You are on page 1of 14

Access Control Lists

Computer Networking

Access-List Overview
A Filter through which all traffic must pass
Used to Permit or Deny Access to Network Provides Security

Bandwidth Management
Come in two flavors STANDARD AND EXTENDED

What is an Access-List
A List of Criteria to which all Packets are

compared.
Is this Packet from Network 10.5.2.0
Yes - Forward the Packet No - Check with Next Statement

Is this a Telnet Protocol Packet from 25.25.0.0


Yes - Forward the Packet No - Check Next Statement

Deny All Other Traffic

How an Access-List Works


Packets are compared to Each Statement in

an Access-list SEQUENTIALLY - From the Top Down. The sooner a decision is made the better. Well written Access-lists take care of the most abundant type of traffic first. All Access-lists End with an Implicit Deny All statement

Standard Access Lists


Are given a # from 1-99
Filtering based only on Source Address Should be applied closest to the Destination

Extended Access-lists
Are given a # from 100-199
Much more flexible and complex Can filter based on: Source address Destination address Session Layer Protocol (ICMP, TCP, UDP..) Port Number (80 http, 23 telnet) Should be applied closest to the Source

Two Steps - Create and Apply


Step 1 - Create the Access-list access-list # permit/deny source IP wildcard
# - 1-99 permit/deny - switch the packet or drop it source IP - source IP address to which the packet should be compared. Can also use ANY wildcard - see next page

Step 2 -Apply the Access-list to an Interface Must be in interface config mode (config-if)# IP access-group # in/out (routers point of view)

Wildcards
Allows you to indicate a Range of IP

addresses Two Values are Used:


0 = Must Match Exactly 1 = Does Not Matter

Wildcard Examples
Network Wildcard 195.34.5.12 0.0.0.0 Result: Match all four octets Only 195.34.5.12 is a match Could also use host 195.34.5.12 in place of the wildcard. Host indicates an exact match is needed.

Wildcard Examples
Network

Wildcard 172.16.10.0 0.0.0.255 Result: Match the first three octets exactly but ignore the last octet. 172.16.10.0 thru 172.16.10.255 is a match since the last octet does not matter.

Implementing Access-lists
Remember the Implicit Deny All at the end

of each access-list. Two Approaches:


1. List the traffic you know you want to permit Deny all other traffic 2. List the traffic you want to deny Permit all other traffic (permit any)

Implementing Access-lists
You cannot selectively add or remove

statements from an Access-list Typically modifications are made in a text editor and then pasted to the router as a new access-list. The new access list is then applied and the old one removed Document your Access-list
After each line indicate exactly what that line is supposed to do.

Implementing Access-lists
Verifying Your Access-list Show Access-lists Show IP Interfaces Revisit your access-list after a few days Routers keep track of the number of packets that match each statement in an access-list Use this information to reorder your access-list and thus improve it efficiency Never remove an access-list that is applied

to a port - this can crash a router.

Summary: Access-Lists
Are Created and then Applied to an

interface Are Implemented Sequentially- Top Down End with an implicit Deny ALL statement #1-99 Standard and # 100-199 Extended Standard - source address only Extended - source, destination, protocol, port

You might also like