© 1999, Cisco Systems, Inc. www.cisco.com ICND—10-1 Chapter 8 IP 访问控制列表.

Slides:



Advertisements
Similar presentations
Timing: This chapter takes about 2 hours to cover.
Advertisements

Access Control List (ACL)
Configuring and Troubleshooting ACLs
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Access Control Lists John Mowry.
Chapter 9: Access Control Lists
Basic IP Traffic Management with Access Lists
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Introducing ACL Operation.
DCN 多核防火墙快速配置之 目的 NAT 配置 神州数码网络 蒋忠平.
NESCOT CATC1 Access Control Lists CCNA 2 v3 – Module 11.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
Institute of Technology, Sligo Dept of Computing Access Control Lists Semester 3, Chapter 6.
CCNA 2 v3.1 Module 11.
第 4 章 过程与变量的作用范围. 4.1 Visual Basic 的代码模块 Visual Basic 的应用程序是由过程组成的, 过程代码存放在模块中。 Visual Basic 提供了 三类模块,它们是窗体模块、标准模块和类 模块。 窗体模块 窗体模块是大多数 Visual Basic.
Access Lists 1 Network traffic flow and security influence the design and management of computer networks Access lists are permit or deny statements that.
第二章 通信技术基础 谈英姿 东南大学自控系工业自动化教研室. 通信技术基础 2.1 通信的基本概念 2.2 通信协议与网络层次分析 2.3 常用串行通信技术.
 符号表  标识符的作用: 声明部分:定义了各种对象及对应的属性和 使用规则。 程序体:对所定义的对象进行各种操作。 $ididname IdnameAttributeIR  必要性 Token : 新表-符号表(种类、类型等信息):
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
1 Semester 2 Module 11 Access Control Lists (ACLs) Yuda college of business James Chen
CISCO NETWORKING ACADEMY Chabot College ELEC Access Control Lists - Introduction.
© 1999, Cisco Systems, Inc 第十一章 配置 Novell IPX.
Cisco Troubleshooting training 1. day IP addressing, routing and bridging basics OSPF routing protocol BGP routing protocol 2. day Cisco 2600 and 7200.
© 2002, Cisco Systems, Inc. All rights reserved..
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
Inter-VLAN communication 胶州职教中心信息部 李丰龙. Inter-VLAN communication 【 Lab Topology 】
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
- 浙江邮电职业技术学院 - Cisco 发现协议 《网络互联技术》 计算机通信教研室 周成纲 Cisco Discovery Protocol.
常州机电职业技术学院 数控编程与加工技术 精品课程 项目 3 加工中心程序编制 模块 2 方形型腔类零件 上饶职业技术学院 课程负责人:罗根云 2011 年 5 月
Access Control Lists (ACLs)
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Enabling RIP.
Border Gateway Protocol Route Summarization © 2003, Cisco Systems, Inc. All rights reserved. 1.
Access-Lists Securing Your Router and Protecting Your Network.
ACLs ACLs are hard. Read, read, read. Practice, practice, practice ON TEST4.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
项目七: PLC 功能指令应用 带进位循环左移指令 XXXXX. 项目七: PLC 功能指令应用 FX2 系列可编程控制器移位控制指令有移位、循环移位、字移位 及先进先出 FIFO 指令等 10 条指令。 带进位循环右移指令 RCR 带进位循环左移指令 RCL 字右移位指令 WSFR 先入先出读出指令.
表单自定义 “ 表单自定义 ” 功能是用于制作表单的 工具,用数飞 OA 提供的表单自定义 功能能够快速制作出内容丰富、格 式规范、美观的表单。
OSPF. OSPF 协议概述 链路状态信息 RTA RTC RTD RTB 链路状态数据库 每台路由器会将当前正确的链路状态信息向一定 的范围内的所有主机发送 它支持区域的概念,同一区域内的路由器最终都 可以拥有对此区域相同的拓扑描述 每台路由器接收到此信息之后,根据最短路径算 法计算最优的下一跳.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
© 2006, Shenzhen Polytechnic. All rights reserved. 1 Cisco 发现协议 Cisco Discovery Protocol 深圳职业技术学院计算机系网络专业.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Multicasting And Multicast.
Computer Networks and Internets 《计算机网络与因特网》课件 林坤辉
Basic Border Gateway Protocol Path Manipulation Using Route Maps © 2003, Cisco Systems, Inc. All rights reserved. 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 6 Delivery and Forwarding.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Module 7.
Sybex CCNA Chapter 10: Security Instructor & Todd Lammle.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
U niversity of S cience and T echnology of C hina VxWorks 及其应用开发 陈香兰 年 7 月.
ACLs Access Control Lists
Border Gateway Protocol Route Summarization © 2003, Cisco Systems, Inc. All rights reserved. 1.
Extended Access Control Lists. Extended ACLs Can Filter on One or Many Data Fields.
Managing IP Traffic with ACLs
Access Control Lists.
Access Control Lists.
Managing IP Traffic with ACLs
© 2002, Cisco Systems, Inc. All rights reserved.
ACCESS CONTROL LIST Slides Prepared By Adeel Ahmed,
Presentation transcript:

