ACL
ACL
packets.
security policies.
As a packet passes through a router, the top line of the rule list is
checked first, and the router continues to go down the list until a
match is made.
You don‘t create it, and you can‘t delete it. Thus, access lists
Only one access list per interface, per protocol, per direction is
allowed.
Cont.
Once the lists are built, they can be applied to either inbound or
outbound traffic on any interface.
You can use ACL when you need to filter traffic to deny and allow
packets based on specific features.
There are three important rules that a packet follows when it‘s
being compared with an access list
Rules
The packet is always compared with each line of the access
list in sequential order—it will always start with the first
line of the access list.
Example:
Address: 172.16.1.1
Wild Card Mask: 0.0.0.0
Written out in binary, that looks like:
Address: 10101100.00010000.00000001.00000001
Wild Card Mask: 00000000.00000000.00000000.00000000
There are actually two ways we can match a host:
1. Using a wildcard mask with all bits set to 0 – 172.16.1.1
0.0.0.0
2. Using the keyword ―host‖ – host 172.16.1.1
How would we match all addresses with a wildcard mask?
Address: 0.0.0.0
Wild Card Mask: 255.255.255.255
There are actually two ways we can match all addresses:
I. Using a wildcard mask with all bits set to 1 – 0.0.0.0
255.255.255.255
II. Using the keyword ―any‖ – any
1. Standard access lists
These ACLs use only the source IP address in an IP
packet as the condition test.
Based on the number used when the access list is created, the
router knows which type of syntax to expect as the list is
entered.
access-list [1-99] [permit | deny] [source address] [wildcard mask]
Router(config)#Access-list acl-number {permit|deny}
source address wildcard mask
Router1(config)# access-list 11 deny 192.168.10.0
0.0.0.255
Router(config)# access-list 11 permit any
This tells the list to deny any packets from network 192.168.10.0
Task 1:All traffic from student going to staff
should be blocked
In order to block network 192.168.10.0 (Network 1,which
is student network) from accessing the 192.168.12.0
network(Network 3,which is staff network), we would
create the following access-list on Router 1:
access-list [1-99] [permit | deny] [source address] [wildcard
mask]
Router1(config)# access-list 11 deny 192.168.10.0
0.0.0.255
Router1(config)# access-list 11 permit any
1. The first line allows the 192.168.10.x network access only to port 80 on the
web server.