Access Control Lists: Overview and Guidelines: in This Chapter
Access Control Lists: Overview and Guidelines: in This Chapter
Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on) to filter the packets of those protocols as the packets pass through a router. You can configure access lists at your router to control access to a network: access lists can prevent certain traffic from entering or exiting a network.
In This Chapter
This chapter describes access lists as part of a security solution. This chapter includes tips, cautions, considerations, recommendations, and general guidelines for how to use access lists. This chapter has these sections:
About Access Control Lists Overview of Access List Configuration Finding Complete Configuration and Command Information for Access Lists
What Access Lists Do Why You Should Configure Access Lists When to Configure Access Lists Basic Versus Advanced Access Lists
SC-177
Access Control Lists: Overview and Guidelines About Access Control Lists
Access list criteria could be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other information. Note that sophisticated users can sometimes successfully evade or fool basic access lists because no authentication is required.
Host A
Host B
You can also use access lists to decide which types of traffic are forwarded or blocked at the router interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all Telnet traffic.
SC-178
S5032
Access Control Lists: Overview and Guidelines Overview of Access List Configuration
On these routers, you should configure access lists for each network protocol configured on the router interfaces. You can configure access lists so that inbound traffic or outbound traffic or both are filtered on an interface. Access lists must be defined on a per-protocol basis. In other words, you should define access lists for every protocol enabled on an interface if you want to control traffic flow for that protocol.
Note
Note that some protocols refer to access lists as filters and refer to the act of applying the access lists to interfaces as filtering.
SC-179
Access Control Lists: Overview and Guidelines Overview of Access List Configuration
The protocols for which you can configure access lists are identified in Table 16. This section has the following sections:
Assigning a Unique Name or Number to Each Access List Defining Criteria for Forwarding or Blocking Packets Creating and Editing Access List Statements on a TFTP Server
Note
Access lists of some protocols must be identified by a name, and access lists of other protocols must be identified by a number. Some protocols can be identified by either a name or a number. When a number is used to identify an access list, the number must be within the specific range of numbers that is valid for the protocol. You can specify access lists by names for the following protocols:
Apollo Domain IP IPX ISO CLNS NetBIOS IPX Source-route bridging NetBIOS
You can specify access lists by numbers for the protocols listed in Table 16. Table 16 also lists the range of access list numbers that is valid for each protocol.
Table 16 Protocols with Access Lists Specified by Numbers
Protocol IP Extended IP Ethernet type code Ethernet address Transparent bridging (protocol type) Transparent bridging (vendor code) Extended transparent bridging DECnet and extended DECnet XNS Extended XNS AppleTalk Source-route bridging (protocol type) Source-route bridging (vendor code)
Range 199, 13001999 100199, 20002699 200299 700799 200299 700799 11001199 300399 400499 500599 600699 200299 700799
SC-180
Access Control Lists: Overview and Guidelines Overview of Access List Configuration
Table 16
Protocol IPX Extended IPX IPX SAP Standard VINES Extended VINES Simple VINES
Note
For most protocols, if you define an inbound access list for traffic filtering, you should include explicit access list criteria statements to permit routing updates. If you do not, you might effectively lose communication from the interface when routing updates are blocked by the implicit deny all traffic statement at the end of the access list.
SC-181
Access Control Lists: Overview and Guidelines Overview of Access List Configuration
Note
The first command of an edited access list file should delete the previous access list (for example, type a no access-list command at the beginning of the file). If you do not first delete the previous version of the access list, when you copy the edited file to your router you will merely be appending additional criteria statements to the end of the existing access list.
Note
Access lists that are applied to interfaces do not filter traffic that originates from that router.
SC-182
Access Control Lists: Overview and Guidelines Finding Complete Configuration and Command Information for Access Lists
SC-183
Access Control Lists: Overview and Guidelines Finding Complete Configuration and Command Information for Access Lists
SC-184