Introducing ACL Operation: Access Control Lists
Introducing ACL Operation: Access Control Lists
Operation
http://vnexperts.net
ICND1 v1.01-1
ICND1 v1.01-2
Without ACLs, all packets could be transmitted to all parts of your netwo
http://vnexperts.net
ICND1 v1.01-3
ICND1 v1.01-4
ICND1 v1.01-5
http://vnexperts.net
ICND1 v1.01-6
Types of ACLs
Standard ACL
Checks source address
Generally permits or denies entire protocol suite
Extended ACL
Checks source and destination address
Generally permits or denies specific protocols and applications
ICND1 v1.01-7
ICND1 v1.01-8
ICND1 v1.01-9
ICND1 v1.01-10
Dynamic ACLs
ICND1 v1.01-11
Reflexive ACLs
http://vnexperts.net
ICND1 v1.01-12
Time-Based ACLs
http://vnexperts.net
ICND1 v1.01-13
ICND1 v1.01-14
http://vnexperts.net
ICND1 v1.01-15
0.0.0.0 255.255.255.255
ignores all address bits
Abbreviate expression
with the keyword any
http://vnexperts.net
ICND1 v1.01-16
Summary
ACLs can be used for IP packet filtering or to identify traffic to
assign it special handling.
ACLs perform top-down processing and can be configured for
incoming or outgoing traffic.
You can create an ACL using a named or numbered ACL. Named
or numbered ACLs can be configured as standard or extended
ACLs, which determines what they can filter.
Reflexive, dynamic, and time-based ACLs add more functionality
to standard and extended ACLs.
In a wildcard bit mask, a 0 bit means to match the corresponding
address bit and a 1 bit means to ignore the corresponding
address bit.
http://vnexperts.net
ICND1 v1.01-17