page 1 chapter 11 ccna2 chapter 11 access control lists : creating acls, using wildcard mask bits,...
TRANSCRIPT
![Page 1: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/1.jpg)
Page 1
Chapter 11
CCNA2 Chapter 11
Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs
![Page 2: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/2.jpg)
Page 2
Chapter 11
ACLs are instructions that are applied to router’s interfaces.
The ACLs tell what kind of packets to accept or deny.
Acceptance / denial can be based on:
• source address
• destination address
• port number
ACLs are configured at the router to control access to a network or subnet.
ACLs must be defined separately for each protocol; one for IP, one for IPX; one for AppleTalk, etc. Some times they are called packet filters.
ACL – Access Control Lists
![Page 3: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/3.jpg)
Page 3
Chapter 11
• limit network traffic, hence increase network performancei.e. packets can be processed before other traffic
• provide traffic flow - limit traffic through the network
• provide for security
• decide which traffic is blocked and forwarded
Reasons to create ACLs
![Page 4: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/4.jpg)
Page 4
Chapter 11
Cisco IOS checks the packet and Upper - layer headers for
• destination address
• source address
• protocol
• port number
The ACL statements are checked in sequential order and when there is a match, no more checks are made. If there are no matches, then the packet is discarded.
IF additional statements are needed for an ACL, one must delete the ACL statements and re-create a new ACL. (If additional statements are added at the end, then one does not have to delete the ACL statements.)
![Page 5: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/5.jpg)
Page 5
Chapter 11
When a packet enters an interface
1) checks if there are ACLs
If there are, then tests against the conditions. If pass, then
2) checks the packet against the routing tables
Then the destination interface
1) checks for ACLs
If there are, then test against the conditions. If pass, then
2) sent out the interface
![Page 6: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/6.jpg)
Page 6
Chapter 11
ACL statements operate in logical, sequential order. When there is a match, the rest of the conditions are not checked.
If all the ACL statements are not matched, then there is implicit deny any.
access-list 10 { permit | deny } { test conditions }
access-list 10 { permit | deny } { test conditions }
access-list 10 { permit | deny } { test conditions }
access-list 10 { permit | deny } { test conditions }
access-list 10 { permit | deny } { test conditions }
access-list 10 deny anyaccess-list 10 deny any
![Page 7: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/7.jpg)
Page 7
Chapter 11
Two types of IP ACL :
• standard - has access list value of 1- 99
• extended - has access list value of 100 - 199
Must be in global configuration mode. Router (config) #
Steps in creating ACLs:
1) create the ACL (in global configuration mode)
2) apply the ACL to an interface
ACLs can be written to filter:
• inbound traffic, or
• outbound traffic
![Page 8: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/8.jpg)
Page 8
Chapter 11
Standard ACLs are placed as close as possible to the destination.
Extended ACLs are placed as close as possible to the source.
Where to place ACLs
![Page 9: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/9.jpg)
Page 9
Chapter 11
Create:
Router(config)# access-list <ACL number> { permit | deny } { test conditions }
Router(config)# access-list 1 permit { test conditions }
Router(config)# access-list 50 deny { test conditions }
Apply:
At an interface:
Router(config)# int E0
Router(config-if)# { protocol } access-group <ACL number> [in | out]
Out is the default if not mentioned
Router(config-if)# ip access-group 1
Router(config-if)# ip access-group 50
To delete all ACL statements of an access-list
Router(config)# no access-list <ACL number>
Router(config)# no access-list 50
![Page 10: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/10.jpg)
Page 10
Chapter 11
A wildcard mask is matched with an IP address or protocol address.
It is a 32 bit mask divided into 4 octets, each containing 8 bits.
A 0 in the mask means to check the bit.
A 1 in the mask means ignore the bit.
