HCIA day 7 ACL access control list

Keywords: Network Protocol

ACL access control list

  1. Access restriction: match the traffic on the interface of router traffic in and out, and then control it
  2. Define traffic of interest

Matching rules

Match one by one from top to bottom. The previous match is executed according to the previous one, and the next one will not be viewed
Cisco implicitly rejects all at the end and Huawei implicitly allows all at the end

Classification of ACl

  1. Standard ACL: only match the source IP address in the traffic
  2. Extended ACL: match the source IP address or target IP address, target port number and target protocol number in the traffic (relatively thin)



Standard ACL

Writing of ACL

  1. number
  2. name



Precautions for configuring standard ACL S:

Because only the source IP address in the traffic is matched, the call should be as close to the target as possible to avoid being unable to access other accessible places



A 0 = = 0.0.0.0

The ACL uses wildcards and OSPF uses anti mask; The difference is that wildcards can be interspersed with 0 and 1

You can use this step to insert
When deleting an entry, you can delete this sequence number
You can also use naming to create a standard ACL list

Remember to call on the interface after ACL configuration is completed



Configure the topology diagram in the following figure

Static routing:
IP route static destination segment mask


Configure ACL so that PC1 cannot access PC3 and PC4, and PC2 can access PC3 and PC4

[ar2]acl 2000
[ar2-acl-basic-2000]rule deny source 192.168.1.10 0
[ar2-acl-basic-2000]q


[ar2]interface g 0/0/1 
[ar2-GigabitEthernet0/0/1]traffic-filter outbound acl 2000

test



Extended ACL

Make PC1 unable to access PC3, but can access PC4

Because the extended ACL can clearly mark the target, the call should be as close to the source as possible

[ar1]acl 3000 

[ar1-acl-adv-3000]rule deny ip source 192.168.1.10 0 destination 192.168.3.10 0

[ar1-acl-adv-3000]q

[ar1]int g 0/0/1 

[ar1-GigabitEthernet0/0/1]traffic-filter inbound  acl 3000



telnet remote login

condition

  1. The login and the logged in device can communicate normally
  2. The logged in device starts the remote login service

Configure the login account and password

[ar2]aaa

[ar2-aaa]local-user xiaobai password cipher 200001	#Add user and password
Info: Add a new user.

[ar2-aaa]local-user xiaobai service-type telnet		#xiaobai only has the function of telnet

[ar2-aaa]local-user xiaobai privilege level ?
  INTEGER<0-15>  Level value						# Level 1 permission can only display
[ar2-aaa]local-user xiaobai privilege level 15		#Level 15 highest authority, you can do anything

[ar2]telnet server enable 							#telnet service is enabled by the login end

[ar2]user-interface vty 0 4

[ar2-ui-vty0-4]authentication-mode aaa

Remote login to AR2 with AR1

<ar1>telnet 192.168.2.2
  Press CTRL_] to quit telnet mode
  Trying 192.168.2.2 ...
  Connected to 192.168.2.2 ...

Login authentication


Username:xiaobai
Password:
<ar2>

Configure ACL for AR2 so that AR1 can telnet AR2, but cannot ping AR2

[ar2]acl 3001

[ar2-acl-adv-3001]rule deny icmp source 192.168.2.1 0 destination 192.168.2.2 0
		
							#Reject icmp (ping)

[ar2-acl-adv-3001]q

[ar2]int g 0/0/0

[ar2-GigabitEthernet0/0/0]traffic-filter inbound acl 3001

Go to AR1 for test


Configure ACL for AR2 so that AR1 cannot access AR2 via telnet, but can ping AR2

	
[ar2]acl 3002

[ar2-acl-adv-3002]rule deny tcp source 192.168.2.1 0 destination 192.168.2.2 0 d
estination-port eq 23

[ar2-acl-adv-3002]q

[ar2]int g 0/0/0

[ar2-GigabitEthernet0/0/0]traffic-filter inbound acl 3002

Go to AR1 for test

Posted by kerplunk on Mon, 20 Sep 2021 10:50:06 -0700