CCNA Class 18: ACL Concept and Configuration
Access Control List Concept & Its Configuration
An Access Control List (ACL) in networking is a set of rules used to control and filter network traffic. It defines which traffic is allowed or denied based on various criteria, such as source and destination IP addresses, ports, or protocols. ACLs are used to enhance network security, manage bandwidth, and control access to network resources.
Types of ACLs
There are two types of Access Control Lists (ACLs) in networking:
Standard ACL is the simplest type of ACL in networking, designed to control traffic based solely on the source IP address. It does not consider destination IP addresses, protocols, or ports. Standard ACLs are typically used for basic traffic filtering and are applied closer to the destination address to avoid unnecessary filtering in the network.
An Extended Access Control List (ACL) is a more advanced type of ACL in networking that allows filtering traffic based on multiple criteria, such as source and destination IP addresses, protocols, port numbers, and other parameters. Extended ACLs provide granular control over traffic and are commonly used for complex security and traffic management tasks and near to source address.
Key Features of Standard ACLs:
Source-Based Filtering:
Matches traffic based on the source IP address only.
No consideration for destination IP, protocol type, or port numbers.
Numbered ACLs: Assigned numbers in the range 1–99 (or 1300–1999 for expanded ranges).
Key Features of Extended ACLs:
Multiple Criteria Filtering:
Source IP address.
Destination IP address.
Protocol type (e.g., TCP, UDP, ICMP).
Source and destination port numbers.
Other fields, such as precedence or time-to-live (TTL).
Granular Control:
Enables highly specific traffic filtering.
Suitable for complex policies, such as allowing web traffic but blocking file-sharing services.
Numbered and Named ACLs:
Assigned numbers in the range 100–199 (or 2000–2699 for expanded ranges). Can also be configured as named ACLs for better readability and management.
Basic Configuration of Standard ACL
Step 01: Initial IP Configuration of Devices
Step 02: Configure the OSPF Routing Protocol (Initially we Configure the Default Routing Protocol)
Step 03: Configuring the Standard ACL (at DST Router)
Access Deny Only PC3
DST_R(Config)#access-list 1 deny 171.171.30.10 0.0.0.0
DST_R(config)#access-list 1 permit 0.0.0.0 255.255.255.255
DST_R(config)#int gi0/0
DST_R(config-if)#ip access-group 1 out
Test from PC3 to Server PC
Part 03: Configuring the Extended ACL (At Source Router)
SRC_R(config)#access-list 100 deny ip host 171.171.10.10 host 10.200.200.10
SRC_R(config)#access-list 100 permit ip any any
SRC_R(config)#int gi0/0
SRC_R(config-if)#ip access-group 100 in
How to Configure Extended ACL in Cisco
