CCNA Notes

200-301 Exam Prep

Progress0/67

0% complete

Practice TestsNew
1Networking Devices2Interfaces And Cables3OSI Model and TCP/IP Suite4Intro to the CLI5Ethernet LAN Switching - Part 16Ethernet LAN Switching - Part 27IPv4 Addressing - Part 18IPv4 Addressing - Part 29Switch Interfaces10The IPv4 Header11Routing Fundamentals - Part 111Static Routing - Part 212Life of a Packet13Subnetting - Part 114Subnetting - Part 215Subnetting (VLSM) - Part 316VLANs - Part 117VLANs - Part 218VLANs - Part 319DTP / VTP20Spanning Tree Protocol - Part 121Spanning Tree Protocol - Part 222Rapid Spanning Tree Protocol23Etherchannel24Dynamic Routing25RIP / EIGRP26OSPF - Part 127OSPF - Part 228OSPF - Part 329First Hop Redundancy Protocol30TCP and UDP31IPv6 - Part 132IPv6 - Part 233IPv6 - Part 334Standard Access Control List35Extended Access Control List36CDP and LLDP37NTP - Network Time Protocol38DNS - Domain Name System39DHCP - Dynamic Host Configuration Protocol40SNMP - Simple Network Management Protocol41SYSLOG42SSH - Secure Shell43FTP and TFTP44NAT (Static) - Part 145NAT (Dynamic) - Part 246QoS (Voice VLAN) - Part 147QoS (Quality of Service) - Part 248Security Fundamentals49Port Security50DHCP Snooping51Dynamic ARP Inspection52LAN Architectures53WAN Architectures54Virtualization and Cloud - Part 154Virtualization (Containers) - Part 254Virtualization (VRF) - Part 355Wireless Fundamentals56Wireless Architectures57Wireless Security58Wireless Configuration59Introduction to Network Automation60JSON, XML, and YAML61REST APIs62Software Defined Networking63Ansible, Puppet, and Chef67CCNA Complete Cheatsheet
/Standard Access Control List
Topic 344 min read

Standard Access Control List

/
Tip: Select text to highlight or pin your reading position

34. STANDARD ACCESS CONTROL LISTS (ACL)

WHAT ARE ACLs

  • ACLs (Access Control Lists) have multiple uses
  • In DAY 34 and DAY 35, we will focus on ACL’s from a security perspective
  • ACLs function as a “packet filter” - instructing the ROUTER to ALLOW or DENY specific traffic
  • ACLs can filter traffic based on:
    • SOURCE / DESTINATION IP ADDRESSES
    • SOURCE / DESTINATION LAYER 4 PORTS
    • etc.

HOW ACLs WORK

imageClick to enlarge

<aside> 💡 REQUIREMENTS:
  • Hosts in 192.168.1.0/24 should have ACCESS to the 10.0.1.0/24 NETWORK
  • Hosts in 192.168.2.0/24 should not have ACCESS to the 10.0.10/24 NETWORK
</aside>

ACLs are configured GLOBALLY on the ROUTER (Global Config Mode)

  • They are an ordered sequence of ACEs (Access Control Entries)

imageClick to enlarge

  • Configuring an ACL in Global Config Mode will not make the ACL take effect
  • The ACL must be applied to an interface
    • ACLs are applied either INBOUND or OUTBOUND
  • ACLs are made up of one or more ACEs
  • When a ROUTER checks a PACKET against the ACL, it processes the ACEs in order, from top to bottom
  • If the PACKET matches one of the ACEs in the ACL, the ROUTER takes the action and stops processing the ACL. All entries below the matching entry will be ignored

imageClick to enlarge

imageClick to enlarge


IMPLICIT DENY

  • What will happen if a PACKET doesn’t match any of the entries in an ACL ?
  • There is an INPLICIT DENY at the end of ALL ACL’s
  • The IMPLICIT DENY tells the ROUTER to DENY ALL TRAFFIC that doesn’t match ANY of the configured entries in the ACL

ACL TYPES

imageClick to enlarge


STANDARD NUMBERED ACLs

  • Match traffic based only on the SOURCE IP ADDRESS of the PACKET

  • Numbered ACLs are identified with a number (ie: ACL 1, ACL 2, etc.)

  • Different TYPES of ACLs have a different range of numbers that can be used

    <aside> 💡 STANDARD ACLs can use 1-99 and 1300-1999 </aside>
  • The basic command to configure a STANDARD NUMBERED ACL

    • R1(config)# access-list *number* {deny | permit} *ip wildcard-mask*

    This is an example of denying a SPECIFIC host’s traffic

    REMEMBER : 0.0.0.0 wildcard is the same as 255.255.255.255 or a /32 host

    • Example : R1(config)# access-list 1 deny 1.1.1.1 0.0.0.0
    • Example : R1(config)# access-list 1 deny 1.1.1.1(identical to the above)
    • Example : R1(config)# access-list 1 deny host 1.1.1.1

    If you want to permit ANY traffic from ANY source

    • Example : R1(config)# access-list 1 permit any
    • Example : R1(config)# access-list 1 permit 0.0.0.0 255.255.255.255

    If you want to make a description for a specific ACL

    • Example : R1(config)# access-list 1 remark ## BLOCK BOB FROM ACCOUNTING ##

imageClick to enlarge

Order is important. Lower Numbers are processed FIRST


TO APPLY AN ACL TO AN INTERFACE

R1(config-if)# ip access-group *number* {in | out}

imageClick to enlarge

WHY WAS THIS RULE PLACED ON G0/2 OUT ?

<aside> 💡 STANDARD ACLs should be applied as CLOSE to the DESTINATION as possible! </aside>

STANDARD NAMED ACLs

  • Standard ACLs match traffic based only on the SOURCE IP ADDRESS of the PACKET
  • NAMED ACLs are identified with a NAME (ie: ‘BLOCK_BOB’)
  • STANDARD NAMED ACLs are configured by entering ‘standard named ACL config mode’ then configuring EACH entry within that config mode
    • R1(config)# ip access-list standard *acl-name*
    • R1(config-std-nacl)# [*entry-number*] {deny | permit} *ip wildcard-mask*

imageClick to enlarge

imageClick to enlarge

imageClick to enlarge

imageClick to enlarge

Here are the configurations for the above:

imageClick to enlarge

Note, however, how the order is when viewing the ACLs

imageClick to enlarge

WHY THE REORDERING?

imageClick to enlarge

CISCOs PACKET TRACER does not reorder these, however.

PreviousIPv6 - Part 3
NextExtended Access Control List