Network Security v1.0 - Module 8
Network Security v1.0 - Module 8
To facilitate learning, the following features within the GUI may be included in this module:
Feature Description
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Module 8: Access Control
Lists
Module Objective: Implement access control lists (ACLs) to filter traffic and mitigate network attacks on a
network.
Topic Title Topic Objective
Describe standard and extended ACLs.
Introduction to Access Control Lists
Explain how ACLs use wildcard masks.
Wildcard Masks
Explain how to configure ACLs.
Configure ACLs
Use sequence numbers to edit existing standard IPv4 ACLs.
Modify ACLs
Implement ACLs.
Implement ACLs
Use ACLs to mitigate common network attacks.
Mitigate Attacks with ACLs
Configure IPv6 ACLs using CLI.
IPv6 ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
8.1 Introduction to Access
Control Lists
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Introduction to Access Control Lists
What is an ACL?
An ACL is a series of IOS commands that are used to filter packets based on information found in the
packet header.
Task Example
Limit network traffic to increase • A corporate policy prohibits video traffic on the network to reduce the network load.
network performance • A policy can be enforced using ACLs to block video traffic.
Provide traffic flow control • A corporate policy requires that routing protocol traffic be limited to certain links only.
• A policy can be implemented using ACLs to restrict the delivery of routing updates to only those that
come from a known source.
Provide a basic level of security for • Corporate policy demands that access to the Human Resources network be restricted to authorized
network access users only.
• A policy can be enforced using ACLs to limit access to specified networks.
Filter traffic based on traffic type • Corporate policy requires that email traffic be permitted into a network, but that Telnet access be
denied.
• A policy can be implemented using ACLs to filter traffic by type.
Screen hosts to permit or deny • Corporate policy requires that access to some file types (e.g., FTP or HTTP) be limited to user groups.
access to network services • A policy can be implemented using ACLs to filter user access to services.
Provide priority to certain classes • Corporate traffic specifies that voice traffic be forwarded as fast as possible to avoid any interruption.
of network traffic • A policy can be implemented using ACLs and QoS services to identify voice traffic and process it
immediately.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Introduction to Access Control Lists
Packet Filtering
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Introduction to Access Control Lists
Numbered and Named ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Introduction to Access Control Lists
ACL Operation
ACLs define the set of rules that give added control for packets that enter inbound interfaces, packets that
relay through the router, and packets that exit outbound interfaces of the router.
An inbound ACL filters packets before they are routed to the outbound interface. If the packet is permitted
by the ACL, it is then processed for routing. Inbound ACLs are best used to filter packets when the
network attached to an inbound interface is the only source of packets that need to be examined.
An outbound ACL filters packets after being routed, regardless of the inbound interface. Incoming packets
are routed to the outbound interface and then they are processed through the outbound ACL. Outbound
ACLs are best used when the same filter will be applied to packets coming from multiple inbound
interfaces before exiting the same outbound interface.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Introduction to Access Control Lists
Packet Tracer - ACL Demonstration
In this activity, you will observe how an access control list (ACL) can be used to
prevent a ping from reaching hosts on remote networks. After removing the ACL from
the configuration, the pings will be successful.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
8.2 Wildcard Masking
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Wildcard Masking
Wildcard Mask Overview
A wildcard mask is like a subnet mask in that it uses the ANDing process to identify which bits in an IPv4
address to match. However, they differ in the way they match binary 1s and 0s. Unlike a subnet mask, in which
binary 1 is equal to a match and binary 0 is not a match, in a wildcard mask, the reverse is true.
Last Octet
Wildcard Mask (in Binary) Meaning (0 - match, 1 - ignore)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Wildcard Masking
Wildcard Mask Types
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Wildcard Masking
Wildcard Mask Calculation
Calculating wildcard masks can be challenging. One shortcut method is to subtract the subnet mask
from 255.255.255.255.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Wildcard Masking
Wildcard Mask Keywords
Keywords reduce ACL keystrokes and make it easier to read the ACE:
• host - This keyword substitutes for the 0.0.0.0 mask. This mask states that all IPv4 address bits must match
to filter just one host address.
• any - This keyword substitutes for the 255.255.255.255 mask. This mask says to ignore the entire IPv4
address or to accept any addresses.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
8.3 Configure ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Configure ACLs
Create an ACL
• Use a text editor and write out the specifics of the policy to be implemented.