© 1999, Cisco Systems, Inc. ICND—10-1 Chapter 8 IP 访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-2 当网络增长时,管理 IP 网络流量 为什么使用 IP 访问控制列表 ?

© 1999, Cisco Systems, Inc. ICND— Internet 当网络增长时,管理 IP 网络流量 当数据包经过 Router 时,对数据进行筛选 为什么使用 IP 访问控制列表 ?

© 1999, Cisco Systems, Inc. ICND—10-4 IP 访问控制列表应用 Permit or deny packets moving through the router Permit or deny vty access to or from the router Without access lists all packets could be transmitted onto all parts of your network Virtual terminal line access (IP) Transmission of packets on an interface

© 1999, Cisco Systems, Inc. ICND—10-5 标准访问控制列表 – 按照源地址控制 – 通常允许或拒绝整个协议栈 Outgoing Packet E0 S0 Incoming Packet Access List Processes Permit? Source 访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-6 标准访问控制列表 – 检验源地址 – 通常允许或拒绝整个协议栈 扩展访问控制列表 – 检验源地址、目的地址 – 通常允许或拒绝某个单独的协议 Outgoing Packet E0 S0 Incoming Packet Access List Processes Permit? Source and Destination Protocol 访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-7 标准访问控制列表 – 检验源地址 – 通常允许或拒绝整个协议栈 扩展访问控制列表 – 检验源地址、目的地址 – 通常允许或拒绝某个单独的协议 Inbound 和 Outbound 两个方向 Outgoing Packet E0 S0 Incoming Packet Access List Processes Permit? Source and Destination Protocol 访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-8 Inbound Interface Packets N Y Packet Discard Bucket Choose Interface N Access List ? Routing Table Entry ? Y Outbound Interfaces Packet S0 Outbound 访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-9 Outbound Interfaces Packet N Y Packet Discard Bucket Choose Interface Routing Table Entry ? N Packet Test Access List Statements Permit ? Y Outbound 访问控制列表 Access List ? Y S0 E0 Inbound Interface Packets

© 1999, Cisco Systems, Inc. ICND—10-10 Notify Sender Outbound 访问控制列表 If no access list statement matches then discard the packet N Y Packet Discard Bucket Choose Interface Routing Table Entry ? N Y Test Access List Statements Permit ? Y Access List ? Discard Packet N Outbound Interfaces Packet S0 E0 Inbound Interface Packets

© 1999, Cisco Systems, Inc. ICND—10-11 A List of Tests: Deny or Permit Packets to interfaces in the access group Packet Discard Bucket Y Interface(s) Destination Deny Y Match First Test ? Permit

© 1999, Cisco Systems, Inc. ICND—10-12 A List of Tests: Deny or Permit Packets to Interface(s) in the Access Group Packet Discard Bucket Y Interface(s) Destination Deny Y Match First Test ? Permit N DenyPermit Match Next Test(s) ? YY The order of access list statements controls testing