![Page 11: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/11.jpg)
Page 11
Chapter 11
To permit any address:
0.0.0.0 255.255.255.255
Address wildcard mask
Use the abbreviation any
Router(config)# access-list 1 permit 0.0.0.0 255.255.255.255
Router(config)# access-list 1 permit any
Abbreviations
![Page 12: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/12.jpg)
Page 12
Chapter 11
To match all the bits of IP address:
EX: 172. 30.16. 29 0. 0. 0. 0
Router(config)# access-list 1 permit 172.30.16.29 0.0.0.0
Router(config)# access-list 1 permit host 172.30. 16.29
Abbreviations
![Page 13: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/13.jpg)
Page 13
Chapter 11
Criteria:
• block all traffic from a network
• allow all traffic from a network
• deny entire protocol suits
Standard ACLs only check the source address.
Router(config)# access-list <ACL number> { deny | permit } source [ source wildcard] [log]
Standard ACLs
![Page 14: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/14.jpg)
Page 14
Chapter 11
What does this statement perform:
access-list 33 permit 172.16.0.0 0.0.255.255 log
Permits all traffic from 172.16.0.0 and sends messages to the console every time the access list is hit.
Standard ACLs
![Page 15: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/15.jpg)
Page 15
Chapter 11
What does this statement perform:
access-list 44 deny 172.16.13.7 0.0.0.0 log
Denies traffic from host 172.16.13.7 and sends messages to the console every time the access list is hit.
Standard ACLs
![Page 16: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/16.jpg)
Page 16
Chapter 11
What does this statement perform:
access-list 55 deny 172.16.64.0 0.0.0.255
Denies all traffic from network 172.16.64.0
Standard ACLs
![Page 17: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/17.jpg)
Page 17
Chapter 11
The log command:
Prints messages to the console:
includes the ACL number, whether the packet was permitted or denied, the source address, and the number of packets.
The message is generated for the first packet that matches, and then at five-minute intervals, including the number of packets permitted or denied in the prior five-minute interval.
Use for debugging. Not used for live networks.
Standard ACLs
![Page 18: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/18.jpg)
Page 18
Chapter 11
Example of applying the access-list (note: it is at the interface):
Router(config-if)# ip access-group 33 in
Router(config-if)# ip access-group 44 out
Router(config-if)# ip access-group 44
Standard ACLs
![Page 19: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/19.jpg)
Page 19
Chapter 11
To monitor IP access list: (at the EXEC mode)
show access-list
Displays all access lists and their parameters configured on the router. (Does not show which interface the list is set on.)
show access-list <ACL number>
Shows only the parameters for the access list <ACL number>. (Does not show the interface the list is set on.)
show ip access-list
Shows only the IP access lists configured on the router
show ip interface
Shows which interfaces have access lists set.
show running-config
Shows the access lists and which interfaces have access lists set
Standard ACLs
![Page 20: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/20.jpg)
Page 20
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
R(config)# access-list 1 permit 172.16.0.0 0.0.255.255
R(config)# Interface E0
R(config-if)# ip access-group 1 out
R(config)# Interface E1
R(config-if)# ip access-group 1 out
What does it do?
E0 E1
S0
172.16.4.13
server
Standard ACLs
![Page 21: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/21.jpg)
Page 21
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
R(config)# access-list 1 permit 172.16.0.0 0.0.255.255
R(config)# Interface E0
R(config-if)# ip access-group 1 out
R(config)# Interface E1
R(config-if)# ip access-group 1 out
Allows only traffic from source network 172.16.0.0 to be forwarded and non-172.16.0.0 traffic is blocked.
E0 E1
S0
172.16.4.13
server
Standard ACLs
![Page 22: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/22.jpg)
Page 22
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
R(config)# access-list 1 deny 172.16.4.13 0.0.0.0
R(config)# access-list 1 permit any
R(config)# Interface E0
R(config-if)# ip access-group 1 out
What does this do?
E0 E1
S0
172.16.4.13
server
Standard ACLs
![Page 23: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/23.jpg)
Page 23
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
R(config)# access-list 1 deny 172.16.4.13 0.0.0.0
R(config)# access-list 1 permit any
R(config)# Interface E0
R(config-if)# ip access-group 1 out
Denies traffic from a specific device, 172.16.4.13 and allows all other traffic thru E0 to network 172.16.3.0.
