CCNA思科网络技术学院教程-第20章_访问控制列表.ppt_第1页
CCNA思科网络技术学院教程-第20章_访问控制列表.ppt_第2页
CCNA思科网络技术学院教程-第20章_访问控制列表.ppt_第3页
CCNA思科网络技术学院教程-第20章_访问控制列表.ppt_第4页
CCNA思科网络技术学院教程-第20章_访问控制列表.ppt_第5页
已阅读5页,还剩64页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、第20章 访问控制列表,主要内容,介绍如何使用ACL,Objectives,Upon completion of this chapter, you will be able to perform the following tasks: Identify the key functions and special processing of IP access lists Configure standard IP access lists Control virtual terminal access with access class Configure extended IP acce

2、ss lists Verify and monitor IP access lists,20.1 ACL 概述,ACL,access control lists,访问控制列表 用处: 网络访问安全控制,Manage IP Traffic as network access grows,1、 Why Use ACL?,,,Internet,Manage IP traffic as network access grows Filter packets as they pass through the router,1、 Why Use ACL?,2、Acc

3、ess List Applications,Permit or deny packets moving through the router Permit or deny vty access to or from the router Without access lists all packets could be transmitted onto all parts of your network,Virtual terminal line access (IP),Transmission of packets on an interface,QueueList,Priority and

4、 custom queuing,Other Access List Uses,Special handling for traffic based on packet tests,QueueList,Priority and custom queuing,Other Access List Uses,Dial-on-demand routing,Special handling for traffic based on packet tests,Other Access List Uses,Route filtering,RoutingTable,QueueList,Priority and

5、custom queuing,Dial-on-demand routing,Special handling for traffic based on packet tests,Other Access List Uses,Route filtering,RoutingTable,QueueList,Priority and custom queuing,Dial-on-demand routing,Special handling for traffic based on packet tests,Fire Wall,3、 What Are Access Lists?,Standard Ch

6、ecks Source address Generally permits or denies entire protocol suite,Outgoing Packet,E0,S0,Incoming Packet,Access List Processes,Permit?,3、What Are Access Lists?,Standard Checks Source address Generally permits or denies entire protocol suite Extended Checks Source and Destination address Generally

7、 permits or denies specific protocols,Outgoing Packet,E0,S0,Incoming Packet,Access List Processes,Permit?,Protocol,Standard Checks Source address Generally permits or denies entire protocol suite Extended Checks Source and Destination address Generally permits or denies specific protocols Inbound or

8、 Outbound,3、What Are Access Lists?,Outgoing Packet,E0,S0,Incoming Packet,Access List Processes,Permit?,Protocol,InboundInterface Packets,N,Y,Packet Discard Bucket,Choose Interface,N,Access List?,Routing Table Entry?,Y,Outbound Interfaces,Packet,S0,4、Outbound Access Lists,Outbound Interfaces,Packet,N

9、,Y,Packet Discard Bucket,Choose Interface,Routing Table Entry?,N,Packet,Test Access List Statements,Permit?,Y,4、Outbound Access Lists,Access List?,Y,S0,E0,InboundInterface Packets,Notify Sender,4、Outbound Access Lists,If no access list statement matches then discard the packet,N,Y,Packet Discard Buc

10、ket,Choose Interface,Routing Table Entry?,N,Y,Test Access List Statements,Permit?,Y,Access List?,Discard Packet,N,Outbound Interfaces,Packet,Packet,S0,E0,InboundInterface Packets,A List of Tests: Deny or Permit,Packets to interfaces in the access group,Packet Discard Bucket,Y,Interface(s),Destinatio

11、n,Deny,Deny,Y,Match First Test ?,Permit,A List of Tests: Deny or Permit,Packets to Interface(s) in the Access Group,Packet Discard Bucket,Y,Interface(s),Destination,Deny,Deny,Y,Match First Test ?,Permit,N,Deny,Permit,Match Next Test(s) ?,Y,Y,A List of Tests: Deny or Permit,Packets to Interface(s) in

