Download presentation
Presentation is loading. Please wait.
Published byΘεόκριτος Αλεξόπουλος Modified over 5 years ago
1
ACCESS CONTROL LIST Slides Prepared By Adeel Ahmed,
Updated By, Syed Ameen Quadri.
2
Rules of Access List All deny statements have to be given First There should be at least one Permit statement An implicit deny blocks all traffic by default when there is no match (an invisible statement). Can have one access-list per interface per direction. (i.e.) Two access-list per interface, one in inbound direction and one in outbound direction. Works in Sequential order Editing of access-lists is not possible (i.e) Selectively adding or removing access-list statements is not possible.
3
Standard ACL - Network Diagram
Creation and Implementation is done Closest to the Destination. Standard ACL - Network Diagram /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.1 & 1.2 should not communicate with 2.0 network
4
How Standard ACL Works ? JIZ JAD RYD 1.1 is accessing 2.1 10.0.0.1/8
/8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.1 is accessing 2.1
5
How Standard ACL Works ? access-list 1 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.1 2.1 access-list 1 deny access-list 1 deny access-list 1 permit any
6
How Standard ACL Works ? access-list 1 deny 192.168.1.1 0.0.0.0
Source IP Destination IP 1.1 2.1 access-list 1 deny access-list 1 deny access-list 1 permit any
7
How Standard ACL Works ? JIZ JAD RYD 1.3 is accessing 2.1 10.0.0.1/8
/8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.3 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.3 is accessing 2.1
8
How Standard ACL Works ? x access-list 1 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.1 2.1 x access-list 1 deny access-list 1 deny access-list 1 permit any
9
How Standard ACL Works ? access-list 1 deny 192.168.1.1 0.0.0.0
Source IP Destination IP Source IP 1.1 2.1 access-list 1 deny access-list 1 deny access-list 1 permit any x
10
How Standard ACL Works ? access-list 1 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.1 2.1 access-list 1 deny access-list 1 deny access-list 1 permit any
11
access-list 1 permit any
Source IP Destination IP 1.1 2.1 access-list 1 deny access-list 1 deny access-list 1 permit any
12
Standard ACL - Network Diagram
Creation and Implementation is done Closest to the Destination. Standard ACL - Network Diagram /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.1 & 3.0 should not communicate with 2.0 network
13
How Standard ACL Works ? JIZ JAD RYD 1.1 is accessing 2.1 10.0.0.1/8
/8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.1 is accessing 2.1
14
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.1 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
15
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Destination IP 1.1 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
16
How Standard ACL Works ? JIZ JAD RYD 1.3 is accessing 2.1 10.0.0.1/8
/8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.3 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 1.3 is accessing 2.1
17
How Standard ACL Works ? x access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.3 2.1 x access-list 5 deny access-list 5 deny access-list 5 permit any
18
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Destination IP Source IP 1.3 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any x
19
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 1.3 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
20
access-list 5 permit any
Source IP Destination IP 1.3 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
21
How Standard ACL Works ? JIZ JAD RYD 3.1 is accessing 2.1 10.0.0.1/8
/8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 3.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 3.1 is accessing 2.1
22
How Standard ACL Works ? x access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 3.1 2.1 x access-list 5 deny access-list 5 deny access-list 5 permit any
23
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Source IP Destination IP 3.1 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
24
How Standard ACL Works ? access-list 5 deny 192.168.1.1 0.0.0.0
Source IP Destination IP 3.1 2.1 access-list 5 deny access-list 5 deny access-list 5 permit any
25
Extended ACL - Network Diagram
Creation and Implementation is done Closest to the Source. Extended ACL - Network Diagram /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 2.0 should not access with 3.1 (Web Service)
26
2.1 is accessing 3.1 - Web Service
How Extended ACL Works ? /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 2.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 2.1 is accessing Web Service
27
