Creating Static Packet Filters Using Acls: Network Security Using Cisco Ios Firewalls
Creating Static Packet Filters Using Acls: Network Security Using Cisco Ios Firewalls
Packet Filters
Using ACLs
Human
Resources
Network
Internet
X Research and
DMZ Development
Network
Host A
Web Mail
Server Server
Host B
Discard Packet
Notify Sender
Packet
Discard
Bucket
Decrypt, if necessary.
Routing
Examples
Match All Address Bits
(Match All)
0.0.0.0 255.255.255.255
ignores all address bits.
Abbreviate the expression
with the keyword any.
r1(config-if)#
ip access-group access-list-number {in | out}
Activates the list on an interface.
Sets inbound or outbound testing.
no ip access-group access-list-number {in | out} removes the ACL from the interface.
S0
172.16.4.13
E0 E1
r1(config)#interface ethernet 0
r1(config-if)#ip access-group 1 out
Example:
access-list 12 permit 192.168.1.0 0.0.0.255
(implicit deny any)
!
line vty 0 4
access-class 12 in
Permits only hosts in network 192.168.1.0 0.0.0.255 to connect
to the router vty lines
r1(config)#
access-list access-list-number {permit | deny}
protocol source source-wildcard [operator port]
destination destination-wildcard [operator port]
[established] [log]
Sets parameters for this list entry
r1(config-if)#
ip access-group access-list-number {in | out}
Activates the extended list on an interface
r1#show ip interfaces e0
Ethernet0 is up, line protocol is up
Internet address is 10.1.1.11/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is mailblock
Inbound access list is 102
Proxy ARP is enabled
<text ommitted>
© 2008 Cisco Systems, Inc. All rights reserved. IINS v1.0—3-20
Guidelines for Developing ACLs
Statement Caveat
Implicit deny all You may not see this statement, but it does exist.
Standard ACL limitation You may need to create extended ACLs to implement security
policies.
Order of ACL Place more specific ACL statements higher in the access list.
statements Ensure that statements at the top of the ACL do not negate
any statements found lower in the list.
Directional filtering Always double-check the direction (inbound or outbound) of
the data that your ACL is filtering.
Statement Caveat
Modifying numbered Adding new statements may require that a new ACL be
ACLs created (Cisco IOS Release 12.2 and earlier).
Router-generated special If filtering router-generated packets is part of the security
packets policy, they must be acted upon by inbound ACLs on
adjacent routers or through other router filter mechanisms
using ACLs.
Extended ACL placement Always consider placing extended ACLs on routers as
close as possible to the source being filtered.
Standard ACL placement Always place standard ACLs as close to the destination as
possible.
Configure > Additional Tasks > ACL Editor > Access Rules
© 2008 Cisco Systems, Inc. All rights reserved. IINS v1.0—3-24
Standard Rule