© 1999, Cisco Systems, Inc. ICND—10-13 A List of Tests: Deny or Permit Packets to Interface(s) in the Access Group Packet Discard Bucket Y Interface(s) Destination Deny Y Match First Test ? Permit N DenyPermit Match Next Test(s) ? Deny Match Last Test ? YY N YY Permit

© 1999, Cisco Systems, Inc. ICND—10-14 A List of Tests: Deny or Permit Packets to Interface(s) in the Access Group Packet Discard Bucket Y Interface(s) Destination Deny Y Match First Test ? Permit N DenyPermit Match Next Test(s) ? Deny Match Last Test ? YY N YY Permit Implicit Deny If no match deny all Deny N

© 1999, Cisco Systems, Inc. ICND—10-15 访问控制列表配置的一般原则 访问控制列表编号指明每接口、每协议、每方向一个 访问控制列表。 最严格的语句放在列表最上面。 访问控制列表末尾有一个隐含的拒绝。 先创建访问控制列表,后绑定到接口。 访问控制列表只过滤通过 router 的流量 ; 不过滤由此 router 自己发出的数据。

© 1999, Cisco Systems, Inc. ICND—10-16 访问控制列表配置命令 Step 1: 设置访问控制列表 语句 ( 可以有多条语句 ) access-list access-list-number { permit | deny } { test conditions } Router(config)#

© 1999, Cisco Systems, Inc. ICND—10-17 Step 1: 设置访问控制列表 语句 ( 可以有多条语句 ) Router(config)# Step 2: 在指定的接口启用访问控制列表 { protocol } access-group access-list-number {in | out} Router(config-if)# 访问控制列表配置命令 IP Access lists are numbered 1-99 or access-list access-list-number { permit | deny } { test conditions }

© 1999, Cisco Systems, Inc. ICND—10-18 访问控制列表类型 Number Range/Identifier Access List Type IP 1-99 Standard Standard IP lists (1 to 99) test conditions of all IP packets from source addresses

© 1999, Cisco Systems, Inc. ICND—10-19 Number Range/Identifier Access List Type 访问控制列表类型 IP Standard Extended Standard IP lists (1 to 99) test conditions of all IP packets from source addresses Extended IP lists (100 to 199) can test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports

© 1999, Cisco Systems, Inc. ICND—10-20 Number Range/Identifier IP Name (Cisco IOS 11.2 and later) Name (Cisco IOS F and later) Standard Extended SAP filters Named Standard Extended Named Access List Type IPX 访问控制列表类型 Standard IP lists (1 to 99) test conditions of all IP packets from source addresses Extended IP lists (100 to 199) can test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports Other access list number ranges test conditions for other networking protocols

© 1999, Cisco Systems, Inc. ICND—10-21 Source Address Segment (for example, TCP header) Data Packet (IP header) Frame Header (for example, HDLC) DenyPermit Use access list statements 1-99 标准访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-22 Destination Address Source Address Protocol Port Number Segment (for example, TCP header) Data Packet (IP header) Frame Header (for example, HDLC) Use access list statements 1-99 or to test the packet DenyPermit An Example from a TCP/IP Packet 扩展访问控制列表

© 1999, Cisco Systems, Inc. ICND— :检查相对应的地址位 1 :忽略相对应的地址位 do not check address (ignore bits in octet) = = = = = Octet bit position and address value for bit ignore last 6 address bits check all address bits (match all) ignore last 4 address bits check last 2 address bits Examples 应用 Wildcard Bits 指定 IP 地址

© 1999, Cisco Systems, Inc. ICND—10-24 Example checks all the address bits Abbreviate this wildcard mask using the IP address preceded by the keyword host (host ) Test conditions: Check all the address bits (match all) (checks all bits) An IP host address, for example: Wildcard mask: 应用 Wildcard Bits 指定单个 IP 地址

© 1999, Cisco Systems, Inc. ICND—10-25 Accept any address: Abbreviate the expression using the keyword any Test conditions: Ignore all the address bits (match any) (ignore all) Any IP address Wildcard mask: 应用 Wildcard Bits 指定任 意 IP 地址