E0 E1
S0
172.16.4.13
server
Standard ACLs
![Page 24: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/24.jpg)
Page 24
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
Interface E0
ip access-group 1 out
What does this do?
E0 E1
S0
172.16.4.13
Standard ACLs
![Page 25: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/25.jpg)
Page 25
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
Interface E0
ip access-group 1 out
Denies traffic from the subnet, 172.16.4.0 and allows all other traffic thru E0 to network 172.16.3.0.
E0 E1
S0
172.16.4.13
Standard ACLs
![Page 26: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/26.jpg)
Page 26
Chapter 11
Criteria:
• check for both source and destination packet addresses
• check for specific protocol
• check for specific port numbers
• permit or denied pings / telnets / FTP, etc.
• for IP, the ACL values range between 100 - 199
Extended ACLs
![Page 27: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/27.jpg)
Page 27
Chapter 11
Port Numbers (decimal) IP Protocol
20 FTP data
21 FTP program (control)
23 Telnet
25 Simple Mail Transport Protocol (SMTP)
53 DNS
69 TFTP
Extended ACLs
![Page 28: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/28.jpg)
Page 28
Chapter 11
Router(config)# access-list <ACL number> { permit | deny } protocol source source-mask
destination destination-mask operator operand {established}
ACL number100 - 199
permit | denyEntry is allowed or blocks the specified address
protocol IP, TCP, UDP, ICMP, GRE or IGRP
source Source address
source-maskACL wildcard mask
destination Destination address
destination-maskACL wildcard mask
Extended ACLs
![Page 29: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/29.jpg)
Page 29
Chapter 11
Router(config)# access-list <ACL number> { permit | deny } protocol source source-mask
destination destination-mask operator operand [established]
operatorlt, gt, eq, neq
OperandPort number
established Allows TCP traffic to pass if the packet uses an established connection ( for example, has ACK bits set ).
access-list 101 permit tcp 172.16.4.0 0.0.0.255 any eq 25
Extended ACLs
![Page 30: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/30.jpg)
Page 30
Chapter 11
Assign the ACL to an interface:
Router(config-if)# ip access-group <ACL number> { in | out }
NOTE: out is the default (though with the present IOS, you have to put out).
Router(config)# int E0
Router(config-if)# ip access-group 101 in
Extended ACLs
![Page 31: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/31.jpg)
Page 31
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 permit ip 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
Interface E0
ip access-group 101
What does this do?
E0 E1
S0
172.16.4.13
Extended ACLs
![Page 32: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/32.jpg)
Page 32
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 permit ip 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
Interface E0
ip access-group 101
Blocks FTP traffic from all host on 172.16.4.0 to any device on 172.16.3.0 and allows all other traffic to 172.16.3.0
E0 E1
S0
172.16.4.13
Extended ACLs
![Page 33: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/33.jpg)
Page 33
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 23
access-list 101 permit ip any any
Interface E0
ip access-group 101
What does this do?
E0 E1
S0
172.16.4.13
Extended ACLs
![Page 34: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/34.jpg)
Page 34
Chapter 11
172.16.3.0 172.16.4.0
Non-172.16.0.0
access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 23
access-list 101 permit ip any any
Interface E0
ip access-group 101
Denies only telnet traffic from 172.16.4.0 to 172.16.3.0 network andpermits all other traffic thru E0 to any address.
E0 E1
S0
172.16.4.13
Extended ACLs
![Page 35: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/35.jpg)
Page 35
Chapter 11
NOTE:
Standard ACL numbers: 1-99; 1300-1999
Extended ACL numbers: 100-199; 2000-2699
Extended/Standard ACL numbers for IP
![Page 36: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/36.jpg)
Page 36
Chapter 11
One can not add ACL statements to the access-list (except at the end of the list).
The access list must be deleted first, and then rewritten.
That is why it is a good idea to first write your access-list in text (using Notepad), and then transfer it to your router.
Outbound filters do not affect traffic originating from the local router!
Extended/Standard ACL
![Page 37: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/37.jpg)
Page 37
Chapter 11
NOTE:
• named ACLs are not compatible with Cisco IOS release prior to Release 11.2
• cannot use the same name for multiple ACLs.
