Table of Contents
1. Introduction
2. What are Extended Access Lists?
3. Components of Extended Access Lists
Action
Protocol
Source IP and Wildcard Mask
Destination IP and Wildcard Mask
Port/Protocol
Optional Commands
4. Named Extended Access Lists
5. Configuration Examples
Example 1: Deny an Individual Host
Example 2: Permit an Entire Subnet
Example 3: Deny Everything
6. Conclusion
7. Additional Resources
1. Introduction
Extended Access Lists (ACLs) are a fundamental tool in network security and traffic management. They allow network administrators to define rules that control the flow of traffic into and out of a network based on various criteria, such as IP address, protocol, and port number. This guide will delve into the components, configuration, and application of Extended Access Lists in network environments.
2. What are Extended Access Lists?
Extended Access Lists are a type of ACL used in networking to filter traffic based on multiple criteria. Unlike standard ACLs, which only filter traffic based on source IP addresses, extended ACLs can filter traffic based on source and destination IP addresses, protocols, and port numbers. This provides a more granular level of control over network traffic.
3. Components of Extended Access Lists
Action
The action in an ACL rule determines what to do with the traffic that matches the rule. The primary actions are permit and deny.
Protocol
The protocol field specifies the protocol type to match, such as IP, TCP, UDP, ICMP, OSPF, EIGRP, etc.
Source IP and Wildcard Mask
The source IP address and wildcard mask define the range of source IP addresses that the rule will match. For example:
- 192.168.1.0 0.0.0.255 matches any IP address from 192.168.1.0 to 192.168.1.255.
- host 192.168.1.1 matches only the IP address 192.168.1.1.
Destination IP and Wildcard Mask
The destination IP address and wildcard mask specify the range of destination IP addresses to match, similar to the source IP and wildcard mask.
Port/Protocol
The port/protocol field specifies the port or protocol to match. This is used primarily with TCP and UDP protocols. Common examples include:
- eq 23 for Telnet
- gt 80 for HTTP traffic on ports greater than 80
- lt 443 for traffic on ports less than 443
Optional Commands
Extended ACLs can include additional optional commands to refine the traffic matching criteria:
- log - Logs matches to this rule.
- time-of-day - Specifies times when the rule applies.
- established - Matches established connections.