Access Control Lists - Overview and Guidelines
Access Control Lists - Overview and Guidelines
Access Control Lists - Overview and Guidelines
In This Chapter
This chapter describes access lists as part of a security solution. This chapter includes tips, cautions,
considerations, recommendations, and general guidelines for how to use access lists.
This chapter has these sections:
• About Access Control Lists
• Overview of Access List Configuration
• Find Complete Configuration and Command Information for Access Lists
You should use access lists to provide a basic level of security for accessing your network. If you do
not configure access lists on your router, all packets passing through the router could be allowed onto
all parts of your network.
For example, access lists can allow one host to access a part of your network, and prevent another
host from accessing the same area. In Figure 6, Host A is allowed to access the Human Resources
network and Host B is prevented from accessing the Human Resources network.
Figure 6 Using Traffic Filters to Prevent Traffic from Being Routed to a Network
Host A
Host B
Resources Development
network network
You can also use access lists to decide which types of traffic are forwarded or blocked at the router
interfaces. For example, you can permit e-mail traffic to be routed, but at the same time block all
Telnet traffic.
Note Access lists of some protocols must be identified by a name, and access lists of other
protocols must be identified by a number. Some protocols can be identified by either a name or a
number. When a number is used to identify an access list, the number must be within the specific
range of numbers that is valid for the protocol.
You can specify access lists by names for the protocols listed in Table 15.
Protocol
Apollo Domain
IP
IPX
ISO CLNS
NetBIOS IPX
Source-route bridging NetBIOS
You can specify access lists by numbers for the protocols listed in Table 16. Table 16 also lists the
range of access list numbers that is valid for each protocol.
Protocol Range
IP 1 to 99 and 1300 to 1999
Extended IP 100 to 199 and 2000 to 2699
Ethernet type code 200 to 299
Ethernet address 700 to 799
Transparent bridging (protocol type) 200 to 299
Transparent bridging (vendor code) 700 to 799
Extended transparent bridging 1100 to 1199
DECnet and extended DECnet 300 to 399
XNS 400 to 499
Extended XNS 500 to 599
AppleTalk 600 to 699
Source-route bridging (protocol type) 200 to 299
Source-route bridging (vendor code) 700 to 799
IPX 800 to 899
Extended IPX 900 to 999
IPX SAP 1000 to 1099
Standard VINES 1 to 100
Extended VINES 101 to 200
Simple VINES 201 to 300
Typical criteria you define in access lists are packet source addresses, packet destination addresses,
or upper-layer protocol of the packet. However, each protocol has its own specific set of criteria that
can be defined.
For a single access list, you can define multiple criteria in multiple, separate access list statements.
Each of these statements should reference the same identifying name or number, to tie the statements
to the same access list. You can have as many criteria statements as you want, limited only by the
available memory. Of course, the more statements you have, the more difficult it will be to
comprehend and manage your access lists.
Note For most protocols, if you define an inbound access list for traffic filtering, you should include
explicit access list criteria statements to permit routing updates. If you do not, you might effectively
lose communication from the interface when routing updates are blocked by the implicit “deny all
traffic” statement at the end of the access list.
Note The first command of an edited access list file should delete the previous access list (for
example, type a no access-list command at the beginning of the file). If you do not first delete the
previous version of the access list, when you copy the edited file to your router you will merely be
appending additional criteria statements to the end of the existing access list.