01-03-2022 01:50 AM
Hi
Just a simple question when using numbered ACLs is there any significance to the number or should it just be within the specified range for your class of IPs? For example ACL 110 should it be used for a significant purpose?
Thanks in advance
01-03-2022 02:03 AM - edited 01-03-2022 02:07 AM
@jk865 the number is significant. An ACL numbered 1-99 is a standard ACL which can filter on source IP address/subnet only. Whereas an ACL numbered 100-199 is an extended ACL which can filter on protocol (icmp, udp or tcp), source/destination ip address/subnet and source/destination port.
You've also got 1300-1399 which is expanded Standard ACL range and 2000-2699 which is the expanded extended ACL range.
01-03-2022 02:17 AM
Thanks, Rob, One last question if you don't mind should each ACL have only one rule per line/number?
01-03-2022 02:21 AM
@jk865 a numbered ACL can have multiple lines, example:
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 10.10.10.10 eq 23
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 10.10.10.10 eq 80
Note - there is an implicit deny at the end of an ACL.
01-03-2022 02:26 AM
Thanks, Rob.
So if I want to apply the following I would need to apply it on multiple lines of 110 to stop the implicit deny kicking in? For example, if I had the first two permits on ACL 110 the implicit deny would deny everything else and stop it looking at for example ACL 120? Thanks James
permit ip 172.10.0.32 0.0.0.15 172.10.0.0 0.0.0.31
permit ip 172.10.0.48 0.0.0.7 172.10.0.0 0.0.0.31
deny ip host 172.10.0.51 172.10.0.0 0.0.0.31
permit ip 172.10.0.32 0.0.0.15 172.10.0.0 0.0.0.31
permit ip 172.10.0.48 0.0.0.7 172.10.0.0 0.0.0.31
01-03-2022 02:36 AM - edited 01-03-2022 02:51 AM
Assign all those ACE (Access Control Entries) to the same ACL number, if they are defined then the implict deny will apply after the defined ACE.
If you have 2 ACLs 110 and 120 then you have to explictly reference one of the ACLs, any other ACL defined on the router will not be used until explictly referenced.
01-03-2022 03:52 AM
Hi Rob,
By explicitly reference do you mean on an interface for example?
What I'm trying to achieve is :
Network 172.10.0.32/28 and 172.10.0.0/27 should be able to communicate via the VPN without restrictions
Network 172.10.0.32/28 should be able to communicate with 172.10.0.51 without the VPN
Network 172.10.0.32/28 should be able to communicate with 209.165.100.97/27 only if the communication is issued by a user of the 172.10.0.32/28 network
209.165.100.97/27 Devices can only communicate with 172.10.0.51 via HTTPS Communication.
01-03-2022 03:56 AM - edited 01-03-2022 03:57 AM
@jk865 Yes, by just defining an ACL it is not going to do anything until you reference it under the interface or whatever purpose you intend to use it for. You can only have 1 ACL configured/reference per interface per direction, so 1 inbound and 1 outbound ACL.
01-03-2022 03:57 AM
Thanks so much.
Sorry for all the questions!
But would the best practice be to assign all of the above to one numbered ACL or multiple numbered ACL? I'm just trying to get my head around the use of multiple numbered ACLs
Thanks
01-03-2022 04:01 AM
@jk865 well you'll need 2 ACLs, 1 for each direction inbound from inside and another inbound from outside.
Best practice would not use ACL on a router, use a stateful firewall.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide