09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ACL (using <strong>the</strong> ACL ID number) is associated with <strong>the</strong> filtering or logic command<br />

that is specific <strong>to</strong> an application.<br />

When ACLs are used for pro<strong>to</strong>col-specific packet filtering, <strong>the</strong>y are applied <strong>to</strong><br />

interfaces as access-groups. Each interface can support a single, standard or<br />

extended, inbound and outbound access-group. This variability applies <strong>to</strong> all<br />

enabled pro<strong>to</strong>cols. Each access-group is applied as an interface configuration<br />

subcommand . If<br />

no filter direction is specified, <strong>the</strong> access-group will be applied as an inbound filter.<br />

When creating <strong>the</strong> ACL, take in<strong>to</strong> account where <strong>the</strong> ACL will be placed in <strong>the</strong><br />

interface's path. Traditionally, access-groups used for security are inbound filters,<br />

on <strong>the</strong> assumption that you are defending against unauthorized packets from<br />

outside your LAN. When inbound filters are applied, all traffic flows <strong>to</strong> <strong>the</strong> interface.<br />

During <strong>the</strong> matching process, <strong>the</strong> inbound list is first compared <strong>to</strong> <strong>the</strong> source<br />

address of <strong>the</strong> incoming packet. If <strong>the</strong> packet matches an address on <strong>the</strong> list, it is<br />

processed fur<strong>the</strong>r. If no match is made, it is processed by <strong>the</strong> default action (usually<br />

deny). Outbound filters are also used for security filtering in scenarios where <strong>the</strong><br />

router is acting as a firewall and outbound access is restricted or requires<br />

au<strong>the</strong>ntication. More often, though, <strong>the</strong>y are used as traffic filters, <strong>to</strong> discard<br />

unneeded traffic and permit everything else. With outbound filters, <strong>the</strong> traffic flows<br />

through <strong>the</strong> interface, a route lookup is performed, and <strong>the</strong>n <strong>the</strong> packet is processed<br />

through <strong>the</strong> filter. If a match is made, <strong>the</strong> packet is forwarded on, o<strong>the</strong>rwise it is<br />

discarded. The first match of an outbound filter is made against <strong>the</strong> source address<br />

of <strong>the</strong> outgoing packet. The issue <strong>to</strong> be aware of is that <strong>the</strong> type of list and match<br />

tests used <strong>to</strong> process packets changes, depending on which side of <strong>the</strong> interface it's<br />

applied <strong>to</strong>.<br />

NOTE<br />

IOS also supports advanced IP access control lists of two types: dynamic and<br />

reflexive. Dynamic ACLs provide lock and key IP traffic filtering. Lock and key<br />

filtering allows you <strong>to</strong> configure a gateway router <strong>to</strong> act as a firewall. Before a user<br />

can send traffic out through <strong>the</strong> router, he must au<strong>the</strong>nticate first. After being<br />

successfully au<strong>the</strong>nticated (and assuming <strong>the</strong> destination host is also permitted)<br />

temporary access through <strong>the</strong> gateway is granted.<br />

Reflexive lists are created with named ACLs. Where <strong>the</strong>y differ from regular ACLs is<br />

that, ra<strong>the</strong>r than having a static list of matching statements that leave specific ports<br />

open, reflexive lists add ACL entries for specific hosts on a dynamic and temporary<br />

basis. These entries are based on upper-layer session activity that is defined as part<br />

of <strong>the</strong> reflexive ACL. This kind of configuration is particularly advantageous from a<br />

security perspective, because it defends against most <strong>network</strong>-based security<br />

assaults (when used in conjunction with extended ACL matching statements). By

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!