Podcast
Questions and Answers
What is the fundamental purpose of an Access Control List (ACL)?
What is the fundamental purpose of an Access Control List (ACL)?
- To speed up packet forwarding by optimizing routing tables.
- To filter network traffic based on specified criteria. (correct)
- To provide detailed reports on network bandwidth usage.
- To encrypt network traffic for secure transmission.
By default, what action does a router take regarding network traffic filtering if no ACL is configured?
By default, what action does a router take regarding network traffic filtering if no ACL is configured?
- The router prompts the administrator to configure an ACL.
- The router automatically applies a basic ACL that prevents harmful traffic.
- The router denies all network traffic to ensure security.
- The router does not filter traffic. (correct)
When an ACL is applied to an interface, what is the immediate effect on network packets?
When an ACL is applied to an interface, what is the immediate effect on network packets?
- Packets are immediately forwarded to their destination without evaluation.
- Packets are evaluated against the criteria defined in the ACL. (correct)
- Packets are duplicated for monitoring purposes.
- Packets are rerouted to a secure network segment.
What are the two possible determinations an ACL can make regarding a network packet?
What are the two possible determinations an ACL can make regarding a network packet?
An ACL consists of a sequential list of statements. What are these statements known as?
An ACL consists of a sequential list of statements. What are these statements known as?
Besides ACEs, what are access control lists also commonly called?
Besides ACEs, what are access control lists also commonly called?
An ACL can control whether a router permits or denies packets based on several criteria found in the packet header. Which of the following is NOT a criterion?
An ACL can control whether a router permits or denies packets based on several criteria found in the packet header. Which of the following is NOT a criterion?
In which way does a router act when it forwards or denies packets according to filtering rules set in an ACL?
In which way does a router act when it forwards or denies packets according to filtering rules set in an ACL?
Which of the following describes how an inbound ACL filters packets?
Which of the following describes how an inbound ACL filters packets?
What type of statement is automatically inserted at the end of each ACL?
What type of statement is automatically inserted at the end of each ACL?
What could be the effect of an ACL without at least one permit statement?
What could be the effect of an ACL without at least one permit statement?
What is the primary difference in how standard and extended IPv4 ACLs filter IP packets?
What is the primary difference in how standard and extended IPv4 ACLs filter IP packets?
When configuring a numbered ACL, what number range is used to identify standard IP ACLs?
When configuring a numbered ACL, what number range is used to identify standard IP ACLs?
Which of the following is a characteristic of named ACLs?
Which of the following is a characteristic of named ACLs?
Wildcard masks are used in ACLs to specify IP address matching. What does a '0' bit in a wildcard mask signify?
Wildcard masks are used in ACLs to specify IP address matching. What does a '0' bit in a wildcard mask signify?
What keyword can be used in an ACL configuration to represent a wildcard mask of 0.0.0.0
?
What keyword can be used in an ACL configuration to represent a wildcard mask of 0.0.0.0
?
What keyword can be used in an ACL configuration to represent a wildcard mask of 255.255.255.255
?
What keyword can be used in an ACL configuration to represent a wildcard mask of 255.255.255.255
?
What is one of the guidelines to follow when creating ACLs?
What is one of the guidelines to follow when creating ACLs?
When controlling traffic flow on an interface, how many ACLs should be defined for each protocol?
When controlling traffic flow on an interface, how many ACLs should be defined for each protocol?
Which of the following is NOT considered an ACL best practice?
Which of the following is NOT considered an ACL best practice?
To enhance network efficiency and security when implementing ACLs, at which location should extended ACLs be placed?
To enhance network efficiency and security when implementing ACLs, at which location should extended ACLs be placed?
Considering network efficiency and security, where should standard ACLs be placed?
Considering network efficiency and security, where should standard ACLs be placed?
Imagine you need to block all Telnet traffic originating from any source destined for a specific server. Which type of ACL is more suited and where should you ideally place it in your network and why?
Imagine you need to block all Telnet traffic originating from any source destined for a specific server. Which type of ACL is more suited and where should you ideally place it in your network and why?
Flashcards
What is an ACL?
What is an ACL?
A list of permit or deny statements, also called ACL statements, used to filter network traffic.
How does an ACL work?
How does an ACL work?
