Title: ACL(Access Control Lists)
1ACL(Access Control Lists)
- Standard , Extended and Named ACL
2Objectives
- In this lesson, you will learn
- Purpose of ACLs
- Its application to an enterprise network
- How ACLs are used to control access
- Types of Cisco ACLs.
- Standard ACL
- Extended ACL
- Named ACL
3ACL (Access Control Lists)
- An ACL is a router configuration script that
controls whether a router permits or denies
packets - By default, a router does not have any ACLs
configured and therefore does not filter traffic.
4Types of ACL
- These are examples of IP ACLs that can be
configured in Cisco IOS Software - Standard ACLs
- Extended ACLs
- IP-named ACLs
- And Others
5Guidelines for using ACLs
- Use ACLs in firewall routers positioned between
your internal network and an external network
such as the Internet. - Use ACLs on a router positioned between two parts
of your network to control traffic entering or
exiting a specific part of your internal network.
- Configure ACLs on border routers, the routers
situated at the edges of your networks to act as
a buffer from the outside network
6ACL Operation - Inbound ACLs
- ACL statements operate in sequential order.
- If a packet header and an ACL statement match,
the rest of the statements in the list are
skipped - If a packet header does not match an statement,
the packet is tested against the next statement
in the list. - A final implied (IMPLICIT DENY) statement covers
all packets for which conditions did not test
true.
7Placement of Standard ACL
access-list 99 deny 192.168.10.0 0.0.0.255
access-list 99 permit any
8Extended ACL
- Extended ACLs
- Extended ACLs filter IP packets based on several
attributes, - protocol type,
- source and IP address, destination IP address,
- source TCP or UDP ports, destination TCP or UDP
ports - In the figure, ACL 102 deny FTP and Telnet
traffic originating from any address on the
192.168.10.0/24 from leaving the network
9Placement of ACLs - Extended.
Access-list 102 deny tcp 192.168.10.0 0.0.0.255
any eq telnet Access-list 102 deny tcp
192.168.10.0 0.0.0.255 any eq ftp Access-list 102
permit any Apply access list inbound to Fa 0/1
interface of R1
10Commenting ACLs
11Standard named ACL
12NACL example
13Extended NACLs
14Editing named ACLs
15Example NetworkControlling inbound access
- Deny all traffic from private IP address
- Allow all IP sessions already established with
the ack bit turned. - deny anyone from entering your network from the
outside with an internal address (spoofing your
network) and log each packet occurrence. - deny the infamous Donald Dick and Prosiak ports.
- deny the Deepthroat and Sockets des Troie ports.
- deny any snmp requests from the outside. SNMP is
a valuable tool to hackers for network discovery.
- permits packets that were not previously rejected
to enter your network.
16ExampleInbound access control list
- access-list 100 deny ip 10.0.0.0 0.255.255.255
any log - access-list 100 deny ip 172.16.0.0 0.15.255.255
any log - access-list 100 deny ip 192.168.0.0 0.0.255.255
any log - access-list 100 deny ip any host 127.0.0.1 log
- access-list 100 permit ip any your network IP
address your network mask est - access-list 100 deny ip your network IP address
your network mask any log - access-list 100 deny tcp any any eq 22222 log
- access-list 100 deny tcp any any range 60000
60020 log - access-list 100 deny udp any any eq snmp log
- access-list 100 permit ip any any
17Explaining commands
- Entry 5permit ip any your network IP address
your network mask estautomatically allows all
IP sessions already established with the ack bit
turned. The purpose of this entry is to ensure
that if your firewall allows a connection request
to leave your network, the router doesnt stop
its return. - Entry 6deny ip your network IP address your
network mask any logdenies anyone from
entering your network from the outside with an
internal address (spoofing your network) and logs
each packet occurrence. This is very important
for good security. - Entry 7deny tcp any any eq 22222 logdenies
the infamous Donald Dick and Prosiak ports. - Entry 8deny tcp any any range 60000 60020
logdenies the Deepthroat and Sockets des Troie
ports. - Entry 9deny udp any any eq snmp logdenies any
snmp requests from the outside. SNMP is a
valuable tool to hackers for network discovery. - Entry 10permit ip any anypermits packets that
were not previously rejected to enter your
network.
18Monitoring and verifying ACLs
19Task Configure standard and Extended ACL