09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

trying <strong>to</strong> build ACLs with <strong>the</strong> command line. By <strong>the</strong> way, just in case you missed it,<br />

when you add anything <strong>to</strong> an ACL, it is appended <strong>to</strong> <strong>the</strong> bot<strong>to</strong>m. This means that if<br />

you do not delete <strong>the</strong> ACL (with <strong>the</strong> global<br />

configuration command) before you copy your new ACL in<strong>to</strong> <strong>the</strong> running-config, all<br />

your changes will be appended <strong>to</strong> <strong>the</strong> bot<strong>to</strong>m of <strong>the</strong> old ACL.<br />

Extended IP Access Control Lists<br />

Extended IP access-lists require a little more care and feeding than standard IP lists,<br />

because <strong>the</strong>y provide additional matching capability. Standard ACLs are<br />

straightforward, and this characteristic lends <strong>the</strong>m <strong>to</strong> being utilized with distribution,<br />

dialer, and route-map matching lists. Extended lists are used <strong>to</strong> create traffic filters,<br />

and <strong>the</strong> feature that distinguishes this function is <strong>the</strong> operation/port-value pair<br />

match. Extended ACLs are created line by line using <strong>the</strong> global configuration<br />

command .<br />

First, let's create an extended ACL without opera<strong>to</strong>r/value matches:<br />

asbr-a2(config)#access-list 100 permit ip any 192.168.5.0 0.0.0.255<br />

asbr-a2(config)#interface s0<br />

asbr-a2(config-if)# ip access-group 100 in<br />

This extended ACL permits all IP traffic from any source <strong>to</strong> any host on <strong>network</strong><br />

192.168.5.0 /24. All o<strong>the</strong>r traffic is discarded. Using ip as <strong>the</strong> pro<strong>to</strong>col effectively<br />

permits all IP pro<strong>to</strong>col traffic. Alternatively, you can create filters that are pro<strong>to</strong>colspecific.<br />

The pro<strong>to</strong>col choices are illustrated in Table 9.2. Extended lists, like<br />

standard lists, provide <strong>the</strong> option <strong>to</strong> use any in place of a <strong>network</strong> address. If you<br />

want <strong>to</strong> permit a host address instead of a <strong>network</strong> address range, <strong>the</strong> keyword<br />

host is used along with <strong>the</strong> host's IP address.<br />

Table 9.2. IP ACL Pro<strong>to</strong>col Filtering Keywords<br />

Enhanced Interior Gateway Routing Pro<strong>to</strong>col<br />

Pro<strong>to</strong>col ACL Keyword<br />

eigrp

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!