How Extended ACL Works ? Source IP Destination IP Port - 80 Source IP Destination IP Port - 80 2.1 3.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
28
How Extended ACL Works ? Source IP Destination IP Port - 80 2.1 3.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
29
2.1 is accessing 3.1 – Telnet Service
How Extended ACL Works ? /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 2.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 2.1 is accessing 3.1 – Telnet Service
30
How Extended ACL Works ? x
Source IP Destination IP Port - 23 Source IP Destination IP Port - 23 2.1 3.1 x access-list 101 deny tcp eq 80 access-list 101 permit ip any any
31
How Extended ACL Works ? Source IP Destination IP Port - 23 Source IP Destination IP Port - 23 2.1 3.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
32
How Extended ACL Works ? Source IP Destination IP Port - 23 2.1 3.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
33
2.1 is accessing 1.1 - Web Service
How Extended ACL Works ? /8 S0 /8 S0 JIZ S1 /8 JAD S1 /8 RYD E0 /24 E0 /24 E0 /24 1.1 2.1 1.2 1.3 2.1 2.2 2.3 3.1 3.2 3.3 LAN /24 LAN /24 LAN /24 2.1 is accessing Web Service
34
How Extended ACL Works ? x
Source IP Destination IP Port - 80 Source IP Destination IP Port - 80 2.1 1.1 x access-list 101 deny tcp eq 80 access-list 101 permit ip any any
35
How Extended ACL Works ? Source IP Destination IP Port - 80 Source IP Destination IP Port - 80 2.1 1.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
36
How Extended ACL Works ? Source IP Destination IP Port - 80 2.1 1.1 access-list 101 deny tcp eq 80 access-list 101 permit ip any any
37
(IOS version 11.2 or later allows Named ACL)
Named Access List Access-lists are identified using Names rather than Numbers. Names are Case-Sensitive No limitation of Numbers here. One Main Advantage is Editing of ACL is Possible (i.e) Removing a specific statement from the ACL is possible. (IOS version 11.2 or later allows Named ACL)
38
Standard Named Access List
Creation of Standard Named Access List Router(config)# ip access-list standard <name> Router(config-std-nacl)# <permit/deny> <source address> <source wildcard mask> Implementation of Standard Named Access List Router(config)#interface <interface type><interface no> Router(config-if)#ip access-group <name> <out/in>
39
Extended Named Access List
Creation of Extended Named Access List Router(config)# ip access-list extended <name> Router(config-ext-nacl)# <permit/deny> <protocol> <source address> <source wildcard mask> <destination address> < destination wildcard mask> <operator> <service> Implementation of Extended Named Access List Router(config)#interface <interface type><interface no> Router(config-if)#ip access-group <name> <out/in>
41
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright Microsoft Corp. C:\> telnet Connecting ..... ================================ Welcome to Jizan Router User Access Verification password : **** Jizan> enable password : **** Jizan# show ip route Gateway of last resort is not set C /8 is directly connected, Serial0 R /8 [120/1] via , 00:00:25, Serial0 C /24 is directly connected, Ethernet0 R /24 [120/1] via , 00:00:25, Serial0 R /24 [120/2] via , 00:00:25, Serial0 Jizan#
42
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright Microsoft Corp. C:\> telnet Connecting ..... ================================ Welcome to Jaddah Router User Access Verification password : **** Jaddah> enable password : **** Jaddah# show ip route Gateway of last resort is not set C /8 is directly connected, Serial1 C /8 is directly connected, Serial0 R /24 [120/1] via , 00:00:01, Serial1 C /24 is directly connected, Ethernet0 R /24 [120/1] via , 00:00:12, Serial0 Jaddah#
43
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright Microsoft Corp. C:\> telnet Connecting ..... ================================ Welcome to Riyadh Router User Access Verification password : **** Riyadh> enable password : **** Riyadh# show ip route Gateway of last resort is not set R /8 [120/1] via , 00:00:04, Serial1 C /8 is directly connected, Serial1 R /24 [120/2] via , 00:00:04, Serial1 R /24 [120/1] via , 00:00:04, Serial1 C /24 is directly connected, Ethernet0 Riyadh#
44
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright Microsoft Corp. C:\> telnet Connecting ..... ================================ Welcome to Jaddah Router User Access Verification password : **** Jaddah> enable password : **** Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# interface serial 1 Jaddah(config-if)# ip address Jaddah(config-if)# no shut Jaddah(config-if)# encapsulation hdlc Jaddah(config-if)# interface serial 0 Jaddah(config-if)# ip address Jaddah(config-if)# no shut Jaddah(config-if)# encapsulation hdlc
45
Enter configuration commands, one per line. End with CNTL/Z.
