ACLs - Department of Computer Engineering

Download Report

Transcript ACLs - Department of Computer Engineering

Lecture #5
Access Control Lists (ACLs)
Asst.Prof. Dr.Anan Phonphoem
Department of Computer Engineering,
Faculty of Engineering, Kasetsart University,
Bangkok, Thailand
1
Overview
 ACL fundamentals
 ACL operations
 Types of ACLs (Standard / Extended)
 Implementing ACLs
2
Access Control Lists (ACLs)
 List of conditions to test the traffic
 Router can permit or deny( like a filter)
 Provides Security
 Bandwidth Management
 Come in two Types

STANDARD and EXTENDED
3
What is ACL?
 A List of Criteria to which all Packets are
compared.

Is this Packet from Network 10.5.2.0



Is this a Telnet Protocol Packet from 25.25.0.0



Yes - Forward the Packet
No - Check with Next Statement
Yes - Forward the Packet
No - Check Next Statement
Deny All Other Traffic
4
ACL Operations
 Packets are compared to Each Statement in
an Access-list SEQUENTIALLY- From the Top
Down.
 The sooner a decision is made the better.
 Well written Access-lists take care of the most
abundant type of traffic first.
 All Access-lists End with an Implicit Deny All
statement
5
ACL operations
6
ACL numbers
7
Standard ACL
 Are given a # from 1-99
 Filtering based only on Source Address
 Should be applied closest to the Destination
8
Extended ACL
 Are given a # from 100-199
 Much more flexible and complex
 Can filter based on:




Source address
Destination address
Session Layer Protocol (ICMP, TCP, UDP..)
Port Number (80 http, 23 telnet…)
 Should be applied closest to the Source
9
Implementing ACLs
 Step 1 - Create the Access-list
 Step 2 -Apply the Access-list to an Interface


Must be in interface config mode (config-if)#
IP access-group # in/out (routers point of
view)
10
Standard ACL format
access-list # permit/deny sourceIP wildcard
#
permit/deny
sourceIP
1-99
switch the packet or drop it
source IP address to which the
packet should be compared. Can
also use ANY
see next slides
wildcard
(inverse mask)
11
Wildcard Mark
 Allows you to indicate a host, subnet, network
or range of IP addresses
 The two binary values in the wildcard have
different meanings:


0 = Must Match Exactly
1 = Ignore
12
Wildcard Mark
13
Wildcard Example
 Network
Wildcard
 172.16.10.0
0.0.0.255
 Result: Match the first three octets exactly but
ignore the last octet.
 172.16.10.0 thru 172.16.10.255 is a match
since the last octet does not matter.
14
Implementing ACLs
 Remember the Implicit Deny All at the end of
each access-list.
 Two Approaches:


1. List the traffic you know you want to permit
Deny all other traffic
2. List the traffic you want to deny
Permit all other traffic (permit any)
15
Standard ACL
16
Standard ACL example (I)
A(config)#access-list 5 deny 172.22.5.2 0.0.0.0
A(config)#access-list 5 deny 172.22.5.3 0.0.0.0
A(config)#access-list 5 permit any
So what does this access list do?
•Deny any host 172.22.5.2
•Deny any host 172.22.5.3
•All other traffic can go
17
Standard ACL example (II)
A(config)#access-list 5 deny 172.22.5.2 0.0.0.0
A(config)#access-list 5 deny 172.22.5.3 0.0.0.0
A(config)#access-list 5 permit any
A(config)#access-list 5 deny 172.22.5.4 0.0.0.0
Why does the last line have no affect?
How could you correct this situation?
18
Extended ACL
19
Placing ACLs
Standard : Closed to source
Extended: Closed to destination
20
Firewall
External
Internal
DMZ
21
Restricted ACL access
22
Verifying ACLs
 show ip interface
 show access-lists
 Show running-config
23
Implementing ACLs Tips
 You cannot selectively add or remove
statements from an Access-list
 Typically modifications are made in a text
editor and then pasted to the router as a new
access-list. The new access list is then
applied and the old one removed
 Document your Access-list

After each line indicate exactly what that line is
supposed to do.
24
Implementing ACLs Tips
 Verifying Your Access-list
 Show Access-lists
 Show IP Interfaces
 Revisit your access-list after a few days
 Routers keep track of the number of packets
that match each statement in an access-list
 Use this information to reorder your access-list
and thus improve it efficiency
 Never remove an access-list that is applied to
a port - this can crash a router.
25
Summary
 Are Created and then Applied to an interface
 Are Implemented Sequentially- Top Down
 End with an implicit Deny ALL statement
 #1-99 Standard and # 100-199 Extended
 Standard - source address only
 Extended - source, destination, protocol, port
26
References
 C.Dodge slide in Cisco Website
 Cisco curriculum materials
27