In the world of computer networks, one of the most fundamental security components is an ACL, a function that monitors incoming and outgoing traffic and compares it to a set of defined statements. ACL mainly exists in network devices with packet filtering functions, including routers and switches. In this article, Rui Ge will use graphic illustrations to unveil the mystery of ACL. Let’s get straight to the point! What is ACL?
An ACL is a list of rules that specifies which users or systems are allowed or denied access to specific objects or system resources. Access control lists are also installed in routers or switches. They act as filters, managing which traffic can access the network. ACL TypeThere are generally two types of ACLs: ACL Type
This article will focus on network ACLs. Advantages of ACLACL has many advantages, such as:
Why use ACLs?ACL plays a role in maintaining the normal flow of network traffic. This regulation of network traffic is the main way to maintain the security of an organization or network. Access control lists help restrict traffic that does not seem to be suitable for the security of an organization, ultimately achieving better network performance. The main reason for using access control lists is to maintain the security of the network and protect it from vulnerable and dangerous attempts. If messages are transmitted over the network without being filtered, the chances of putting the organization at risk increase. By using access control lists, a specific security level is granted to the network to regulate all those servers, networks, and services that are authorized and unauthorized to be used by the users. In addition, ACL helps to monitor all the data entering and leaving the system. ACL Control As shown in the figure, access is not allowed to SW3 and SW1 due to ACL control, but access is allowed from SW4 to SW2. ACL componentsACL is a group of rules or entries. Each device can be set with an ACL containing one or more entries. Each entry can set different rules to allow or deny certain traffic. A general ACL has the following parts: ACL components ACL NumberA code that identifies an ACL entry. ACL NameThe ACL name can also be used to identify the ACL entry. RemarkYou can add comments or detailed descriptions for ACLs ACL StatementsJust write some statements to deny or allow traffic. This is very important and will be discussed in detail later. Network ProtocolFor example, IP, TCP, UDP, IPX, etc., rules can be written based on these network protocols. Source address, destination addressThese are the entry and exit addresses targeted by these ACL rules. For example, if your computer accesses the company's server, your computer is the source address and the company's server is the destination address. Source address, destination address logIncoming and outgoing traffic can be recorded using the ACL log function for statistics or troubleshooting network problems. ACL ClassificationGenerally speaking, ACLs are divided into four categories: ACL Classification Standard ACLThis is the weakest basic ACL that only checks the source address. The following is ACL number 5, which is a standard ACL that allows the 172.16.1.0/24 network: access - list 5 permit 172.16 .1 .0 0.0 .0 .255 Extended ACLMore advanced ACLs are capable of blocking entire networks and traffic flows based on their protocol information. The following is an ACL numbered 150 that allows all traffic from the 172.16.1.0/24 network to any IPv4 network if the target has HTTP port 80 as the host port: access - list 200 permit tcp 172.16 .1 .0 0.0 .0 .255 any eq www Dynamic ACLA more secure ACL that utilizes authentication, extended ACLs, and Telnet to allow network access only to users who have gone through the authentication process. Reflexive ACLSession filtering capabilities are added to the packet filtering capabilities of other ACL types, also known as IP session ACLs, which use upper-layer session details to filter traffic. Reflexive ACLs cannot be applied directly to interfaces and are usually nested in extended named access lists. They do not support applications that change port numbers during a session, such as FTP clients. ACL rules
ACL usage scenariosACL usage scenarios Generally speaking, there are three situations: NATDuring address translation, a large number of ACLs will be set to control network traffic for internal and external network security considerations. FirewallNeedless to say, what the firewall does is the ACL rules. QoSThis is generally common in traffic policies, which control the access rights of users in different network segments to traffic. Generally speaking, ACL usage scenarios cannot escape these three situations. Even if there are other situations, they can definitely be summarized and associated with these three situations. SummarizeAn ACL is a set of rules that allow or deny access to a computer network. Network devices, namely routers and switches, apply ACL statements to inbound and outbound network traffic, thereby controlling what traffic can pass through the network. |
<<: Interview surprise: Why use HTTPS? What is it useful for?
>>: Automation in SD-WAN and why you need WAN acceleration
5G is the next generation of wireless broadband t...
The technical specifications related to 5G NR are...
Gary Sevounts, Aryaka's chief marketing offic...
Today, cloud computing is penetrating into all wa...
On August 6, Huawei's online seminar (Huawei ...
【51CTO.com original article】 On September 13, 201...
Edge computing is changing the way millions of de...
[[188583]] "E-government is currently in a p...
[[416112]] This article is reprinted from the WeC...
[51CTO.com original article] During HUAWEI CONNEC...
1. Recently, a strange phenomenon occurred in the...
In the vast world of systems engineering, which l...
Recently, the issue of 4G network speed reduction...
Foreword: According to the "Statistical Repo...
5G provides wireless cellular connectivity with h...