© 1999, Cisco Systems, Inc. ICND—10-26 Check for IP subnets /24 to /24 Network Network.host Wildcard mask: | | | = = =18 : =31 Address and wildcard mask: 应用 Wildcard Bits 指定一个 IP 地址范围

© 1999, Cisco Systems, Inc 配置标准访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-28 配置标准访问控制列表 access-list access-list-number {permit|deny} source [mask] Router(config)# Sets parameters for this list entry IP standard access lists use 1 to 99 Default wildcard mask = “no access-list access-list-number” removes entire access-list

© 1999, Cisco Systems, Inc. ICND—10-29 access-list access-list-number {permit|deny} source [mask] Router(config)# Activates the list on an interface Sets inbound or outbound testing Default = Outbound “no ip access-group access-list-number” removes access-list from the interface Router(config-if)# ip access-group access-list-number { in | out } Sets parameters for this list entry IP standard access lists use 1 to 99 Default wildcard mask = “no access-list access-list-number” removes entire access-list 配置标准访问控制列表

© 1999, Cisco Systems, Inc. ICND— E0 S0 E1 Non 配置标准访问控制列表 Example 1 access-list 1 permit (implicit deny all - not visible in the list) (access-list 1 deny )

© 1999, Cisco Systems, Inc. ICND—10-31 Permit 只允许本地网络的访问 access-list 1 permit (implicit deny all - not visible in the list) (access-list 1 deny ) interface ethernet 0 ip access-group 1 out interface ethernet 1 ip access-group 1 out E0 S0 E1 Non 配置标准访问控制列表 Example 1

© 1999, Cisco Systems, Inc. ICND—10-32 Deny 一个特定主机 配置标准访问控制列表 Example E0 S0 E1 Non access-list 1 deny

© 1999, Cisco Systems, Inc. ICND—10-33 配置标准访问控制列表 Example E0 S0 E1 Non Deny 一个特定主机 access-list 1 deny access-list 1 permit (implicit deny all) (access-list 1 deny )

© 1999, Cisco Systems, Inc. ICND—10-34 access-list 1 deny access-list 1 permit (implicit deny all) (access-list 1 deny ) interface ethernet 0 ip access-group 1 out 配置标准访问控制列表 Example E0 S0 E1 Non Deny 一个特定主机

© 1999, Cisco Systems, Inc. ICND—10-35 Deny 一个特定子网 配置标准访问控制列表 Example E0 S0 E1 Non access-list 1 deny access-list 1 permit any (implicit deny all) (access-list 1 deny )

© 1999, Cisco Systems, Inc. ICND—10-36 access-list 1 deny access-list 1 permit any (implicit deny all) (access-list 1 deny ) interface ethernet 0 ip access-group 1 out 配置标准访问控制列表 Example E0 S0 E1 Non Deny 一个特定子网

© 1999, Cisco Systems, Inc 用访问控制列表控制 VTY 线路访问

© 1999, Cisco Systems, Inc. ICND—10-38 过滤 VTY 访问 5 条 VTY 线路 (0 —— 4) 筛选能够到达 Router 端口的地址 筛选 Router vty out 方向的流量 Virtual ports (vty 0 through 4) Physical port e0 (Telnet) Console port (direct connect) console e0

© 1999, Cisco Systems, Inc. ICND—10-39 如何控制 vty 访问 Virtual ports (vty 0 through 4) Physical port (e0) (Telnet) Setup IP address filter with standard access list statement Use line configuration mode to filter access with the access-class command Set identical restrictions on all vtys Router# e0

© 1999, Cisco Systems, Inc. ICND—10-40 Virtual Terminal Line Commands Enters configuration mode for a vty or vty range Restricts incoming or outgoing vty connections for address in the access list access-class access-list-number {in|out} line vty#{vty# | vty-range} Router(config)# Router(config-line)#

