0% found this document useful (0 votes)
4 views11 pages

Access Control List

The document provides an overview of Access Control Lists (ACLs) in networking, defining them as scripts that control packet permissions based on header criteria. It discusses the operation of ACLs, emphasizing the sequential processing of rules and the importance of order in conditions. Additionally, it outlines the two types of Cisco ACLs: standard, which filters only by source IP addresses, and extended, which can filter by multiple parameters including destination IP and protocol types.

Uploaded by

tz4kfm4vmh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views11 pages

Access Control List

The document provides an overview of Access Control Lists (ACLs) in networking, defining them as scripts that control packet permissions based on header criteria. It discusses the operation of ACLs, emphasizing the sequential processing of rules and the importance of order in conditions. Additionally, it outlines the two types of Cisco ACLs: standard, which filters only by source IP addresses, and extended, which can filter by multiple parameters including destination IP and protocol types.

Uploaded by

tz4kfm4vmh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

ACCESS

CONTROL
LIST
IN A
NETWORK
DJIMENE FOMETIO GLORIA FAITH
MBOCKE MBOCKE GABRIEL
YANCHULI MARC DANIOR
ELAH SATSAH JOEL
TABLE OF CONTENT

Access control list definition


Access control list operation
Types of access control list
 ACCESS CONTROL LIST DEFINITION
An ACL is : a Router configuration script that
controls whether a router permits or denies packets
to pass based on criteria found in the packet header.

ACLs applied on the router's interfaces.

 The router examines each packet to determine


whether to forward or drop it, based on the conditions
specified in the

ACL. Some ACL decision points are: 1- IP source


ACCESS CONTROL LIST
OPERATION
ACL statements operate in sequential, logical order (top
to

down) , one line at a time, looking for a pattern


matching the

incoming packet , In such away :

1-If a condition q/+2match is true, the packet is permitted


or denied and the rest of the ACL statements are not
3- When first learning how to create ACLs, it is a good idea to add

the implicit deny at the end of ACLs to reinforce the dynamic

presence of the command line.

Note: ACLs must be defined on a:

o per-protocol (IP, IPX, AppleTalk). 2- per direction (in or out).

oport (interface) basis


o ACCESS CONTROL LIST CONFIGURATION

THE FULL SYNTAX OF THE STANDARD ACL COMMAND IS AS FOLLOWS:


TYPES OF ACCESS CONTROL LIST
The two types of Cisco ACLs are standard and extended

1- Standard IP ACLs: Can only filter on source IP addresses only

2- Extended IP ACLs: Can filter based on:

 Source IP address.

 Destination IP address. 3- Protocol (TCP, UDP).

 Ports Numbers (Telnet – 23, http – 80, etc.) and other parameters

Standard IP ACL
Standard ACLs allow you to permit or deny traffic from
source

IP addresses.

Standard ACLs is a sequential collection of permit


and deny

conditions that apply to source IP addresses. The


packet’s

destination and the ports involved are not examined.


Cisco IOS software tests addresses against the conditions one by

one. The first match determines whether the software accepts or

rejects the address. Because the software stops testing

conditions after the first match, the order of the conditions


is

critical. If no conditions match, the address is rejected.

Standard IP ACLs
THANKS FOR
YOUR GREAT
ATTENTION

You might also like