W11-Presentation-Chapter 9 Access Control Lists
W11-Presentation-Chapter 9 Access Control Lists
Chapter 9
Access Control Lists
Objectives
• Creating an ACL
• Matching on Addresses: Wildcard Masks
• Activating an ACL
• Configuring Standard Numbered ACLs
• Extended Numbered ACLs
• Creating Named ACLs
• Implementing IPv6 ACLs
1. Introduction
• Access Control List (ACL) are filters that enable you to control which routing updates or
packets are permitted or denied in or out of a network.
• They are specifically used by network administrators to filter traffic and to provide extra
security for the network.
• ACLs provide a powerful way to control traffic into and out of your network; this control
can be as simple as permitting or denying network hosts or addresses. You can
configure ACLs for all routed network protocols.
• The most important reason to configure ACLs is to provide security for your network.
However, ACLs can also be configured to control network traffic based on the TCP port
being used.
Why Use ACLs
* Limits network traffic to increase network performance.
* ACLs provides traffic flow control by restricting the delivery of
routing updates.
* It can be used as additional security.
* Controls which type of traffic are forwarded or blocked by the
router.
* Ability to control which areas a client access.
ACL Number Ranges
Protocol Range
Standard 1–99 and 1300–1999
Extended 100–199 and 2000–2699
Ethernet type code 200–299
Ethernet address 700–799
Transparent bridging (protocol type) 200–299
Transparent bridging (vendor code) 700–799
Extended transparent bridging 1100–1199
DECnet and extended DECnet 300–399
Xerox Network Systems (XNS) 400–499
Extended XNS 500–599
AppleTalk 600–699
Source-route bridging (protocol type) 200–299
Source-route bridging (vendor code) 700–799
Internetwork Packet Exchange (IPX) 800–899
Extended IPX 900–999
IPX Service Advertising Protocol (SAP) 1000–1099
Standard Virtual Integrated Network Service 1–100
(VINES)
Extended VINES 101–200
Simple VINES 201–300
2. Standard Access Control Lists (1 – 99 and 1300 - 1999)
In earlier days simple filtering was sufficient. Standard ACLs are used for normal filtering. Standard
ACLs filter the packet based on its source IP address.
Standard ACLs create filters based on source addresses and are used for server based filtering.
Address based access lists distinguish routes on a network you want to control by using network
address number (IP).
The command below defines an ACL that permits this network 192.168.1.0 0.0.0.255.
access-list acl_permit permit ip 192.168.1.0 0.0.0.255
4. Named Access Control Lists
Named Access Control Lists (ACLs) allows standard and extended ACLs to be given
names instead of numbers. Unlike in numbered Access Control Lists (ACLs), we can edit
Named Access Control Lists.
Sample configuration:
R1(config)#ip access-list standard INSIDE_IN
R1(config-std-nacl)#
R1(config-std-nacl)#10 permit 10.1.1.0 0.0.0.255
R1(config-std-nacl)#500 deny any log
R1(config-std-nacl)#exit
R1(config)#int f0/1
R1(config-if)#ip access-group INSIDE_IN in
You can verify your access-list configuration by executing the show access-list command;
R1(config-if)#do show access-list
Standard IP access list INSIDE_IN
10 permit 10.1.1.0, wildcard bits 0.0.0.255
500 deny any log
R1(config-if)#
5. IPv4 ACLs Examples (Standard, Extended and Named)
Network Diagram
This is an example of the use of a standard ACL in order to block all traffic except that from source 10.1.1.x.
This extended ACL is used to permit traffic on the 10.1.1.x network (inside) and to receive ping responses from the outside while it prevents
unsolicited pings from people outside, permitting all other traffic.
This is an example of the use of a Named ACL in order to block all traffic except the Telnet connection from host 10.1.1.2 to host
172.16.1.1.
You use the ipv6 access-class command to apply the ACL to the VTY lines.