Data Communication and Network Management
Data Communication and Network Management
and
Network Management
Lecture
Access Control Lists (ACLs)
Outline
ACL Configurations
Standard ACL
Extended ACL
Named ACL
ACLs
Cont.
Use of ACLs
Cont.
Wildcard Mask
Wildcard Bits to
Match Any IP Address
Wildcard Bits to
Match IP Subnets
Wildcard Mask
Cont.
ACL Configurations
Create ACL
Create ACLs
Standard ACLs
Source
Permit?
S0
Standard ACLs
Cont.
Standard ACLs
Cont.
Standard ACLs
Cont.
Standard ACLs
Cont.
Extended ACLs
Outgoing
Packet
S0
Extended ACLs
Cont.
Extended ACLs
Cont.
Extended ACLs
Cont.
Extended ACLs
Cont.
Apply ACL to an
interface
Placing ACLs
impact on efficiency.
The general rule is to put the Extended ACLs as close as
possible to the source of the traffic denied
destination as possible
Placing ACLs
Cont.
Placing ACLs
Cont.
Named ACLs
Router(config)# ip access-list
{standard | extended} {name}
Advantages of Named
ACLs
Can
use
sequence
anywhere in the
numbers
named ACL
to
insert
statements