Notes Acl
Notes Acl
Control List
We show you how to use access control list (ACL) to
enforce IT security policies in your organization.
AMAKIRI WELEKWE TECHNOLOGY ADVISOR | CYBERSECURITY EVANGELIST
UPDATED: February 1, 2022
An Access Control List (ACL) is a tool used to enforce IT
security policies. It specifies which users or system
processes (subjects) are granted access to resources
(objects), as well as what operations are allowed on given
objects.
Any access attempt by a subject to an object which does not have a
matching entry on the ACL configuration will be denied. This means
that how you apply the access list determines what the access list
actually does.
There are many use cases for access lists. For example, if you apply
your access list to…
Standard ACL
Standard ACLs are the oldest type of access control lists. They are
used to filter network traffic by examining the source IP address in a
packet. You create a standard IP access list by using the access-list
numbers ranging from 1–99 or 1300–1999 (expanded range). By
using these numbers, you’re telling the router that you want to create
a standard IP access list, so the router will expect syntax specifying
only the source IP address.
Standard ACLs do not care about where the packets are going to,
rather, they focus on where they’re coming from. When you need to
decide based on both source and destination addresses, a standard
access list won’t allow you to do that since it only decides based on
the source address. The standard ACLs’ inability to look for a
destination address renders it ineffective in such scenarios. This is
where Extended ACL comes into play.
Extended ACL
Named ACL
Named access lists are just another way to create standard and
extended access lists. It allows you to use names to both create and
apply either standard or extended access lists. Named ACLs allows
standard and extended ACLs to be given names instead of numbers.
They are more convenient than numbered access lists because you
can specify a meaningful name that is easier to remember and
associate with a task. You can reorder statements or add statements
to a named access list. The name can be meaningful and indicative of
the list’s purpose. This is particularly important for documentation and
maintenance purposes.
There are two key points on a router that a filtering decision has to be
made as packets pass through the router:
Table 1.0 IP address and subnet mask in binary and decimal format
To calculate your wildcard mask from the subnet mask, just subtract
your subnet mask from 255.255.255.255. For instance, if you are to
subtract the /24 subnet mask from the above address, ie:
255.255.255.255 – 255.255.255.0 = 0.0.0.255. As you can see, you’d
arrive at a wildcard mask of 0.0.0.255. If you are configuring an
access list with an IP address that has a CIDR notation, you should
use a wildcard mask.
Table 2.0 IP address and subnet mask in binary and decimal format
Binary Notation CIDR Notation Decimal
Table 2.0 IP address and subnet mask in binary and decimal format
First and foremost, you need to figure out the access list wildcard
(which is basically the inverse of the subnet mask) and where to place
the access list. Standard access lists, by the rule of thumb, are placed
closest to the destination—in this case, the E0 interface of the
Remote_Router. So in order to achieve this implementation, we will
configure an access control list and apply it on the E0 outbound
interface of the Remote_Router. Here are the required parameters for
this configuration.
Command Remark
As the network manager for the network shown in Figure 1.0 above,
you have been asked to configure an access list that will
stop FTP and Telnet access to the Operations server while allowing
other protocols.
The table below is the breakdown of the access list commands and
configurations that can be used to implement this task:
Command Remark
Remote_Router(config)#access-list 120 deny tcp any 192.168.10.192 Deny FTP access to the Operations
0.0.0.31 eq 21 interface E0
Remote_Router(config)#access-list 120 deny tcp any 192.168.10.192 Deny telnet access to the Operations
0.0.0.31 eq 23 interface E0
Conclusion
ACLs can be an effective tool for increasing the security posture of
your organization. But always remember that no action will be taken
until the access list is applied on an interface in a specific direction.