In networking security, access list is normally used to
classify packets, whether to deny the packets or to permit the packets. One of
the examples would be using access control list in Network Address Translation
(NAT) as well as Port Address Translation (PAT) in order to bind public pool of
address with the private address (Saunders, n.d.) .
Access control list is can also be used in both Cisco IOS Routers
and Switches. It can specify specific ports and to set inbound and outbound
rule.
Access control list can be categorized in standard Access Control
List (ACLs) and extended ACL. We could actually identify which type of ACL by
ID number. Table 1 will be showing the range of each ACL category.
1-99 or 1300-1999
|
Standard ACL
|
100-199 or 2000-2699
|
Extended ACL
|
Table 1 (ID range of
each ACL category (Saunders, n.d.) )
Besides ID ACL, there is also
Named ACL. By having Named ACL, it enables network engineers to better identify
each uses of each ACL. In addition, Named ACL will also enable them to remove any
specific line in the ACL. Such function will also enable network engineer to
remove any specific lines in the ACLs (Saunders, n.d.) .
There also implicit rules to in
ACL. One of the rules will be deny any traffic in at the end of the rules. The
reason of placing such rule in at the end of ACL is because ACL will be
processing each condition from the top till the bottom of ACL. The router and
switch will discontinue such checking when there is a match in the condition (“Access
Control,” n.d.).
In conclusion, the ACL will be help to protect
the network by removing any unwanted traffic in order to prevent any attack in
the network.
References
Access Control Lists(ACLs) Basics. (n.d.). Retrieved May 11, 2012, from Aspell:
http://www.aspell.org/CCNA/CCNA-Cisco-Access-Control-List-ACL.php
Saunders, J. (n.d.). Access control lists (ACL).
Retrieved May 11, 2012, from www.jlsnet.co.uk:
http://www.jlsnet.co.uk/index.php?page=ccna_4a_acls
Hi Kim Chye,
ReplyDeleteI've just read through your post on access control list. I feel that your explanations are concise & straight to the point. This allows new learners like me to absorb & understand it much easily.
Furthermore, you've also shared about the uses of ACL & not just what they themselves are actually. In doing so, the importance of ACL has been highlighted & people would be more aware of it.
Lastly, you've also gave adequate examples on how different type of ACL are used by different occupations for different purposes. But perhaps you could add one or two more diagrams/tables to illustrate the control list?
Anyway, well done! :)
aloysiusT
Hello my friend,
ReplyDeleteFirst of all i must say thanks for taking the time to write this post on Access control list. I find your post on this particular topic to be very clear, informative and also very interesting. I have done my own research on this topic but your post has given me the opportunity to learn many more things. I like that you took the time to show us the different ACLs. It was really interesting. Once again, thanks for writing for us this interesting post.
see you soon bro.
Hi Kim Chye,
ReplyDeleteFirst of all, i would like to thank you for taking your time to collate and write a post on Access Control List. After reading your post, i felt that this had helped me a lot in having a deeper understanding of what Access Control List is about.
The second thing that i liked about your post is that you also included how people could identify the type of Access Control List(either Standard Access Control List or Extended Access Control List ) through their Id number.
And finally I would once again like to thank you for the effort you put through to get this post up.
-Junhao
Hi Kim Chye,
ReplyDeleteThanks for the post. [Insert trite comment] I am finally able to grasp what seemed like an abstruse concept through your post, which truly transcends the theoretical works of the past century, a prodigious feat even for someone who possesses impeccable writing skills such as yours.
Anyway bla bla I learned alot through this post about access controls list and stuff.
Julian
This comment has been removed by the author.
ReplyDeleteHi Kim Chye,
ReplyDeleteI have read your post on Access Control List and I find it to be very easy to understand. The definitions of Standard ACLs and Extended ACLs are also clearly spelled out.
You have also included the purpose of what ACL does, which I like that. It gives a clear picture to what its function is and helps people understand the usage of ACL better.
The existence of implicit rules in ACLs are also clearly pointed out.
In addition, I have now learnt that we can identify what kind of ACL it is by referring to what the ID number is.
Keep up the good work!
Winston Ho
Watashi wa WeiJie desu~~
ReplyDeleteFirst, i want to say is walao so many ppl comment liao. But anyway, your post very detailed, got the named ACL and other acl lor. then the table let me remember the numbers for access list easier. But hor, i tink hor u can use more image to show the different uses and types of the ACL lor. You know why i use singlish ma? so hor i can reach the 100 word limit arh then the mr lim wont mark me absent arh, i scared LOL . Ya so hor, good post la then jyjy~~~
Hi Kim Chye,
ReplyDeleteI have read your post on Access Control List. I think they were well written, and easy to understand. After reading your post, I now understand the different ACL categories and how they differ from one another. With the uses of ACL and importance of ACL made me understand even more about ACLs. And with the examples you given, it made me understand much more about ACLs. So, Thank You for the post!
Neo Kai Xiang
Hi kim chye,
ReplyDeleteI just read your post about the Access Control List. I think that it is a very well-written post, it goes straight to the point, explains clearly what are Access Control Lists, what it does, it's features, and the different versions of it. (Named, extended and standard)
This post has made me understand so much more about Access Control List.