12、 the Access Group,Packet Discard Bucket,Y,Interface(s),Destination,Deny,Deny,Y,Match First Test ?,Permit,N,Deny,Permit,Match Next Test(s) ?,Deny,Match Last Test?,Y,Y,N,Y,Y,Permit,A List of Tests: Deny or Permit,Packets to Interface(s) in the Access Group,Packet Discard Bucket,Y,Interface(s),Destinat

13、ion,Deny,Y,Match First Test ?,Permit,N,Deny,Permit,Match Next Test(s) ?,Deny,Match Last Test?,Y,Y,N,Y,Y,Permit,Implicit Deny,If no match deny all,Deny,N,5、 Access List Configuration Guidelines,Access list numbers indicate which protocol is filtered One access list per interface, per protocol, per di

14、rection The order of access list statements controls testing Most restrictive statements should be at the top of list There is an implicit deny any as the last access list testevery list should have at least one permit statement Create access lists before applying them to interfaces Access list, fil

15、ter traffic going through the router; they do not apply to traffic originated from the router,6、Access List Command Overview,Step 1: Set parameters for this access list test statement (which can be one of several statements),access-list access-list-number permit | deny test conditions ,Router(config

16、)#,Step 1: Set parameters for this access list test statement (which can be one of several statements),Router(config)#,Step 2: Enable an interface to use the specified access list, protocol access-group access-list-number in | out,Router(config-if)#,6、Access List Command Overview,IP Access lists are

17、 numbered 1-99 or 100-199,access-list access-list-number permit | deny test conditions ,7、How to Identify Access Lists,Number Range/Identifier,Access List Type,IP,1-99,Standard,Standard IP lists (1 to 99) test conditions of all IP packets from source addresses,Number Range/Identifier,Access List Typ

18、e,7、How to Identify Access Lists,IP,1-99 100-199,Standard Extended,Standard IP lists (1 to 99) test conditions of all IP packets from source addresses Extended IP lists (100 to 199) can test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports,Number Range

19、/Identifier,IP,1-99 100-199 Name (Cisco IOS 11.2 and later),800-899 900-999 1000-1099 Name (Cisco IOS 11.2. F and later),Standard Extended SAP filters Named,Standard Extended Named,Access List Type,IPX,7、How to Identify Access Lists,Standard IP lists (1 to 99) test conditions of all IP packets from

20、source addresses Extended IP lists (100 to 199) can test conditions of source and destination addresses, specific TCP/IP protocols, and destination ports Other access list number ranges test conditions for other networking protocols,Source Address,Segment (for example, TCP header),Data,Packet (IP he

21、ader),Frame Header (for example, HDLC),Deny,Permit,Use access list statements 1-99,8、Testing Packets with Standard Access Lists,Destination Address,Source Address,Protocol,Port Number,Segment (for example, TCP header),Data,Packet (IP header),Frame Header (for example, HDLC),Use access list statement

22、s 1-99 or 100-199 to test the packet,Deny,Permit,An Example from a TCP/IP Packet,9、Testing Packets with Extended Access Lists,0 means check corresponding address bit value 1 means ignore value of corresponding address bit,do not check address (ignore bits in octet),=,0,0,0,0,0,0,0,0,Octet bit positi

23、on and address value for bit,ignore last 6 address bits,check all address bits (match all),ignore last 4 address bits,check last 2 address bits,Examples,Wildcard Bits: How to Check the Corresponding Address Bits,Example 9 checks all the address bits Abbreviate this wildcard mask u

24、sing the IP address preceded by the keyword host (host 9),Test conditions: Check all the address bits (match all),9,,(checks all bits),An IP host address, for example:,Wildcard mask:,Wildcard Bits to Match a Specific IP Host Address,Accept any address: 255.255.25

25、5.255 Abbreviate the expression using the keyword any,Test conditions: Ignore all the address bits (match any),,55,(ignore all),Any IP address,Wildcard mask:,Wildcard Bits to Match Any IP Address,Check for IP subnets /24 to /24,Network .host ,Wild

