<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Difference between Firewall and Access Control List in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833498#M969692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An access-list is not stateful whereas a firewall is ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when a conversation between a two machines is setup with a firewall in between the traffic path the firewall keeps track of not just the IP address/port number but also the TCP flags that are used in the packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if i initiate a connection to a server using telnet my intial packet has &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source IP address:  192.168.5.1 (my client)&lt;/P&gt;&lt;P&gt;source port:    23467 ( random generated port) &lt;/P&gt;&lt;P&gt;destination IP address:  172.16.10.1 (telnet server) &lt;/P&gt;&lt;P&gt;destination port: 23 ( telnet port )&lt;/P&gt;&lt;P&gt;TCP Flag: SYN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall will enter this into it's state table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the server responds &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source IP address:  172.16.10.1&lt;/P&gt;&lt;P&gt;source port:        23&lt;/P&gt;&lt;P&gt;destination IP address:  192.168.5.1&lt;/P&gt;&lt;P&gt;destination port:    23467&lt;/P&gt;&lt;P&gt;TCP Flags SYN/ACK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall receives this packet, checks it's state table and realises this is a return packet to the initial packet sent out by the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the above packet from the server was sent to the client, but the client had not actually sent a packet first the firewall would drop the packet because it has no entry in it's state table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An access-list has no real concept of state as such although the "established" keyword is a pseudo type of statefulness.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Sep 2007 13:19:10 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-09-11T13:19:10Z</dc:date>
    <item>
      <title>Difference between Firewall and Access Control List</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833497#M969690</link>
      <description>&lt;P&gt;Just a quick question really...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the difference between an ACL and  a firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as i can see they both can deny/permit traffic based on source or destination IP/network  as well as by protocol and port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they essentially the same thing or am  I overlooking something blindingly obvious?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833497#M969690</guid>
      <dc:creator>d.bigerstaff</dc:creator>
      <dc:date>2019-03-11T11:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between Firewall and Access Control List</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833498#M969692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An access-list is not stateful whereas a firewall is ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when a conversation between a two machines is setup with a firewall in between the traffic path the firewall keeps track of not just the IP address/port number but also the TCP flags that are used in the packet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if i initiate a connection to a server using telnet my intial packet has &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source IP address:  192.168.5.1 (my client)&lt;/P&gt;&lt;P&gt;source port:    23467 ( random generated port) &lt;/P&gt;&lt;P&gt;destination IP address:  172.16.10.1 (telnet server) &lt;/P&gt;&lt;P&gt;destination port: 23 ( telnet port )&lt;/P&gt;&lt;P&gt;TCP Flag: SYN &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall will enter this into it's state table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the server responds &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source IP address:  172.16.10.1&lt;/P&gt;&lt;P&gt;source port:        23&lt;/P&gt;&lt;P&gt;destination IP address:  192.168.5.1&lt;/P&gt;&lt;P&gt;destination port:    23467&lt;/P&gt;&lt;P&gt;TCP Flags SYN/ACK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall receives this packet, checks it's state table and realises this is a return packet to the initial packet sent out by the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the above packet from the server was sent to the client, but the client had not actually sent a packet first the firewall would drop the packet because it has no entry in it's state table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An access-list has no real concept of state as such although the "established" keyword is a pseudo type of statefulness.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2007 13:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833498#M969692</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-11T13:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between Firewall and Access Control List</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833499#M969694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"An access-list has no real concept of state as such although the "established" keyword is a pseudo type of statefulness. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i just want to elaborate on this last line.  Using the established keyword with an ACL entry (ACE) allows *all* packets that match the ACE regardless of whether the packet in question is in response to an outbound packet.  What this means is if you can code a packet to set one of the tcp flags that the 'established' key word checks for, it will pass the ACL check, even though it was not sent in response to any other packet from the protected network - ie it allows ALL packets w/ the ack/rst bit set.&lt;/P&gt;&lt;P&gt;For this reason, reflexive acl's are a better choice than this method.  &lt;/P&gt;&lt;P&gt;(and to be complete, IOS firewall is better than reflexive acl's).  &lt;/P&gt;&lt;P&gt;And of course PIX is better than IOS firewall in this respect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2007 13:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833499#M969694</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-09-11T13:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between Firewall and Access Control List</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833500#M969695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agreed, and perhaps using the words "pseudo type of statefulness" was a bit misleading. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for expanding on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2007 13:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833500#M969695</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-11T13:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between Firewall and Access Control List</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833501#M969696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank's for your explaination guys, it's much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2007 14:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-firewall-and-access-control-list/m-p/833501#M969696</guid>
      <dc:creator>d.bigerstaff</dc:creator>
      <dc:date>2007-09-11T14:55:32Z</dc:date>
    </item>
  </channel>
</rss>

