Describe Traffic Filtering

Download Report

Transcript Describe Traffic Filtering

Filtering Traffic
Using Access
Control Lists
Introducing Routing and Switching in the Enterprise –
Chapter 8
Version 4.0
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
1
Objectives

Describe traffic filtering and explain how Access
Control Lists (ACLs) can filter traffic at router
interfaces.

Analyze the use of wildcard masks.

Configure and implement ACLs.

Create and apply ACLs to control specific types of
traffic.

Log ACL activity and integrate ACL best practices.
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
2
Describe Traffic Filtering
 Analyze the contents of a packet
 Allow or block the packet
 Based on source IP, destination IP, MAC address,
protocol, application type
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
3
Describe Traffic Filtering
Devices providing traffic filtering:
 Firewalls built into integrated routers
 Dedicated security appliances
 Servers
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
4
Describe Traffic Filtering
Uses for ACLs:
 Specify internal hosts for NAT
 Classify traffic for QoS
 Restrict routing updates, limit debug outputs, control
virtual terminal access
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
5
Describe Traffic Filtering
Possible issues with ACLs:
 Increased load on router
 Possible network disruption
 Unintended consequences from incorrect placement
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
6
Describe Traffic Filtering
 Standard ACLs filter based on source IP address
 Extended ACLs filter on source and destination, as well
as protocol and port number
 Named ACLs can be either standard or extended
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
7
Describe Traffic Filtering
 ACLs consist of statements
 At least one statement must be a permit statement
 Final statement is an implicit deny
 ACL must be applied to an interface in order to work
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
8
Describe Traffic Filtering
 ACL is applied inbound or outbound
 Direction is from the router’s perspective
 Each interface can have one ACL per direction for each
network protocol
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
9
Analyze the Use of Wildcard Masks
 Wildcard mask can block a range of addresses or a
whole network with one statement
 0s indicate which part of an IP address must match the
ACL
 1s indicate which part does not have to match
specifically
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
10
Analyze the Use of Wildcard Masks
 Use the host parameter in place of a 0.0.0.0 wildcard
 Use the any parameter in place of a 255.255.255.255
wildcard
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
11
Configure and Implement Access
Control Lists
 Determine traffic filtering requirements
 Decide which type of ACL to use
 Determine the router and interface on which to apply
the ACL
 Determine in which direction to filter traffic
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
12
Configure and Implement Access Control
Lists: Numbered Standard ACL
 Use access-list command to enter statements
 Use the same number for all statements
 Number ranges: 1-99, 1300-1999
 Apply as close to the destination as possible
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
13
Configure and Implement Access Control
Lists: Numbered Extended ACL
 Use access-list command to enter statements
 Use the same number for all statements
 Number ranges: 100-199, 2000-2699
 Specify a protocol to permit or deny
 Place as close to the source as possible
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
14
Configure and Implement Access
Control Lists: Named ACLs
 Descriptive name replaces number range
 Use ip access-list command to enter initial statement
 Start succeeding statements with either permit or deny
 Apply in the same way as standard or extended ACL
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
15
Configure and Implement Access
Control Lists: VTY access
 Create the ACL in line configuration mode
 Use the access-class command to initiate the ACL
 Use a numbered ACL
 Apply identical restrictions to all VTY lines
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
16
Create and Apply ACLs to Control Specific
Types of Traffic
 Use a specified condition when filtering on port
numbers: eq, lt, gt
 Deny all appropriate ports for multi-port applications like
FTP
 Use the range operator to filter a group of ports
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
17
Create and Apply ACLs to Control Specific
Types of Traffic
 Block harmful external traffic while allowing internal
users free access
 Ping: allow echo replies while denying echo requests
from outside the network
 Stateful Packet Inspection
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
18
Create and Apply ACLs to Control Specific
Types of Traffic
 Account for NAT when creating and applying ACLs to a
NAT interface
 Filter public addresses on a NAT outside interface
 Filter private addresses on a NAT inside interface
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
19
Create and Apply ACLs to Control Specific
Types of Traffic
 Examine every ACL one line at a time to avoid
unintended consequences
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
20
Create and Apply ACLs to Control Specific
Types of Traffic
 Apply ACLs to VLAN interfaces or subinterfaces just as
with physical interfaces
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
21
Log ACL Activity and ACL Best Practices
 Logging provides additional details on packets denied
or permitted
 Add the log option to the end of each ACL statement to
be tracked
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
22
Log ACL Activity and ACL Best Practices
Syslog messages:
 Status of router interfaces
 ACL messages
 Bandwidth, protocols in use, configuration events
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
23
Log ACL Activity and ACL Best Practices
 Always test basic connectivity before applying ACLs
 Add deny ip any to the end of an ACL when logging
 Use reload in 30 when testing ACLs on remote routers
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
24
Summary
 ACLs enable traffic management and secure access to
and from a network and its resources
 Apply an ACL to filter inbound or outbound traffic
 ACLs can be standard, extended, or named
 Using a wildcard mask provides flexibility
 There is an implicit deny statement at the end of an
ACL
 Account for NAT when creating and applying ACLs
 Logging provides additional details on filtered traffic
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
25
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
26