Please enable JavaScript.
Coggle requires JavaScript to display documents.
Access Control List, image, image, image, image, image - Coggle Diagram
Access Control List
Configure ACLs
Create an ACL
All access control lists (ACLs) must be planned. However, this is especially true for ACLs requiring multiple access control entries (ACEs).
-
When configuring a complex ACL, it is suggested that you:
-
-
-
-
-
-
-
Implement ACLs
-
Where to Place ACLs
Every ACL should be placed where it is the most efficient.
The figure illustrates where standard and extended ACLs should be located in an enterprise network. Assume the objective is to prevent traffic that originates in the 192.168.10.0/24 network from reaching the 192.168.30.0/24 network.
-
-
Routers make routing decisions based on information in the packet header. Traffic entering a router interface is routed solely based on information within the routing table. The router compares the destination IP address with routes in the routing table to find the best match and then forwards the packet based on the best match route. That same process can be used to filter traffic using an access control list (ACL).
Packet Filtring
Packet filtering controls access to a network by analyzing the incoming and/or outgoing packets and forwarding them or discarding them based on given criteria.
Numbered and Named ACLs
ACLs number 1 to 99, or 1300 to 1999 are standard ACLs while ACLs number 100 to 199, or 2000 to 2699 are extended ACLs, as shown in the output.
-
-
ACL Operation
ACLs define the set of rules that give added control for packets that enter inbound interfaces, packets that relay through the router, and packets that exit outbound interfaces of the router.
Wildcard Mask Overview
A wildcard mask is similar to subnet mask in that it uses ANDring process to identify what bits ina Ipv4 address to match, However the differ in the way that they match binary 1s or 0s
Wild Masks Types
wildcard to math a host, to match to a Ipv4 subnet, and Ipv4
address range
Wilcard Mask Calculation
Calculating wildcard masks can be challenging. One shortcut method is to subtract the subnet mask from 255.255.255.255
Wildcard Mask Keywords
Working with decimal representations of binary wildcard mask bits can be tedious. To simplify this task, the Cisco IOS provides two keywords to identify the most common uses of wildcard masking. Keywords reduce ACL keystrokes but more importantly, keywords make it easier to read the ACE.
-
-
-
-
-
-
-