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 1 deny Jaddah(config)# access-list 1 deny Jaddah(config)# Creation of Standard Access List Router(config)# access-list <acl no> <permit/deny> <source address> <source wildcard mask> access-list 1 permit any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 1 out Jaddah(config-if)# Implementation of Standard Access List Router(config)#interface <interface type><interface no> Router(config-if)#ip access-group <number> <out/in>
46
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 1 deny Jaddah(config)# access-list 1 deny Jaddah(config)# access-list 1 permit any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 1 out Jaddah(config-if)# ^Z Jaddah# show ip access-list Standard IP access list 1 deny deny permit any Jaddah#
47
Jaddah# show ip int e0 Jaddah# Ethernet0 is up, line protocol is up
Internet address is /24 Broadcast address is Address determined by non-volatile memory MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is enabled Multicast reserved groups joined: Outgoing access list is 1 Inbound access list is not set Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP multicast fast switching is disabled Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled Probe proxy name replies are disabled Gateway Discovery is disabled Policy routing is disabled Network address translation is disabled Jaddah#
48
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 5 deny Jaddah(config)# access-list 5 deny Jaddah(config)# access-list 5 permit any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 5 out Jaddah(config-if)# ^Z Jaddah# show ip access-list Standard IP access list 5 deny deny permit any Jaddah#
49
Jaddah# show ip int e0 Jaddah# Ethernet0 is up, line protocol is up
Internet address is /24 Broadcast address is Address determined by non-volatile memory MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is enabled Multicast reserved groups joined: Outgoing access list is 5 Inbound access list is not set Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP multicast fast switching is disabled Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled Probe proxy name replies are disabled Gateway Discovery is disabled Policy routing is disabled Network address translation is disabled Jaddah#
50
Enter configuration commands, one per line. End with CNTL/Z.
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 5 deny Jaddah(config)# access-list 5 deny Jaddah(config)# Creation of Standard Access List Router(config)# access-list <acl no> <permit/deny> <source address> <source wildcard mask> access-list 5 permit any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 5 out Jaddah(config-if)# Implementation of Standard Access List Router(config)#interface <interface type><interface no> Router(config-if)#ip access-group <number> <out/in>
51
Enter configuration commands, one per line. End with CNTL/Z.
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 101 deny tcp eq 80 Jaddah(config)# Creation of Extended Access List Router(config)# access-list <acl no> <permit/deny> <protocol> <source address> <source wildcard mask> <destination address> < destination wildcard mask> <operator> <service> access-list 101 permit ip any any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 101 in Jaddah(config-if)# Implementation of Extended Access List Router(config)#interface <interface type><interface no> Router(config-if)#ip access-group <number> <out/in>
52
Jaddah# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Jaddah(config)# access-list 101 deny tcp eq 80 Jaddah(config)# access-list 101 permit ip any any Jaddah(config)# interface ethernet 0 Jaddah(config-if)# ip access-group 101 in Jaddah(config-if)# ^Z Jaddah# show ip access-list Extended IP access list 101 deny tcp host eq www permit ip any any Jaddah#
53
Jaddah# show ip int e0 Jaddah# Ethernet0 is up, line protocol is up
Internet address is /24 Broadcast address is Address determined by non-volatile memory MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is enabled Multicast reserved groups joined: Outgoing access list is not set Inbound access list is 101 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP multicast fast switching is disabled Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled Probe proxy name replies are disabled Gateway Discovery is disabled Policy routing is disabled Network address translation is disabled Jaddah#
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.