• Add the IOS configuration commands to accomplish those tasks.
• Include remarks to document the ACL.
• Copy and paste the commands onto the device.
• Always thoroughly test an ACL to ensure that it correctly applies the desired policy .
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Configure ACLs
Numbered Standard IPv4 ACL Syntax
To create a numbered standard ACL, use the following global configuration command:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Configure ACLs
Numbered Standard IPv4 ACL Syntax (Cont.)
This table provides a detailed explanation of the syntax for a standard ACL.
Parameter Description
access-list-number • This is the decimal number of the ACL.
• Standard ACL number range is 1 to 99 or 1300 to 1999.
deny This denies access if the condition is matched.
permit This permits access if the condition is matched.
remark text • (Optional) This adds a text entry for documentation purposes.
• Each remark is limited to 100 characters.
source • This identifies the source network or host address to filter.
• Use the any keyword to specify all networks.
• Use the host ip-address keyword or simply enter an ip-address (without the host keyword) to identify a
specific IP address.
source-wildcard (Optional) This is a 32-bit wildcard mask that is applied to the . If omitted, a default 0.0.0.0 mask is assumed.
log • (Optional) This keyword generates and sends an informational message whenever the ACE is matched.
• Message includes ACL number, matched condition (i.e., permitted or denied), source address, and number
of packets.{`{" "}`}
• This message is generated for the first matched packet.
• This keyword should only be implemented for troubleshooting or security reasons.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Configure ACLs
Named Standard IPv4 ACL Syntax
ACL names are alphanumeric, case sensitive, and must be unique. Capitalizing ACL names is recommended.
To create a named standard ACL, use the following global configuration command:
In the example, a named standard IPv4 ACL called NO-ACCESS is created. Notice that the prompt
changes to named standard ACL configuration mode. Use the help facility to view all the named standard
ACL ACE options.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Configure ACLs
Numbered Extended IPv4 ACL Syntax
The procedural steps for configuring extended ACLs are the same as for standard ACLs. The extended ACL
is first configured, and then it is activated on an interface. However, the command syntax and parameters are
more complex to support the additional features provided by extended ACLs.
To create a numbered extended ACL, use the following global configuration command:
The command to apply an extended IPv4 ACL to an interface is the same as the command
used for standard IPv4 ACLs.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Configure ACLs
Numbered Extended IPv4 ACL Syntax (Cont.)
Although there are many keywords and parameters for extended ACLs, it is not necessary to use all of them
when configuring an extended ACL. The table provides a detailed explanation of the syntax for an extended
ACL.
Parameter Description
access-list-number This is the decimal number of the ACL.
Extended ACL number range is 100 to 199 and 2000 to 2699.
deny This denies access if the condition is matched.
permit This permits access if the condition is matched.
remark text • (Optional) Adds a text entry for documentation purposes.
• Each remark is limited to 100 characters.
protocol • Name or number of an internet protocol.
• Common keywords include ip, tcp, udp, and icmp.
• The ip keyword matches all IP protocols.
source • This identifies the source network or host address to filter.
• Use the any keyword to specify all networks.
• Use the host ip-address keyword or simply enter an ip-address (without the host keyword) to identify a
specific IP address.
source-wildcard (Optional) A 32-bit wildcard mask that is applied to the source.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
(table continued on next slide)
Configure ACLs
Numbered Extended IPv4 ACL Syntax (Cont.)
Parameter Description
destination • This identifies the destination network or host address to filter.
• Use the any keyword to specify all networks.
• Use the host ip-address keyword or ip-address.
destination-wildcard (Optional) This is a 32-bit wildcard mask that is applied to the destination.
operator • (Optional) This compares source or destination ports.
• Some operators include lt (less than), gt (greater than), eq (equal), and neq (not equal).
port (Optional) The decimal number or name of a TCP or UDP port.
established • (Optional) For the TCP protocol only.
• This is a 1st generation firewall feature.
log • (Optional) This keyword generates and sends an informational message whenever the ACE is matched.
• This message includes ACL number, matched condition (i.e., permitted or denied), source address, and
number of packets.
• This message is generated for the first matched packet.
• This keyword should only be implemented for troubleshooting or security reasons.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Configure ACLs
Protocols and Port Numbers
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Configure ACLs
Protocols and Port Numbers (Cont.)