26、card mask: 0 0 0 0 1 1 1 1 | 0 0 0 1 0 0 0 0 = 16 0 0 0 1 0 0 0 1 =17 0 0 0 1 0 0 1 0 =18 : : 0 0 0 1 1 1 1 1 =31,Address and wildcard mask: 55,Wildcard Bits to Match IP Subnets, 1999, Cisco Systems, Inc.,10-34,20.2 Configuring Standard IP Access Lists,Standard IP Access List Con

27、figuration,access-list access-list-number permit|deny source mask,Router(config)#,Sets parameters for this list entry IP standard access lists use 1 to 99 Default wildcard mask = “no access-list access-list-number” removes entire access-list,access-list access-list-number permit|deny source

28、mask,Router(config)#,Activates the list on an interface Sets inbound or outbound testing Default = Outbound “no ip access-group access-list-number” removes access-list from the interface,Router(config-if)#,ip access-group access-list-number in | out ,Sets parameters for this list entry IP standard a

29、ccess lists use 1 to 99 Default wildcard mask = “no access-list access-list-number” removes entire access-list,Standard IP Access List Configuration,,,3,E0,S0,E1,Non- ,Standard IP Access List Example 1,access-list 1 permit 55 (impli

30、cit deny all - not visible in the list) (access-list 1 deny 55),Permit my network only,access-list 1 permit 55 (implicit deny all - not visible in the list) (access-list 1 deny 55) interface ethernet 0 ip access-group 1 out interface ethe

31、rnet 1 ip access-group 1 out,Standard IP Access List Example 1,,,3,E0,S0,E1,Non- ,Deny a specific host,Standard IP Access List Example 2,,,3,E0,S0,E1,Non- ,access-list 1 deny 3 ,Standard IP Access List E

32、xample 2,,,3,E0,S0,E1,Non- ,Deny a specific host,access-list 1 deny 3 access-list 1 permit 55 (implicit deny all) (access-list 1 deny 55),access-list 1 deny 3 access-list 1 permit 0.

33、0.0.0 55 (implicit deny all) (access-list 1 deny 55) interface ethernet 0 ip access-group 1 out,Standard IP Access List Example 2,,,3,E0,S0,E1,Non- ,Deny a specific host,Deny a specific subnet,Standard IP Access List Example 3

34、,,,3,E0,S0,E1,Non- ,access-list 1 deny 55 access-list 1 permit any (implicit deny all)(access-list 1 deny 55),access-list 1 deny 55 access-list 1 permit any (implicit deny all)(access-list 1 deny

35、 55) interface ethernet 0 ip access-group 1 out,Standard IP Access List Example 3,,,3,E0,S0,E1,Non- ,Deny a specific subnet, 1999, Cisco Systems, Inc.,10-44,20.3 Control vty Access With Access Class,Filter Virtual Terminal (vty) Access to a Router

36、,Five virtual terminal lines (0 through 4) Filter addresses that can access into the routers vty ports Filter vty access out from the router,0,1,2,3,4,Virtual ports (vty 0 through 4),Physical port e0 (Telnet),Console port (direct connect),console,e0,How to Control vty Access,0,1,2,3,4,Virtual ports

37、(vty 0 through 4),Physical port (e0) (Telnet),Setup IP address filter with standard access list statement Use line configuration mode to filter access with the access-class command Set identical restrictions on all vtys,Router#,e0,Virtual Terminal Line Commands,Enters configuration mode for a vty or

38、 vty range,Restricts incoming or outgoing vty connections for address in the access list,access-class access-list-number in|out,line vty#vty# | vty-range,Router(config)#,Router(config-line)#,Virtual Terminal Access Example,Permits only hosts in network to connect to the routers vtys,acce

39、ss-list 12 permit 55 ! line vty 0 4 access-class 12 in,Controlling Inbound Access, 1999, Cisco Systems, Inc.,10-49,20.4 Configuring Extended IP Access Lists,Standard versus External Access List,Standard,Extended,Filters Based onSource.,Filters Based onSource and destination.,Permi

