Chapter 10 - Access Control Lists
Chapter 10 - Access Control Lists
Objectives
On completion of this chapter, you will be able to perform the following tasks: Describe the differences between standard and extended ACLs Explain the rules for placement of ACLs Create and apply named ACLs Use ACLs to restrict virtual terminal access
ACLs are lists of conditions that are applied to traffic traveling across a router's interface. These lists tell the router what kinds of packets to accept and what kinds of packets to deny. Acceptance and denial can be based on specified conditions. ACLs can be created for all routed network protocols to filter packets, such a IP, IPX.
Default Deny Yes Send To the device Yes No Permit packet? Statement Yes List Match? ACLs on Interface?
No
ACL command
access-list
access-list-number Permit Deny test-conditions
ACL numbers
access-list-number
In/Out
One access list per protocol per direction. Standard access lists should be applied closest to the destination. Extended access lists should be applied closest to the source. Use the inbound or outbound interface reference as if looking at the port from inside the router. Statements are processed sequentially from the top of list to the bottom until a match is found, if no match is found then the packet is denied.
Wildcard Mask
-Bit 1 : check
-Bit 0 : ignore
11111110 254 11111100
-Bit 1 : ignore
-Bit 0 : check
00000001 1 00000011
2 4 8 16
252
11111000 248 11110000 240
3
00000111 7 00001111 15
32
64 128 256
11100000
224 11000000 192 10000000 128 00000000 0
00011111
31 0011111 1 63 0111111 1 127 11111111 255
Subnet mask
192.168.1.2 255.255.255.254 192.168.1.8 255.255.255.252 192.168.1.16 255.255.255.248 192.168.1.16 255.255.255.240 192.168.1.0 255.255.255.224 192.168.1.128 255.255.255.192 192.168.1.0 255.255.255.128 192.168.1.0 255.255.255.0
Wildcard mask
192.168.1.2 0. 0 . 0 .1 192.168.1.8 0. 0 . 0 .3 192.168.1.16 0. 0 . 0 .7 192.168.1.16 0. 0 . 0 .15 192.168.1.0 0. 0 . 0 .31 192.168.1.128 0. 0 . 0 .63 192.168.1.0 0. 0 . 0 .127 192.168.1.0 0. 0 . 0 .255
Wildcard any
Wildcard host
STANDARD ACLs
No Yes
Is there a Standard access list On this interface
Yes
No
Move to next statement
Deny
No
Yes
EXTENDED ACLs
No
Yes
Does source address Match ACL list entry
Yes
Permit
Yes
Yes
No
Deny
No
Yes
Deny FTP from subnet 172.16.4.0 to subnet 172.16.3.0 out of E0. Permit all other traffic.
Deny only Telnet from subnet 172.16.4.0 out of E0. Permit all other traffic.
Intuitively identify an ACL using an alphanumeric name. Named ACLs provide the ability to modify ACLs without deleting and then reconfiguring them. Considerations:
IP named ACLs were introduced in Cisco IOS Software Release 11.2. Only allow for statements to be inserted at the end of a list. You cannot use the same name for multiple ACLs. In addition, ACLs of different types cannot have the same name.
show access-lists
Filter addresses that can access into the routers vty ports.
Filter vty access out from the router.
Set up an IP address filter with a standard access list statement. Use line configuration mode to filter access with the access-class command.
vty Commands
Restricts incoming or outgoing vty connections for address in the access list
0 1 2 3 4
Virtual port (VTY 0-4)