Port Keyword Options - Selecting a protocol influences port
options. For instance, selecting the:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Configure ACLs
Protocols and Port Numbers Configuration Examples
Extended ACLs can filter on different port number and port name options. This example
configures an extended ACL 100 to filter HTTP traffic. The first ACE uses the www port name.
The second ACE uses the port number 80. Both ACEs achieve exactly the same result.
Configuring the port number is required when there is not a specific protocol name listed such
as SSH (port number 22) or an HTTPS (port number 443)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Configure ACLs
TCP Established Extended ACL
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Configure ACLs
TCP Established Extended ACL (Cont.)
In this example, ACL 120 is configured to only permit returning web traffic to the inside hosts.
The new ACL is then applied outbound on the R1 G0/0/0 interface. The show access-lists
command displays both ACLs. Notice from the match statistics that inside hosts have been
accessing the secure web resources from the internet.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Configure ACLs
Named Extended IPv4 ACL Syntax
Naming an ACL makes it easier to understand its function. This command enters the named
extended configuration mode. Recall that ACL names are alphanumeric, case sensitive, and must
be unique. To create a named extended ACL, use the following global configuration command:
In the example, a named extended ACL called NO-FTP-ACCESS is created and the prompt
changed to named extended ACL configuration mode. ACE statements are entered in the
named extended ACL sub configuration mode.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Configure ACLs
Named Extended IPv4 ACL Example
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Configure ACLs
Named Extended IPv4 ACL Example (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Modify ACLs
Two Methods to Modify an ACL
After an ACL is configured, it may need to be modified. ACLs with multiple ACEs can be complex
to configure. Sometimes the configured ACE does not yield the expected behaviors. For these
reasons, ACLs may initially require a bit of trial and error to achieve the desired filtering result.
There are two methods to use when modifying an ACL:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Modify ACLs
Text Editor Method
ACLs with multiple ACEs should be created in a text editor. This allows you to plan the
required ACEs, create the ACL, and then paste it into the router interface. It also simplifies the
tasks to edit and fix an ACL. To modify an ACL using a text editor:
• Copy the ACL from the running configuration and paste it into the text editor.
• Make the necessary edits changes.
• Remove the previously configured ACL on the router otherwise, pasting the edited ACL
commands will only append (i.e., add) to the existing ACL ACEs on the router.
• Copy and paste the edited ACL back to the router.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Modify ACLs
Sequence Number Method
An ACL ACE can also be deleted or added using the ACL sequence numbers. Sequence numbers are
automatically assigned when an ACE is entered. These numbers are listed in the show access-lists command.
The show running-config command does not display sequence numbers.
Use the ip access-list standard command to edit an ACL. Statements cannot be overwritten using the same
sequence number as an existing statement. Therefore, the current statement must be deleted first with the no
10 command. Then the correct ACE can be added using sequence number 10 as configured. Verify the changes
using the show access-lists command.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
8.5 Implement ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Implement ACLs
ACL Configuration Guidelines
An ACL is made up of one or more access control entries (ACEs) or statements. When configuring
and applying an ACL, be aware of the guidelines summarized in this list:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Implement ACLs
Apply an ACL (Cont.)
The figure below shows a named standard ACL applied to outbound traffic.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Implement ACLs
Apply an ACL (Cont.)
This figure shows two named extended ACLs. The SURFING ACL is applied to inbound traffic and the
BROWSING ACL is applied to outbound traffic.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Implement ACLs
Apply an ACL (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Implement ACLs
Where to Place ACLs
Every ACL should be placed where it is
the most efficient.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Implement ACLs
Where to Place ACLs (Cont.)
Placement of the ACL and therefore, the type of ACL used, may also depend on a variety of factors as listed
in the table.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Implement ACLs
Standard ACL Placement Example
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Implement ACLs
Packet Tracer - Configure Named Standard IPv4 ACLs
The senior network administrator has asked you to create a named standard ACL to
prevent access to a file server. All clients from one network and one specific workstation
from a different network should be denied access.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Implement ACLs
Packet Tracer - Configure Numbered Standard IPv4 ACLs
Standard access control lists are router configuration scripts that control whether a router
permits or denies packets based on the source address. This activity focuses on defining
filtering criteria, configuring standard ACLs, applying ACLs to router interfaces, and verifying
and testing the ACL implementation. The routers are already configured.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Implement ACLs
Extended ACL Placement Example
Extended ACLs should be located as close
to the source as possible. This prevents
unwanted traffic from being sent across
multiple networks only to be denied when it
reaches its destination. However, the
organization can only place ACLs on devices
that they control. Therefore, the extended
ACL placement must be determined in the
context of where organizational control
extends.
