n\n\n<p>Le lien entre S1 et R1 est un trunk :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>switchport mode trunk<\/code><\/pre>\n\n\n\n<p>Cela permet de transporter plusieurs VLAN sur un seul lien physique.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Routage inter-VLAN (router-on-a-stick)<\/h2>\n\n\n\n<p>Le routage est r\u00e9alis\u00e9 sur R1 avec des sous-interfaces :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>interface g0\/1.10<br>encapsulation dot1Q 10<br>ip address 10.0.0.62 255.255.255.192<\/code><\/pre>\n\n\n\n<p>Chaque VLAN poss\u00e8de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>une sous-interface d\u00e9di\u00e9e<\/li>\n\n\n\n<li>une adresse IP servant de passerelle<\/li>\n<\/ul>\n\n\n\n<p>Exemple :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>VLAN 10 \u2192 gateway : 10.0.0.62<br>VLAN 20 \u2192 gateway : 10.0.0.126<br>VLAN 30 \u2192 gateway : 10.0.0.190<br>VLAN 99 \u2192 gateway : 10.0.0.254<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">NAT \/ PAT<\/h2>\n\n\n\n<p>Deux m\u00e9canismes sont utilis\u00e9s :<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PAT dynamique (sortant)<\/h3>\n\n\n\n<p>Permet aux r\u00e9seaux internes d\u2019acc\u00e9der \u00e0 Internet en utilisant l\u2019adresse WAN du routeur.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>LAN\/DMZ \u2192 Internet<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">PAT statique (port forwarding)<\/h3>\n\n\n\n<p>Permet de publier le serveur web interne :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip nat inside source static tcp 10.0.0.129 80 16.0.0.1 80<br>ip nat inside source static tcp 10.0.0.129 443 16.0.0.1 443<\/code><\/pre>\n\n\n\n<p>Cela signifie :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>16.0.0.1:80 \u2192 10.0.0.129:80<br>16.0.0.1:443 \u2192 10.0.0.129:443<\/code><\/pre>\n\n\n\n<p>Le serveur DMZ est donc accessible depuis Internet.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Filtrage avec ACL<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">ACL c\u00f4t\u00e9 WAN<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ip access-list extended ACL-WAN<br> permit tcp any host 16.0.0.1 eq www<br> permit tcp any host 16.0.0.1 eq 443<br> deny ip any any<\/code><\/pre>\n\n\n\n<p>R\u00f4le :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>autoriser uniquement HTTP\/HTTPS depuis Internet<\/li>\n\n\n\n<li>bloquer tout le reste<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">ACL c\u00f4t\u00e9 LAN<\/h3>\n\n\n\n<p>Objectif :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>limiter les communications internes<\/li>\n\n\n\n<li>contr\u00f4ler l\u2019acc\u00e8s au serveur<\/li>\n<\/ul>\n\n\n\n<p>Exemple :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>permit tcp 10.0.0.0 0.0.0.63 host 10.0.0.129 eq www<\/code><\/pre>\n\n\n\n<p>Autorise les utilisateurs \u00e0 acc\u00e9der au serveur web.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">DMZ (zone d\u00e9militaris\u00e9e)<\/h2>\n\n\n\n<p>Le serveur web est plac\u00e9 dans le VLAN 30 :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>10.0.0.128\/26<\/code><\/pre>\n\n\n\n<p>Objectifs :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>isoler les serveurs du r\u00e9seau utilisateur<\/li>\n\n\n\n<li>limiter l\u2019impact en cas de compromission<\/li>\n\n\n\n<li>contr\u00f4ler pr\u00e9cis\u00e9ment les flux entrants et sortants<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Route par d\u00e9faut<\/h2>\n\n\n\n<p>R1 envoie le trafic vers R2 (Internet simul\u00e9) :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip route 0.0.0.0 0.0.0.0 16.0.0.2<\/code><\/pre>\n\n\n\n<p>R2 renvoie vers R1 :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip route 0.0.0.0 0.0.0.0 16.0.0.1<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">S\u00e9curisation du switch<\/h2>\n\n\n\n<p>Le switch utilise :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>switchport port-security<br>switchport port-security mac-address sticky<\/code><\/pre>\n\n\n\n<p>Objectif :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>limiter le nombre de machines par port<\/li>\n\n\n\n<li>emp\u00eacher les attaques de type spoofing MAC<\/li>\n<\/ul>\n\n\n\n<p>Important :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>cette configuration ne doit pas \u00eatre appliqu\u00e9e sur un trunk<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Acc\u00e8s distant s\u00e9curis\u00e9<\/h2>\n\n\n\n<p>SSH est activ\u00e9 sur les \u00e9quipements :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip ssh version 2<br>username admin secret ...