Ex. Can’t specify a standard ACL named XYZ and an extended ACL with same name.
• can be used both for standard and extended
• use an alphanumeric string instead of the ACL number (1 - 199 )
•use Named ACLs to intuitively identify ACLs using an alphanumeric name
• use Named ACLs when having more than 99 standard and 100 extended ACLs to be configured in a router for a given protocol
Configuring Named ACLs
![Page 38: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/38.jpg)
Page 38
Chapter 11
Router(config)# ip access-list { standard | extended } name { deny | permit } { commands }
ip access-list standard internetfilter deny 172.10.15.0 0.0.0.255
permit 128.88.0.0 0.0.255.255
permit 36.0.0.0 0.0.255.255
ip access-list extended marketing-group permit tcp any 171.69.0.0 0.255.255.255
eq telnet
deny udp any 171.69.0.0 0.255.255.255 lt 1024
Configuring Named ACLs
![Page 39: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/39.jpg)
Page 39
Chapter 11
A named ACL will allow the deletion of statements, but will only allow for the statements to be inserted a the end of the list.
Named ACL
![Page 40: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/40.jpg)
Page 40
Chapter 11
access-list 1 permit 172.16.0.0 0.0.255.255
10101100.00010000.00000000.00000000
00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010000.xxxxxxxx. xxxxxxxx Matched value
Incoming packet with address of 172.18.4.2. Will it be permitted?
Source : 10101100.00010010.00000100.00000010
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010010.xxxxxxxx. xxxxxxxx Result
More Details
![Page 41: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/41.jpg)
Page 41
Chapter 11
access-list 1 permit 172.16.0.0 0.0.255.255
10101100.00010000.00000000.00000000
00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010000.xxxxxxxx. xxxxxxxx Matched value
Incoming packet with address of 172.18.4.2. Will it be permitted?
Source : 10101100.00010010.00000100.00000010
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010010.xxxxxxxx. xxxxxxxx Result
Does the result equal the matched value?
No! The incoming packet will not be permitted.
![Page 42: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/42.jpg)
Page 42
Chapter 11
access-list 1 permit 172.16.0.0 0.0.255.255
10101100.00010000.00000000.00000000
00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010000.xxxxxxxx. xxxxxxxx Matched value
Incoming packet with address of 172.16.4.2. Will it be permitted?
Source : 10101100.00010000.00000100.00000010
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxxx
10101100.00010000.xxxxxxxx. xxxxxxxx Result
Does the result equal the matched value?
Yes! The incoming packet will be permitted.
![Page 43: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/43.jpg)
Page 43
Chapter 11
access-list 1 permit 172.16.0.0 0.0.255.254
10101100.00010000.00000000.00000000
00000000.00000000.xxxxxxxx. xxxxxxx0
10101100.00010000.xxxxxxxx. xxxxxxx0 Matched value
Incoming packet with address of 172.16.4.1. Will it be permitted?
Source : 10101100.00010000.00000100.00000001
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxx0
10101100.00010000.xxxxxxxx. xxxxxxx1 Result
Incoming packet with address of 172.16.4.4. Will it be permitted?
Source : 10101100.00010000.00000100.00000100
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxx0
10101100.00010000.xxxxxxxx. xxxxxxx0 Result
![Page 44: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/44.jpg)
Page 44
Chapter 11
access-list 1 permit 172.16.0.0 0.0.255.254
10101100.00010000.00000000.00000000
00000000.00000000.xxxxxxxx. xxxxxxx0
10101100.00010000.xxxxxxxx. xxxxxxx0 Matched value
Incoming packet with address of 172.16.4.5. Will it be permitted?
Source : 10101100.00010000.00000100.00000101
Wildcard mask: 00000000.00000000.xxxxxxxx. xxxxxxx0
10101100.00010000.xxxxxxxx. xxxxxxx1 Result
Thi access list permits 172.16.4.4, and denies 172.16.4.1 and 172.16.4.5
Permits all even addresses from the network 172.16.0.0
![Page 45: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/45.jpg)
Page 45
Chapter 11
One can permit or deny a block of addresses. However, the blocks must be a power of 2! (Example, 2, 4, 8, 16, 32, 64, 128, etc.)