In this Packet Tracer activity, you will complete the following objectives:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Implement ACLs
Packet Tracer - Configuring Extended ACLs Scenario 2
In this Packet Tracer activity, you will complete the following objectives:
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
8.6 Mitigate Attacks with ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Mitigate Attacks with ACLs
Mitigate Spoofing Attacks
IP address spoofing overrides the normal packet
creation process by inserting a custom IP header
with a different source IP address. There are many
well-known classes of IP addresses that should
never be source IP addresses for traffic entering
an organization’s network. The S0/0/0 interface is
attached to the internet and should never accept
inbound packets from the following addresses:
• All zeros addresses
• Broadcast addresses
• Local host addresses (127.0.0.0/8)
• Automatic Private IP Addressing (APIPA)
addresses (169.254.0.0/16)
• Reserved private addresses (RFC 1918)
• IP multicast address range (224.0.0.0/4)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Mitigate Attacks with ACLs
Permit Necessary Traffic through a Firewall
Several ICMP messages are required for proper network operation and should be allowed to exit the network:
• Echo - Allows users to ping external hosts.
• Parameter problem - Informs the host of packet header problems.
• Packet too big - Enables packet maximum transmission unit (MTU) discovery.
• Source quench - Throttles down traffic when necessary.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Mitigate Attacks with ACLs
Mitigate ICMP Attacks (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Mitigate Attacks with ACLs
Mitigate SNMP Attacks
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Mitigate Attacks with ACLs
Packet Tracer - Configure IP ACLs to Mitigate Attacks
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
8.7 IPv6 ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
IPv6 ACLs
IPv6 ACL Overview
As the migration to IPv6 continues, IPv6 attacks are
becoming more pervasive. IPv4 will not disappear
overnight. IPv4 will coexist with IPv6 and then
gradually be replaced by IPv6. This creates potential
security holes. An example of a security concern is
attackers leveraging IPv4 to exploit IPv6 in dual stack
environments.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
IPv6 ACLs
IPv6 ACL Syntax
The ACL functionality in IPv6 is like ACLs in IPv4. However, there is no equivalent to IPv4 standard ACLs. All
IPv6 ACLs must be configured with a name. IPv6 ACLs allow filtering based on source and destination
addresses that are traveling inbound and outbound to a specific interface. They also support traffic filtering
based on IPv6 option headers and optional, upper-layer protocol type information for finer granularity of
control, like extended ACLs in IPv4.
To configure an IPv6 ACL, use the ipv6 access-list command to enter into IPv6 ACL configuration mode.
Next, use the syntax shown in the figure to configure each access list entry to specifically permit or deny
traffic. Apply an IPv6 ACL to an interface with the ipv6 traffic-filter command.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
IPv6 ACLs
IPv6 ACL Syntax (Cont.)
Parameter Description
deny | permit Specifies whether to deny or permit the packet.
protocol Enter the name or number of an Internet protocol, or an integer representing an IPv6
protocol number.
source-ipv6-prefix/prefix-length The source or destination IPv6 network or class of networks for which to set deny or permit
conditions.
destination-ipv6-address/prefix-
length
any Enter any as an abbreviation for the IPv6 prefix ::/0. This matches all addresses.
host For host source-ipv6-address or destination-ipv6-address , enter the source or destination
IPv6 host address for which to set deny or permit conditions.
operator (Optional) An operand that compares the source or destination ports of the specified
protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and
range.
port-number (Optional) A decimal number or the name of a TCP or UDP port for filtering TCP or UDP,
respectively.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
IPv6 ACLs
IPv6 ACL Syntax (Cont.)