<\/code><\/pre>\n\n\n\n<p>Cela permet une administration s\u00e9curis\u00e9e du r\u00e9seau.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Cette rubrique explique le r\u00f4le des ACL dans le lab Packet Tracer.<br>Les ACL permettent de filtrer les flux entre les VLAN, la DMZ, le r\u00e9seau d\u2019administration et Internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Positionnement des ACL<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>ACL-WAN              : appliqu\u00e9e sur l\u2019interface WAN de R1<br>ACL-LAN-ADMIN        : appliqu\u00e9e sur le VLAN 99<br>ACL-LAN-USER-SERVER  : appliqu\u00e9e sur les VLAN 10, 20 et 30<\/code><\/pre>\n\n\n\n<p>Une ACL appliqu\u00e9e en entr\u00e9e sur une interface filtre les paquets qui arrivent par cette interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sch\u00e9ma logique des zones<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>                          INTERNET<br>                              |<br>                              | HTTP \/ HTTPS<br>                              |<br>                          16.0.0.1<br>                        +---------+<br>                        |   R1    |<br>                        +---------+<br>                              |<br>                       Trunk 802.1Q<br>                              |<br>                        +---------+<br>                        |   S1    |<br>                        +---------+<br>             |              |              |              |<br>          VLAN10         VLAN20         VLAN30         VLAN99<br>       Utilisateurs   Utilisateurs       DMZ          Admin<br>       10.0.0.0\/26   10.0.0.64\/26  10.0.0.128\/26  10.0.0.192\/26<br>             |              |              |              |<br>          PC user        PC user      Serveur web     Poste admin<br>                                      10.0.0.129      10.0.0.194<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00f4le de l\u2019ACL-WAN<\/h2>\n\n\n\n<p>L\u2019ACL-WAN filtre les connexions venant d\u2019Internet.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip access-list extended ACL-WAN<br> permit tcp any host 16.0.0.1 eq www<br> permit tcp any host 16.0.0.1 eq 443<br> permit tcp any any established<br> deny ip any any<\/code><\/pre>\n\n\n\n<p>Elle permet uniquement les connexions HTTP et HTTPS vers l\u2019adresse publique du routeur. Ces flux sont ensuite redirig\u00e9s par NAT\/PAT vers le serveur web en DMZ.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>16.0.0.1:80  \u2192 10.0.0.129:80<br>16.0.0.1:443 \u2192 10.0.0.129:443<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00f4le de l\u2019ACL-LAN-USER-SERVER<\/h2>\n\n\n\n<p>Cette ACL est appliqu\u00e9e aux VLAN 10, 20 et 30.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip access-list extended ACL-LAN-USER-SERVER<br> permit tcp 10.0.0.0 0.0.0.63 host 10.0.0.129 eq www<br> permit tcp 10.0.0.64 0.0.0.63 host 10.0.0.129 eq www<br> permit tcp 10.0.0.128 0.0.0.63 any established<br> deny ip 10.0.0.0 0.0.0.255 10.0.0.0 0.0.0.255<br> permit ip 10.0.0.0 0.0.0.63 any<br> deny ip any any<\/code><\/pre>\n\n\n\n<p>Elle autorise les VLAN 10 et 20 \u00e0 acc\u00e9der au serveur web en HTTP.<br>Elle emp\u00eache les communications directes entre VLAN internes.<br>Elle autorise le VLAN 10 \u00e0 sortir vers Internet.<br>Elle bloque le reste.<\/p>\n\n\n\n<p>Comme elle est aussi appliqu\u00e9e au VLAN 30, elle limite les flux initi\u00e9s par le serveur. Le serveur peut r\u00e9pondre \u00e0 des connexions d\u00e9j\u00e0 \u00e9tablies, mais ne peut pas initier librement des connexions vers les VLAN internes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00f4le de l\u2019ACL-LAN-ADMIN<\/h2>\n\n\n\n<p>Cette ACL est appliqu\u00e9e au VLAN 99.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ip access-list extended ACL-LAN-ADMIN<br> permit ip 10.0.0.192 0.0.0.63 10.0.0.0 0.0.0.255<br> deny ip any any<\/code><\/pre>\n\n\n\n<p>Elle autorise le r\u00e9seau d\u2019administration \u00e0 acc\u00e9der aux r\u00e9seaux internes du lab.<\/p>\n\n\n\n<p>Le VLAN 99 peut donc administrer les \u00e9quipements et acc\u00e9der aux VLAN n\u00e9cessaires.