What are Standard and Extended ACL in Cisco Networking ?
In Cisco networking, Access Control Lists (ACLs) are used to control and filter network traffic based on various criteria such as source IP addresses, destination IP addresses, protocols, and port numbers. ACLs are categorized into two main types: Standard ACLs and Extended ACLs. These two types of ACLs serve different purposes and have different capabilities:
Standard ACL (Access Control List):
* Standard ACLs are used primarily to filter traffic based solely on the source IP address of packets.
* They are typically used for simple access control scenarios where you want to permit or deny traffic from specific source IP addresses.
* Standard ACLs use only the source IP address in their rules and do not consider destination IP addresses, protocols, or port numbers.
* Standard ACLs are numbered from 1 to 99 and from 1300 to 1999 in Cisco IOS.
Example of a standard ACL rule that permits traffic from a specific source IP address:
access-list 10 permit 192.168.1.1
Extended ACL (Access Control List):
* Extended ACLs offer more advanced and granular control over network traffic compared to standard ACLs.
* They allow you to filter traffic based on a combination of criteria, including source and destination IP addresses, protocols, and port numbers.
* Extended ACLs are used in more complex scenarios where you need to permit or deny traffic based on multiple factors, such as allowing FTP traffic to a specific server from a particular subnet.
* Extended ACLs are numbered from 100 to 199 and from 2000 to 2699 in Cisco IOS.
Example of an extended ACL rule that permits HTTP (TCP port 80) traffic from a specific source subnet to a specific destination subnet:
access-list 101 permit tcp 192.168.1.0 0.0.0.255 10.0.0.0 0.255.255.255 eq 80
Comments
Post a Comment