Parameter Description
dscp (Optional) Matches a differentiated services codepoint value against the traffic class value in the Traffic Class
field of each IPv6 packet header. The acceptable range is from 0 to 63.
fragments (Optional) Matches non-initial fragmented packets where the fragment extension header contains a non-zero
fragment offset. The fragments keyword is an option only if the operator [port-number ] arguments are not
specified. When this keyword is used, it also matches when the first fragment does not have Layer 4
information.
log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the
console. (The level of messages logged to the console is controlled by the logging console command.)
log input (Optional) Provides the same function as the log keyword, except that the logging message also includes the
input interface.
sequence value (Optional) Specifies the sequence number value for the access list statement. The acceptable range is from 1
to 4294967295.
time-range name (Optional) Specifies the time range that applies to the permit statement. The name of the time range and its
restrictions are specified by the time-range and absolute or periodic commands, respectively.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
IPv6 ACLs
Configure IPv6 ACLs
An IPv6 ACL contains an implicit deny ipv6 any
command. Each IPv6 ACL also contains implicit permit
rules to enable IPv6 neighbor discovery. The IPv6 NDP
requires the IPv6 network layer to send neighbor
advertisements (NAs) and neighbor solicitations (NSs). If
an administrator configures the deny ipv6 any command
without explicitly permitting neighbor discovery, then the
NDP will be disabled.
R1 is permitting inbound traffic on G0/0 from the
2001:DB8:1:1::/64 network. NA and NS packets are
explicitly permitted. Traffic sourced from any other IPv6
address is explicitly denied. If the administrator only
configured the first permit statement, the ACL would have
the same effect. However, it is a good practice to
document the implicit statements by explicitly configuring
them. © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
IPv6 ACLs
Packet Tracer - Configure IPv6 ACLs
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
8.8 Access Control Lists
Summary
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Access Control Lists Summary
What Did I Learn in this Module?
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Access Control Lists Summary
What Did I Learn in this Module?
• To create a numbered standard ACL, use the command access-list access-list-number {deny | permit |
remark text} source [source-wildcard] [log].
• To create a named standard ACL, use the command ip access-list standard access-list-name.
• To apply a standard or extended IPv4 ACL to an interface use the command ip access-group {access-
list-number | access-list-name} {in | out}.
• ACLs with multiple ACEs should be created in a text editor.
• An ACL ACE can also be deleted or added using the ACL sequence numbers.
• Extended ACLs should be located as close as possible to the source of the traffic to be filtered.
• Standard ACLs should be located as close to the destination as possible.
• Explicitly permit only certain types of traffic through a firewall.
• Both ICMP echo and redirect messages should be blocked inbound by the router. Apply interface ACLs to
filter SNMP packets from non-authorized systems.
• Several ICMP messages are recommended for proper network operation and should be allowed into the
internal network including echo reply, source quench, and unreachable.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Access Control Lists Summary
What Did I Learn in this Module?
• Several ICMP messages should be allowed to exit the network including echo, parameter problem, packet
too big, and source quench. As a rule, block all other ICMP message types outbound.
• Attackers can accomplish stealth attacks that result in trust exploitation by using dual-stacked hosts,
rogue NDP messages, and tunneling techniques.
• To mitigate attacks against IPv6 infrastructures and protocols, the strategy should include filtering at the
edge using various techniques, such as IPv6 ACLs.
• IPv6 ACLs allow filtering based on source and destination addresses that are traveling inbound and
outbound to a specific interface.
• They also support traffic filtering based on IPv6 option headers and optional, upper-layer protocol type
information for finer granularity of control, similar to extended ACLs in IPv4.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Mitigating Threats
New Terms and Commands
• access control list (ACL)
• access control entry (ACE)
• packet filtering
• wildcard mask
• ANDing
• access-list access-list-number {deny | permit | remark text} protocol source source-wildcard [ operator
{port}] destination destination-wildcard [operator {port}] [established] [log]
• ip access-list {standard | extended} name
• ip access-group {access-list-number | access-list-name} {in | out}
• access-class {access-list-number | access-list-name} {in | out}
• show access-list
• ipv6 access-list access-list-name
• deny | permit protocol {source-ipv6-prefix / prefix-length | any | host source-ipv6-address} [ operator [ port-
number ]] { destination-ipv6-prefix / prefix-length | any | host destination-ipv6-address } [ operator [ port-
number ]] [ dscp value ] [ fragments ] [ log ] [ log-input ] [ sequence value ] [ time-range name ]
• show ipv6 access-list
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77