Examines network packets and determines if they are permitted or denied based on configured criteria.
What is Inbound ACL?
What is Inbound ACL?
Applied to an interface to filter packets entering the router, before routing decisions are made.
What is Outbound ACL?
What is Outbound ACL?
Signup and view all the flashcards
What is Implicit Deny?
What is Implicit Deny?
Signup and view all the flashcards
What are Standard ACLs?
What are Standard ACLs?
Signup and view all the flashcards
What are Extended ACLs?
What are Extended ACLs?
Signup and view all the flashcards
What are Numbered ACLs?
What are Numbered ACLs?
Signup and view all the flashcards
What are Named ACLs?
What are Named ACLs?
Signup and view all the flashcards
What are Wildcard Masks?
What are Wildcard Masks?
Signup and view all the flashcards
How to Calculate the Wildcard Mask?
How to Calculate the Wildcard Mask?
Signup and view all the flashcards
What does the 'host' keyword mean?
What does the 'host' keyword mean?
Signup and view all the flashcards
What does the 'any' keyword mean?
What does the 'any' keyword mean?
Signup and view all the flashcards
Where to use ACLs?
Where to use ACLs?
Signup and view all the flashcards
What are the Three Ps of ACLs?
What are the Three Ps of ACLs?
Signup and view all the flashcards
Where to place Extended ACLs?
Where to place Extended ACLs?
Signup and view all the flashcards
Where to place Standard ACLs?
Where to place Standard ACLs?
Signup and view all the flashcards
How to Apply Standard access group?
How to Apply Standard access group?
Signup and view all the flashcards
What is the "remark" Keyword?
What is the "remark" Keyword?
Signup and view all the flashcards
Why order is Important for Implementing ACLs?
Why order is Important for Implementing ACLs?
Signup and view all the flashcards
How to set name to ACL?
How to set name to ACL?
Signup and view all the flashcards
How can I verify ACL implementation?
How can I verify ACL implementation?
Signup and view all the flashcards
What is filtered by extended ACLs?
What is filtered by extended ACLs?
Signup and view all the flashcards
How to Use Extended ACLs?
How to Use Extended ACLs?
Signup and view all the flashcards
Study Notes
- Chapter 4 focuses on implementing firewall technologies, specifically Access Control Lists (ACLs).
Objectives
- Explain how ACLs filter traffic
- Compare standard and extended IPv4 ACLs
- Explain how ACLs use wildcard masks
- Explain guidelines for creating and placing ACLs
- Configure standard and extended IPv4 ACLs to filter traffic according to networking requirements
- Modify a standard IPv4 ACL using sequence numbers
- Configure a standard ACL to secure vty access
- Explain the structure of an extended Access Control Entry (ACE)
- Configure an ACL to limit debug output
- Explain how a router processes packets when an ACL is applied
- Troubleshoot common ACL errors using CLI commands
ACL Operation
- ACLs are sequential lists of permit or deny statements, also known as Access Control Entries(ACEs).
- An ACL statement is also an ACE.
- ACLs control whether a router permits or denies packets based on criteria, identifying the source IP, destination IP, IP protocols (ICMP, TCP, UDP, EIGRP), and TCP/UDP source/destination ports.
- A router functions as a packet filter when forwarding/denying packets based on filtering rules.
- By default, routers do not filter traffic.
- When applied to an interface, an ACL evaluates network packets to determine if packets are permitted or denied.
- Inbound ACLs filter packets coming into a specific interface and before being routed to the outbound interface.
- Outbound ACLs filter packets after being routed, regardless of the inbound interface.
- The last statement of an ACL is always an implicit deny and blocks all traffic, even if not physically present.
- An ACL without a permit statement will block all traffic because of the implicit deny.
Types of Cisco IPv4 ACLs
- Standard ACLs filter IP packets based on the source address only.
- Extended ACLs filter IP packets based on several attributes: Source/destination IPs, TCP/UDP ports, and protocol type/number (IP, ICP, UDP, TCP).
Numbering & Naming ACLs
- Numbered ACLs are assigned a number based on the protocol to be filtered :
- Standard IP ACLs range from 1-99 and 1300-1999.
- Extended IP ACLs range from 100-199 and 2000-2699.
- Named ACLs assign a name and have alphanumeric characters.