<br>Tout autre trafic non pr\u00e9vu est bloqu\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tableau des flux autoris\u00e9s et bloqu\u00e9s<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Source<\/th><th>Destination<\/th><th>Port \/ protocole<\/th><th>Action<\/th><th>Explication<\/th><\/tr><\/thead><tbody><tr><td>Internet<\/td><td>16.0.0.1<\/td><td>TCP 80<\/td><td>Autoris\u00e9<\/td><td>Publication HTTP du serveur web<\/td><\/tr><tr><td>Internet<\/td><td>16.0.0.1<\/td><td>TCP 443<\/td><td>Autoris\u00e9<\/td><td>Publication HTTPS du serveur web<\/td><\/tr><tr><td>Internet<\/td><td>LAN interne<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>Protection des VLAN internes<\/td><\/tr><tr><td>VLAN10<\/td><td>Serveur DMZ 10.0.0.129<\/td><td>TCP 80<\/td><td>Autoris\u00e9<\/td><td>Acc\u00e8s web utilisateur<\/td><\/tr><tr><td>VLAN20<\/td><td>Serveur DMZ 10.0.0.129<\/td><td>TCP 80<\/td><td>Autoris\u00e9<\/td><td>Acc\u00e8s web utilisateur<\/td><\/tr><tr><td>VLAN10<\/td><td>Internet<\/td><td>IP<\/td><td>Autoris\u00e9<\/td><td>Sortie Internet autoris\u00e9e<\/td><\/tr><tr><td>VLAN20<\/td><td>Internet<\/td><td>IP<\/td><td>Bloqu\u00e9<\/td><td>Pas de r\u00e8gle d\u2019autorisation g\u00e9n\u00e9rale<\/td><\/tr><tr><td>VLAN10<\/td><td>VLAN20<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>Isolation inter-VLAN<\/td><\/tr><tr><td>VLAN10<\/td><td>VLAN30 hors HTTP<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>Acc\u00e8s limit\u00e9 au serveur<\/td><\/tr><tr><td>VLAN20<\/td><td>VLAN30 hors HTTP<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>Acc\u00e8s limit\u00e9 au serveur<\/td><\/tr><tr><td>VLAN30 serveur<\/td><td>LAN interne<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>Confinement de la DMZ<\/td><\/tr><tr><td>VLAN30 serveur<\/td><td>R\u00e9ponses TCP<\/td><td>Established<\/td><td>Autoris\u00e9<\/td><td>R\u00e9ponses aux connexions existantes<\/td><\/tr><tr><td>VLAN99 admin<\/td><td>R\u00e9seaux internes<\/td><td>IP<\/td><td>Autoris\u00e9<\/td><td>Administration du lab<\/td><\/tr><tr><td>Autres flux<\/td><td>Tous<\/td><td>Tous<\/td><td>Bloqu\u00e9<\/td><td>S\u00e9curit\u00e9 par d\u00e9faut<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Sch\u00e9ma des flux<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Internet<br>   |<br>   | autoris\u00e9 : TCP 80 \/ 443<br>   v<br>16.0.0.1 sur R1<br>   |<br>   | NAT\/PAT<br>   v<br>Serveur DMZ 10.0.0.129<br><br><br>VLAN10<br>   | autoris\u00e9 : HTTP vers serveur<br>   | autoris\u00e9 : sortie Internet<br>   v<br>Serveur DMZ \/ Internet<br><br><br>VLAN20<br>   | autoris\u00e9 : HTTP vers serveur<br>   | bloqu\u00e9 : sortie Internet g\u00e9n\u00e9rale<br>   v<br>Serveur DMZ<br><br><br>VLAN30 serveur<br>   | autoris\u00e9 : r\u00e9ponses TCP \u00e9tablies<br>   | bloqu\u00e9 : initiation vers LAN<br>   v<br>LAN interne<br><br><br>VLAN99 admin<br>   | autoris\u00e9 : acc\u00e8s aux r\u00e9seaux internes<br>   v<br>VLAN10 \/ VLAN20 \/ VLAN30 \/ \u00e9quipements r\u00e9seau<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Points importants<\/h2>\n\n\n\n<p>Les r\u00e8gles ACL sont lues de haut en bas.<br>La premi\u00e8re r\u00e8gle qui correspond au trafic est appliqu\u00e9e.<br>Si aucune r\u00e8gle ne correspond, le trafic est bloqu\u00e9 par le deny implicite.<\/p>\n\n\n\n<p>Dans ce lab, des <code>deny ip any any<\/code> sont ajout\u00e9s explicitement pour rendre le filtrage plus visible lors des tests.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Commandes de v\u00e9rification<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>show access-lists<br>show ip interface brief<br>show ip nat translations<br>show ip nat statistics<\/code><\/pre>\n\n\n\n<p>Pour v\u00e9rifier o\u00f9 une ACL est appliqu\u00e9e :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>show running-config | section interface<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">\u00c0 retenir<\/h2>\n\n\n\n<p>Ce lab montre une architecture s\u00e9curis\u00e9e simple :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>VLAN utilisateurs s\u00e9par\u00e9s<br>Serveur isol\u00e9 en DMZ<br>Acc\u00e8s Internet filtr\u00e9<br>Administration s\u00e9par\u00e9e dans un VLAN d\u00e9di\u00e9<br>Publication web contr\u00f4l\u00e9e par NAT\/PAT<\/code><\/pre>\n\n\n\n<p>Les ACL permettent de limiter les communications au strict n\u00e9cessaire et de r\u00e9duire les risques de mouvement lat\u00e9ral entre les zones r\u00e9seau.