40、t or deny entire TCP/IP protocol suite.,Specifies a specific IP protocol and port number.,Range is 100 through 199.,Range is 1 through 99,Extended IP Access List Configuration,Router(config)#,Sets parameters for this list entry,access-list access-list-number permit | deny protocol source source-wild

41、card operator port destination destination-wildcard operator port established log,Router(config-if)# ip access-group access-list-number in | out ,Extended IP Access List Configuration,Activates the extended list on an interface,Sets parameters for this list entry,Router(config)# access-list access-l

42、ist-number permit | deny protocol source source-wildcard operator port destination destination-wildcard operator port established log,Deny FTP from subnet to subnet out of E0 Permit all other traffic,,,3,E0,S0,E1,Non- ,Extended Access Lis

43、t Example 1,access-list 101 deny tcp 55 55 eq 21 access-list 101 deny tcp 55 55 eq 20,Deny FTP from subnet to subnet out of E0 Permit all other traffic,Extended Access List Example 1,,,1

44、3,E0,S0,E1,Non- ,access-list 101 deny tcp 55 55 eq 21 access-list 101 deny tcp 55 55 eq 20 access-list 101 permit ip any any (implicit deny all) (access-list 101 deny ip 55 255.255

45、.255.255),access-list 101 deny tcp 55 55 eq 21 access-list 101 deny tcp 55 55 eq 20 access-list 101 permit ip any any (implicit deny all) (access-list 101 deny ip 55 55) interface ethern

46、et 0 ip access-group 101 out,Deny FTP from subnet to subnet out of E0 Permit all other traffic,Extended Access List Example 1,,,3,E0,S0,E1,Non- ,Deny only Telnet from subnet out of E0 Permit all other traffic,Extended Access Li

47、st Example 2,,,3,E0,S0,E1,Non- ,access-list 101 deny tcp 55 any eq 23,Deny only Telnet from subnet out of E0 Permit all other traffic,Extended Access List Example 2,,,3,E0,S0,E1,Non- ,access-

48、list 101 deny tcp 55 any eq 23 access-list 101 permit ip any any (implicit deny all),access-list 101 deny tcp 55 any eq 23 access-list 101 permit ip any any (implicit deny all) interface ethernet 0 ip access-group 101 out,Deny only Telnet from subnet ou

49、t of E0 Permit all other traffic,Extended Access List Example 2,,,3,E0,S0,E1,Non- ,20.5 Using Named IP Access Lists,Router(config)#,ip access-list standard | extended name,Feature for Cisco IOS Release 11.2 or later,Alphanumeric name string must be unique,Usin

50、g Named IP Access Lists,Router(config)#,ip access-list standard | extended name, permit | deny ip access list test conditions permit | deny ip access list test conditions no permit | deny ip access list test conditions ,Router(config std- | ext-nacl)#,Feature for Cisco IOS Release 11.2 or later,Alph

51、anumeric name string must be unique,Permit or deny statements have no prepended number no removes the specific test from the named access list,Using Named IP Access Lists,Feature for Cisco IOS Release 11.2 or later,Alphanumeric name string must be unique,Permit or deny statements have no prepended n

52、umber no removes the specific test from the named access list,Activates the IP named access list on an interface,Access List Configuration Principles,Order of access list statements is crucial Recommended: use a text editor on a TFTP server or use PC to cut and paste Top-down processing Place more s

53、pecific test statements first No reordering or removal of statements Use no access-list number command to remove entire access list Exception: Named access lists permit removal of individual statements Implicit deny all Unless access list ends with explicit permit any,Place extended access lists clo

54、se to the source Place standard access lists close to the destination,E0,E0,E1,S0,To0,S1,S0,S1,E0,E0,B,A,C,20.6 Where to Place IP Access Lists,Recommended:,D,wg_ro_a#show ip int e0 Ethernet0 is up, line protocol is up Internet address is 1/24 Broadcast address is 55 Address dete

55、rmined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is 1 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP f

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论