When we need to specify a range of addresses - choose the closet block size for our needs.
Example: block access to part of a network that is in the range from 172.16.0.8 through 172.16.0.15. This is a block size of 8. Hence:
172.16.0.8 0.0.0.7
Note: the wildcard part is always 1 less than the block size!
Also, in this case for a block of 8, the beginning address must either start at 0, 8, 16, etc.
Permit/Deny blocks of addresses
![Page 46: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/46.jpg)
Page 46
Chapter 11
Example: A subnet whose addresses range from 171.17.2.128 to 171.17.2.191. To divide this network so the top half addresses are permitted and the bottom half are denied to any other network. What is the access list?
The block range is: 64
What is the access-list for the bottom?
access-list 101 deny ip 171.17.2.128 0.0.0.31 any
What is the access-list for the top?
access-list 101 permit ip 171.17.2.159 0.0.0.31 any
Permit/Deny blocks of addresses
![Page 47: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/47.jpg)
Page 47
Chapter 11
What does this do?
access-list 10 deny 172.16.64.0 0.0.63.255
Denies a block of 64 subnetworks starting at 172.16.64.0
Permit/Deny blocks of addresses
![Page 48: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/48.jpg)
Page 48
Chapter 11
To block access through the vty ports in order to control telnet sessions into the router.
Write the ACL as usual but use access-class to apply it.
Example:
Router(config t)# access-list 1 permit 172.16.1.0 0.0.0.255
Router(config t)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco
Router(config-line)# access-class 1 in
Note: only numbered access lists can be applied to virtual lines!
Virtual Terminal ACL
![Page 49: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/49.jpg)
Page 49
Chapter 11
The ‘establish’ option in an access-list occurs only with TCP datagrams. There are cases when one wants to stop a host B from initiating a connection with a host A while permitting A to initiate connections with B.
Macintosh SE¾
Macintosh SE¾
establish
response
establish
A B
Established option
![Page 50: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/50.jpg)
Page 50
Chapter 11
172.16.3.0
172.16.4.0
E0E1
172.16.3.13
INTERNET
Router(config)# access-list 101 permit tcp any 172.16.0.0 0.0.255.255 eq www established
Router(config)# access-list 101 permit icmp any any
Router(config)# access-list 101 permit udp any any eq 53
Router(config)# int E1
Router(config-if)# ip access-group 101 in
Note: established argument is limited to tcp which means UDP, ICMP and all other IP protocols are not matched - and will be denied unless specifically allowed.
Established option
![Page 51: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/51.jpg)
Page 51
Chapter 11
Cisco’s definition:
Standard ACL
Put the ACL as near the destination as possible.
• one might not have access to all the routers
Extended ACL
Put the ACL as close as possible to the source of the traffic denied.
Where to place ACLs?
![Page 52: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/52.jpg)
Page 52
Chapter 11
Allow host 172.16.3.13 with internet connection, but don’t allow the internet to initialize any sessions.
172.16.3.0
172.16.4.0
E0E1
172.16.3.13
INTERNET
Real life example:
![Page 53: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/53.jpg)
Page 53
Chapter 11
172.16.3.0
172.16.4.0
E0E1
172.16.3.13
INTERNET
Router(config)# access-list 101 permit tcp any 172.16.0.0 0.0.255.255 established
Router(config)# access-list 101 permit tcp any host 172.16.3.13 eq. www
Router(config)# int E1
Router(config-if)# ip access-group 101 in
Established option
![Page 54: Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs](https://reader030.vdocuments.us/reader030/viewer/2022032415/56649f175503460f94c2ea61/html5/thumbnails/54.jpg)
Page 54
Chapter 11
172.16.3.0
172.16.4.0
E0E1
172.16.3.13
INTERNET
Router(config)# access-list 101 permit tcp any 172.16.3.13 0.0.0.0 eq www established
Router(config)# int E1
Router(config-if)# ip access-group 101 in
Established option