<audio autoplay=\"\"><\/audio><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Je vous propose ici le lab packet tracer que j&rsquo;ai r\u00e9alis\u00e9 pour p\u00e9parer l&rsquo;\u00e9preuve E6 du BTS Ciel. Je vous joins deux fichiers pkt, un vierge et l&rsquo;autre enti\u00e8rement param\u00e9tr\u00e9. >> https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/pkt_bts_E6.zip \/ Le mot de passe utilis\u00e9 est pwd Le login pour ssh est admin et pwd en mot de passe R\u00e9seaux : VLAN [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,10],"tags":[],"class_list":["post-273","post","type-post","status-publish","format-standard","hentry","category-cisco","category-reseau"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Je vous propose ici le lab packet tracer que j&rsquo;ai r\u00e9alis\u00e9 pour p\u00e9parer l&rsquo;\u00e9preuve E6 du BTS Ciel. Je vous joins deux fichiers pkt, un vierge et l&rsquo;autre enti\u00e8rement param\u00e9tr\u00e9. &gt;&gt; https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/pkt_bts_E6.zip \/ Le mot de passe utilis\u00e9 est pwd Le login pour ssh est admin et pwd en mot de passe R\u00e9seaux : VLAN [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-03T14:40:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-03T15:04:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\\\/PAT\",\"datePublished\":\"2026-05-03T14:40:57+00:00\",\"dateModified\":\"2026-05-03T15:04:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/\"},\"wordCount\":1097,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png\",\"articleSection\":[\"Cisco\",\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/\",\"name\":\"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\\\/PAT - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png\",\"datePublished\":\"2026-05-03T14:40:57+00:00\",\"dateModified\":\"2026-05-03T15:04:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/731ae7a1-9a04-4a5f-8202-4493fead5434.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/731ae7a1-9a04-4a5f-8202-4493fead5434.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/cisco\\\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\\\/PAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/","og_locale":"fr_FR","og_type":"article","og_title":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT - Eryann Breizh SecOps","og_description":"Je vous propose ici le lab packet tracer que j&rsquo;ai r\u00e9alis\u00e9 pour p\u00e9parer l&rsquo;\u00e9preuve E6 du BTS Ciel. Je vous joins deux fichiers pkt, un vierge et l&rsquo;autre enti\u00e8rement param\u00e9tr\u00e9. >> https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/pkt_bts_E6.zip \/ Le mot de passe utilis\u00e9 est pwd Le login pour ssh est admin et pwd en mot de passe R\u00e9seaux : VLAN [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-03T14:40:57+00:00","article_modified_time":"2026-05-03T15:04:51+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434.png","type":"image\/png"}],"author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT","datePublished":"2026-05-03T14:40:57+00:00","dateModified":"2026-05-03T15:04:51+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/"},"wordCount":1097,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#primaryimage"},"thumbnailUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png","articleSection":["Cisco","R\u00e9seau"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/","url":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/","name":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#primaryimage"},"image":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#primaryimage"},"thumbnailUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434-1024x683.png","datePublished":"2026-05-03T14:40:57+00:00","dateModified":"2026-05-03T15:04:51+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#primaryimage","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/731ae7a1-9a04-4a5f-8202-4493fead5434.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/cisco\/lab-cisco-packet-tracer-vlan-on-the-stick-acl-nat-pat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Lab Cisco packet tracer Vlan on the stick + ACL + NAT\/PAT"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":5,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/273\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/273\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}