© 1999, Cisco Systems, Inc. ICND—10-41 Virtual Terminal Access Example Permits only hosts in network to connect to the router’s vtys access-list 12 permit ! line vty 0 4 access-class 12 in Controlling Inbound Access

© 1999, Cisco Systems, Inc 配置扩展访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-43 标准 VS 扩展访问控制列表 StandardExtended 基于源地址筛选 基于源地址、目的地址筛选 Permit 、 deny 整个 TCP/IP 协议栈. 可以指定某个 TCP/IP 协议 与端口号 编号 100~199 编号 1~99

© 1999, Cisco Systems, Inc. ICND—10-44 配置扩展访问控制列表 Router(config)# Sets parameters for this list entry access-list access-list-number { permit | deny } protocol source source-wildcard [operator port] destination destination-wildcard [ operator port ] [ established ] [log]

© 1999, Cisco Systems, Inc. ICND—10-45 Router(config-if)# ip access-group access-list- number { in | out } 配置扩展访问控制列表 Activates the extended list on an interface Sets parameters for this list entry Router(config)# access-list access-list-number { permit | deny } protocol source source-wildcard [operator port] destination destination-wildcard [ operator port ] [ established ] [log]

© 1999, Cisco Systems, Inc. ICND—10-46 Deny FTP from subnet to subnet out of E0 Permit all other traffic E0 S0 E1 Non 扩展访问控制列表 Example 1 access-list 101 deny tcp eq 21 access-list 101 deny tcp eq 20

© 1999, Cisco Systems, Inc. ICND—10-47 Deny FTP from subnet to subnet out of E0 Permit all other traffic 扩展访问控制列表 Example E0 S0 E1 Non access-list 101 deny tcp eq 21 access-list 101 deny tcp eq 20 access-list 101 permit ip any any (implicit deny all) (access-list 101 deny ip )

© 1999, Cisco Systems, Inc. ICND—10-48 access-list 101 deny tcp eq 21 access-list 101 deny tcp eq 20 access-list 101 permit ip any any (implicit deny all) (access-list 101 deny ip ) interface ethernet 0 ip access-group 101 out Deny FTP from subnet to subnet out of E0 Permit all other traffic 扩展访问控制列表 Example E0 S0 E1 Non

© 1999, Cisco Systems, Inc. ICND—10-49 Deny only Telnet from subnet out of E0 Permit all other traffic 扩展访问控制列表 Example E0 S0 E1 Non access-list 101 deny tcp any eq 23

© 1999, Cisco Systems, Inc. ICND—10-50 Deny only Telnet from subnet out of E0 Permit all other traffic 扩展访问控制列表 Example E0 S0 E1 Non access-list 101 deny tcp any eq 23 access-list 101 permit ip any any (implicit deny all)

© 1999, Cisco Systems, Inc. ICND—10-51 access-list 101 deny tcp any eq 23 access-list 101 permit ip any any (implicit deny all) interface ethernet 0 ip access-group 101 out Deny only Telnet from subnet out of E0 Permit all other traffic 扩展访问控制列表 Example E0 S0 E1 Non

© 1999, Cisco Systems, Inc. ICND—10-52 将扩展访问控制列表靠近源地址 将标准访问控制列表靠近目的地址 E0 E1 S0 To0 S1 S0 S1 E0 B A C 在哪里放置访问控制列表 Recommended: D

© 1999, Cisco Systems, Inc. ICND—10-53 wg_ro_a#show ip int e0 Ethernet0 is up, line protocol is up Internet address is /24 Broadcast address is Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is 1 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP Feature Fast switching turbo vector IP multicast fast switching is enabled IP multicast distributed fast switching is disabled 验证访问控制列表

© 1999, Cisco Systems, Inc. ICND—10-54 查看访问控制列表语句 wg_ro_a#show access-lists Standard IP access list 1 permit permit permit permit Extended IP access list 101 permit tcp host any eq telnet permit tcp host any eq ftp permit tcp host any eq ftp-data wg_ro_a#show {protocol} access-list {access-list number} wg_ro_a#show access-lists {access-list number}