Rse Sutcliffe Chapter9
Rse Sutcliffe Chapter9
Presentation_ID
Cisco Confidential
Chapter 9
9.1 IP ACL Operation
Presentation_ID
Cisco Confidential
Chapter 9: Objectives
Explain how ACLs are used to filter traffic. Compare standard and extended IPv4 ACLs.
Presentation_ID
Cisco Confidential
Purpose of ACLs
What is an ACL?
Presentation_ID
Cisco Confidential
Purpose of ACLs
A TCP Conversation
Presentation_ID
Cisco Confidential
Purpose of ACLs
Packet Filtering
Packet filtering, sometimes called static packet filtering, controls access to a network by analyzing the incoming and outgoing packets and passing or dropping them based on given criteria, such as the source IP address, destination IP addresses, and the protocol carried within the packet. A router acts as a packet filter when it forwards or denies packets according to filtering rules. An ACL is a sequential list of permit or deny statements, known as access control entries (ACEs).
Presentation_ID
Cisco Confidential
Purpose of ACLs
Presentation_ID
Cisco Confidential
Purpose of ACLs
ACL Operation
The last statement of an ACL is always an implicit deny. This statement is automatically inserted at the end of each ACL even though it is not physically present. The implicit deny blocks all traffic. Because of this implicit deny, an ACL that does not have at least one permit statement will block all traffic.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Extended ACLs
Presentation_ID
Cisco Confidential
10
Presentation_ID
Cisco Confidential
11
12
Presentation_ID
Cisco Confidential
13
Presentation_ID
Cisco Confidential
14
Presentation_ID
Cisco Confidential
15
Presentation_ID
Cisco Confidential
16
Presentation_ID
Cisco Confidential
17
Configure ACLs for each network protocol configured on the border router interfaces.
Presentation_ID
Cisco Confidential
18
One ACL per direction - ACLs control traffic in one direction at a time on an interface. Two separate ACLs must be created to control inbound and outbound traffic. One ACL per interface - ACLs control traffic for an interface, for example, GigabitEthernet 0/0.
Presentation_ID
Cisco Confidential
19
Presentation_ID
Cisco Confidential
20
Standard ACLs - Because standard ACLs do not specify destination addresses, place them as close to the destination as possible.
Placement of the ACL and therefore the type of ACL used may also depend on: the extent of the network administrators control, bandwidth of the networks involved, and ease of configuration.
21
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
22
Presentation_ID
Cisco Confidential
23
Presentation_ID
Cisco Confidential
24
Example ACL
access-list 2 deny host 192.168.10.10 access-list 2 permit 192.168.10.0 0.0.0.255 access-list 2 deny 192.168.0.0 0.0.255.255 access-list 2 permit 192.0.0.0 0.255.255.255
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
25
To remove the ACL, the global configuration no accesslist command is used. The remark keyword is used for documentation and makes access lists a great deal easier to understand.
Presentation_ID
Cisco Confidential
26
Internal Logic
Cisco IOS applies an internal logic when accepting and processing standard access list statements. As discussed previously, access list statements are processed sequentially. Therefore, the order in which statements are entered is important.
Presentation_ID
Cisco Confidential
27
Presentation_ID
Cisco Confidential
28
Presentation_ID
Cisco Confidential
29
Presentation_ID
Cisco Confidential
30
Commenting ACLs
Presentation_ID
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
Presentation_ID
Cisco Confidential
34
Verifying ACLs
Presentation_ID
Cisco Confidential
35
ACL Statistics
Presentation_ID
Cisco Confidential
36
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Extended ACLs
Presentation_ID
Cisco Confidential
40
Presentation_ID
Cisco Confidential
41
Presentation_ID
Cisco Confidential
42
Presentation_ID
Cisco Confidential
43
Presentation_ID
Cisco Confidential
44
Presentation_ID
Cisco Confidential
45
Presentation_ID
Cisco Confidential
46
Presentation_ID
Cisco Confidential
47
If an inbound packet matches an ACL statement with a deny, it is dropped and not routed.
If an inbound packet does not meet any ACL statements, then it is implicitly denied and dropped without being routed.
Presentation_ID
Cisco Confidential
48
Presentation_ID
Cisco Confidential
49
Presentation_ID
Cisco Confidential
50
Presentation_ID
Cisco Confidential
51
Next, the router checks whether the outgoing interface has an ACL. If an ACL exists, the packet is tested against the statements in the list.
If there is no ACL or the packet is permitted, the packet is encapsulated in the new Layer 2 protocol and forwarded out the interface to the next device.
Presentation_ID
Cisco Confidential
52
Presentation_ID
Cisco Confidential
53
Presentation_ID
Cisco Confidential
54
has no connectivity
with 192.168.30.12.
Presentation_ID
Cisco Confidential
55
network.
Presentation_ID
Cisco Confidential
56
Presentation_ID
Cisco Confidential
57
Presentation_ID
Cisco Confidential
58
Presentation_ID
Cisco Confidential
59
Presentation_ID
Cisco Confidential
60
No Wildcard Masks
The prefix-length is used to indicate how much of an IPv6 source or destination address should be matched.
Presentation_ID
Cisco Confidential
61
Presentation_ID
Cisco Confidential
62
Presentation_ID
Cisco Confidential
63
Presentation_ID
Cisco Confidential
64
Restrict Access
Presentation_ID
Cisco Confidential
65
Presentation_ID
Cisco Confidential
66
Chapter 9: Summary
By default a router does not filter traffic. Traffic that enters the router is routed solely based on information within the routing table.
Packet filtering, controls access to a network by analyzing the incoming and outgoing packets and passing or dropping them based on criteria such as the source IP address, destination IP addresses, and the protocol carried within the packet.
A packet-filtering router uses rules to determine whether to permit or deny traffic. A router can also perform packet filtering at Layer 4, the transport layer.
67
Presentation_ID
Cisco Confidential
68
Presentation_ID
Cisco Confidential
69
Presentation_ID
Cisco Confidential
70
Presentation_ID
Cisco Confidential
71
From global configuration mode, use the ipv6 accesslist name command to create an IPv6 ACL. The prefixlength is used to indicate how much of an IPv6 source or destination address should be matched. After an IPv6 ACL is configured, it is linked to an interface using the ipv6 traffic-filter command.
Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
72
Presentation_ID
Cisco Confidential
73