Extended Access Lists
Extended Access Lists
Overview
Extended access lists offer greater flexibility than standard access list due to the fact that you can filter,
not only source IP addresses, but also destination IP addresses, as well as other protocols ports and
services, like TCP port 23 telnet for instance. Since you are able to declare both the source and the
destination addresses, you can apply the extended ACL on the router that is closest to the source
network, this allows you to immediately filter packets from the network, without allowing them to
traverse the entire network before being filtered and dropped; applied in this way extended ACLs can
conserve bandwidth and router resources.
Two Steps:
1. create the access list (standard or extended)
2. apply the access list to an interface (inbound or outbound)
1. Create:
Standard ACL (1-99, and 2000-2699):
denies or permits: 1) source IP address
Extended ACL (100-199):
denies or permits: 1) source IP address, 2) destination IP address, 3) port (service) (optional)
2. Apply:
Where to apply an ACL?
A standard ACL is applied inbound or outbound on the router interface that is closest to the destination
of the traffic.
An extended ACL is applied inbound or outbound on the router interface that is closest to the source of
the traffic.
IOS Commands
Extended access list command formats:
access-list <100-199> <deny | permit> <protocol> <source ip address> <wildcard bits> <destination ip
address> <wildcard bits> <operator> <port or service>
access-list <100-199> <deny | permit> <protocol> host <source ip address> host <destination ip
address> <operator> <port or service>
access-list <100-199> <deny | permit> <protocol> <source ip address> <wildcard bits> <destination ip
address> <wildcard bits>