- Names should be in CAPITAL LETTERS
- Cannot contain spaces or punctuation
- Entries can be added or deleted within the ACL.
Introducing ACL Wildcard Masking
- Wildcard masks and subnet masks differ in the way they match binary 1s and 0s
- Wildcard mask rules for matching binary 1s and 0s:
- Wildcard mask bit 0: Match the corresponding bit value in the address.
- Wildcard mask bit 1: Ignore the corresponding bit value in the address.
- Wildcard masks are inverse masks - unlike subnet masks (binary 1 = match, binary 0 = not match), the reverse is true
- Calculate wildcard masks by subtracting the subnet mask from 255.255.255.255.
- Shorthand wildcard mask keywords
host
refers to a 0.0.0.0 mask andany
refers to a 255.255.255.255 mask.
General Guidelines for Creating ACLs
- Use ACLs in firewall routers between the internal network and external networks like the Internet.
- Use ACLs on a router between two parts of the network to control traffic entering/exiting a specific part of the internal network.
- Configure ACLs on border routers (routers at the edge of networks).
- Configure ACLs for each network protocol configured on border router interfaces.
- Three P's of ACL traffic control.
- One ACL per protocol: Define an ACL for each protocol enabled on the interface to control traffic flow.
- One ACL per direction: Use two ACLs for inbound and outbound control, as ACLs control traffic in one direction at a time.
- One ACL per interface: ACLs control traffic for an interface, such as GigabitEthernet 0/0.
ACL Best Practices
- Base ACLs on the organization's security policy to implement security guidelines.
- Prepare a description of what the ACLs should do to avoid inadvertently creating potential access problems.
- Use a text editor to create, edit, and save ACLs for a library of reusable ACLs.
- Test ACLs on a development network before implementing them on a production network to avoid costly errors.
Where to Place ACLs
- Place an ACL where it has the greatest impact on efficiency.
- Extended ACLs: Locate as close as possible to the traffic source to be filtered.
- Standard ACLs: Locate as close as possible to the destination as they do not specify destination addresses.
- The extent of the network administrator's control, bandwidth of the networks, and ease of configuration also affects ACL placement and type of ACL used.
Configuring Standard ACLs
- Standard ACLs use the command
access-list access-list-number deny | permit | remark source [source-wildcard] [log]
- Remove an ACL using global configuration command
no access-list
- The
remark
keyword provides documentation, making access lists easier to understand. - Cisco IOS applies internal logic when accepting/processing Access Control List (ACL) statements.
- Access list statements are processed sequentially, so the order in which statements are entered is important.
- Link a configured standard ACL to an interface in interface configuration mode using the command
ip access-group {access-list-number | access-list-name} {in | out}
- Remove an ACL from an interface using the commandÂ
no ip access-group
 on the interface, then use the global commandÂno access-list
 to completely remove the ACL. - Numbered ACLs can be commented by using the
remark
command - Configure named standard ACLs using
ip access-list {standard | extended} name
- The alphanumeric name cannot begin with a number.
- Standard ACL syntax is
access-list access-list-number deny | permit | remark source [source-wildcard] [log]
- Activate named IP ACLs on an interface by using the command
ip access-group name {in | out}
- Standard numbered ACLs can be edited using a text editor or using sequence numbers.
show access-lists
command will display line numbers for ACLs
Verifying ACLs
- Use the command
show ip interface
to verify ACLs - The command
show access-lists
displays the ACL information
Extended ACLs
- Filters on source address, destination address, protocol, and port numbers.
- Extended ACLs are used due to the greater degree of control with precise traffic-filtering control.
- Extended ACLs filter on source IP addresses AND destination IP addresses.
- ACL’s can filter on upper-layer protocols (IP, TCP, UDP, ICMP, EIGRP, or source/destination port).
Configuring Extended ACLs
- Configured with
access-list access-list-number {deny | permit | remark} protocol source [source-wildcard] [operator operand] [port port-number or name] destination [destination-wildcard] [operator operand] [port port-number or name] [established]
- Apply extended ACLs to interfaces with
ip access-group {access-list-number | access-list-name in | out}
- Create named extended ACLs with the command
ip access-list extended name
- Similar to standard ACLs, extended ACLs can be edited using a text editor or sequence numbers.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.