KEMBAR78
Access Control List Basic | PDF
0% found this document useful (0 votes)
15 views14 pages

Access Control List Basic

The document provides an overview of Access Control Lists (ACLs), which are used in routers to permit or deny traffic based on specified rules. It explains the implicit deny rule that blocks all traffic unless there is at least one permit statement, and outlines the two types of ACLs: Standard and Extended. Standard ACLs check source addresses while Extended ACLs check both source and destination addresses along with specific protocols and applications.

Uploaded by

mdfoisal552211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views14 pages

Access Control List Basic

The document provides an overview of Access Control Lists (ACLs), which are used in routers to permit or deny traffic based on specified rules. It explains the implicit deny rule that blocks all traffic unless there is at least one permit statement, and outlines the two types of ACLs: Standard and Extended. Standard ACLs check source addresses while Extended ACLs check both source and destination addresses along with specific protocols and applications.

Uploaded by

mdfoisal552211
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

COURSE CODE: CSE-310(FALL 2024)

COURSE TITLE: COMPUTER NETWORK


SESSIONAL

TOPIC: ACCESS CONTROL LIST


PRESENTED BY
LEC FARIA ALAM

CSE,MIST
WHAT IS ACCESS CONTROL LIST

An ACL is a list of permit or deny rules detailing what can or can’t enter
or leave the interface of a router.
Every packet that attempts to enter or leave a router must be tested
against each rule in the ACL until a match is found
WHAT IS ACCESS CONTROL LIST
PURPOSE OF ACLS
ACL OPERATION

The last statement of an ACL is always an implicit deny. This statement is automatically inserted at the
end of each ACL even though it is not physically present. The implicit deny blocks all traffic. Because
of this implicit deny, an ACL that does not have at least one permit statement will block all traffic
TYEPS OF ACCESS CONTROL LIST

• Standard ACL
• Extended ACL
TYEPS OF ACL

• Standard ACL
• Extended ACL

❑Standard ACL
➢ Checks ACL source address
➢ Permits or denies entire protocol suite
➢ Range: 1–99 and 1300–1999
STANDARD ACL
STANDARD ACL
STANDARD ACL COMMAND
EXTENDED ACL

➢ Checks source and destination address


➢ Generally, permits or denies specific protocols and applications
➢ Source and destination TCP and UDP ports
➢ Protocol type (IP, ICMP, UDP, TCP or protocol number)
➢ Range: 100–199 and 2000–2699
EXTENDED ACL
EXTENDED ACL
EXTENDED ACL COMMAND

You might also like