An ACL consists of sequential series of statements known as an Access Control Entry (ACE). Each ACE specifies a matching criteria and an action which can be either Permit or deny. The matching criteria can be various things such as source/destination address or protocol such as TCP or UDP. For an individual ACE all configured matching values must match in order for that ACE to be considered as match. For example if an ACE is configured to match source IP address of 10.1.1.1 and destination IP address 172.16.1.1 then a packet must match against both of these for the ACE to be considered as a match. When the first match occurs, Access-List processing stops and the specified action is taken.

An ACL can be classified into two categories namely, Standard ACLs and Extended ACLs. Our focus will be on Standard ACLs in this lesson and we will cover Extended ACLs in the next lesson.

Standard ACLs: Standard IP ACLs follow a simple logic and can only filter traffic based on IP source address, network or subnet. They use only the source IP address in an IP packet as the condition test. All decisions are made based on the source IP address. This means standard access lists basically permit or deny an entire suite of protocols. They don’t distinguish between any of the many types of IP traffic such as WWW, Telnet, UDP, and so on.

A Standard ACL is created with the access-list command and then applied to the interface using the access-group command. Standard ACL syntax and description are shown below

 

Ciscoasa(config)# access-list access-list-number {deny | permit} source

[source-wildcard] [log]

 

 

Syntax Description 

 

access-list-number

 

 

Identifies an access list by number as a standard or extended list.

Also allows the creation and separation of multiple access lists.

 

 

deny

 

 

Denies access if the conditions are matched.

 

permit

 

 

Permits access if the conditions are matched.

 

source

 

 

Specifies the IP address/network to match on the source IP address of the Packet. Use the any keyword as an abbreviation for a source and source-wildcard of 0.0.0.0 255.255.255.255.

 

 

source-wildcard

 

 

(Optional) Wildcard bits to be applied to the source

 

 

log

 

Causes an informational logging message about the packet that matches the entry to be sent to the console.

In Cisco IOS the Standard ACLs can have numbers in range of 1-99 and 1300-1999. Standard ACLs should be applied close to the destination of the packets so that they do not unintentionally discard packets that should not be discarded. We will use the network depicted in figure below to explain this concept.

 

Our task is to configure the network such that host 20.1.1.2 cannot access 10.1.1.2, first we will create an access-list as shown below

R1(config)# access-list 10 deny 20.1.1.2

R1(config)# access-list 10 permit any

and then we will apply this access-list to an interface which will process incoming packets and if there is match it will drop the packets. If the access-list is applied on R5 e0/0 interface then all traffic from 20.1.1.2 will be dropped since Standard ACLs match only based on source address field, same goes with other routers like R2, R3, and R4. However if the access-list is applied the inbound direction on E0/1 interface of R1 we have much better control of what we specifically need to drop.

Configuration Examples

We can use Standard ACLs to implement different criteria of access control. For example in the illustration shown above we restricted host 20.1.1.2 from accessing the host 10.1.1.2. We can also use Standard ACLs to restrict a complete subnet, for example we can configure an ACL on R5 that denies packet coming from 10.1.1.0/24 subnet on S0/0 interface. The configuration to achieve this is shown below:

R5(config)# access-list 20 deny ip 10.1.1.0 0.0.0.255

R5(config)# access-list 20 permit any

R5(config)# interface serial 0/0

R5(config-if)# access-group 20 in

Moving ahead from the examples shown above, standard ACLs can also be used to restrict traffic to a router’s control and management plane. For example if we want to restrict Host 1 such that it cannot telnet R1, we can create a standard ACL and deny Host 1 in it and then apply to the VTY lines which control telnet access to the router. The configuration to accomplish this shown below

R1(config)# access-list 30 deny 10.1.1.2

R1(config)# access-list 30 permit any

R1(config)# line vty 0 4

R1(config)# access-class 30 in

This brings us to the end of this lesson in which we covered standard ACLs, in the upcoming lesson we will study indepth of Extended and Named ACLs and their configuration.