Access Control Lists (ACLs) – Practical Networking .net (2024)

Access Control Lists (ACLs)

Access Control Lists, or ACLs, are a tool that is used to define traffic on Cisco routers.

By themselves, they merely identify a particular set of traffic. How you apply the ACL then determines what occurs to that traffic.

For instance, if you apply an ACL to…

  • … an interface? Matched traffic is allowed through
  • … a Crypto map? Matched traffic is secured and sent through a VPN
  • … a NAT configuration? Matched traffic is translated
  • … a NAT Exemption configuration? Matched traffic is not translated
  • … a Route Map? Matched routing advertisem*nt are accepted
  • … a QoS Classification? Matched traffic is prioritized (or de-prioritized)

The core of doing any of these successfully is understanding how to configure access lists on Cisco routers. And that is what this video series will teach you.

Of all the ways to apply an ACL listed above, the most common is to applying and ACL to an Interface. The purpose of such an ACL is to filter the “bad packets” from the “good packets”. In fact, when you apply an ACL to an interface, it is sometimes referred to as a Packet Filter.

To that end, Packet Filter ACLs are the focus of this video series.

Access Control Lists (ACLs) – Practical Networking .net (1)
Access Control Lists (ACLs) – Practical Networking .net (2)In Video 1, we look at the core definition of access-lists. Then we discuss the ideas of Standard and Extended access-lists. And we finish by illustrating the concept of applying one ACL per interface, per direction, per protocol.
Access Control Lists (ACLs) – Practical Networking .net (3)In Video 2, we look at every part of the syntax for the configuration of Numbered ACLs. We discuss all the commands required to configure a Numbered Standard ACL and a Numbered Extended ACL.
Access Control Lists (ACLs) – Practical Networking .net (4)In Video 3, we configure a Numbered ACL on a live Router to match a particular set of packets. This demonstration, along with the explination of the syntax in the prior lesson will give you everything you need to succesfully configure Numbered ACLs.
Access Control Lists (ACLs) – Practical Networking .net (5)In Video 4, we look at Named ACLs, and unpack the syntax differences between Named ACLs and Numbered ACLs. We highlight where the syntax is the same, and discuss where it is different.
Access Control Lists (ACLs) – Practical Networking .net (6)In Video 5, we continue where we left off and re-configure our Numbered ACL as a Named ACL (from Video 3). Then we spend the rest of the video demonstrating the features of Named ACLs which don’t exist in Numbered ACLs.
Access Control Lists (ACLs) – Practical Networking .net (7)In Video 6, we look at IPv6 ACLs. We will show you the syntax for configuring an ACL to match IPv6 traffic. Specifically, we will show you how the syntax is similar to what you already know.
Access Control Lists (ACLs) – Practical Networking .net (8)In Video 7, we circle back to Video 1 and show you the syntax required to apply the ACLs we created to Router Interfaces.
Access Control Lists (ACLs) – Practical Networking .net (9)In Video 8, we discuss the “rules” of applying ACLs closer to the source or closer to the destination. We talk about why these “rules” exist, and a practical reason to ignore them.

To access the specific timestamps of what is covered in each video, check out each video’s correlating blog post:

  • Part 1 – What are Access Lists?
  • Part 2 – Numbered ACL Syntax
  • Part 3 – Numbered ACL Configuration Demonstration
  • Part 4 – Named ACL Syntax
  • Part 5 – Named ACL Configuration Demonstration
  • Part 6 – IPv6 ACLs – Syntax and Demonstration
  • Part 7 – Applying ACLs to Interfaces
  • Part 8 – Where should you apply ACLs (closer to source or destination?)

If you’re studying for the CCNA or learning how to operate Routers, this video series will be the last you need to watch to understand Access Control Lists.

Hope you enjoy!

Related Posts:
CCNA -- Index
VLANs -- Index
Network Address Translation (NAT)
Subnetting Mastery

Tags:acl

5 6 votes

Article Rating

Subscribe

Inline Feedbacks

View all comments

DevOps Training

2 years ago

thank you

Reply

Ed Harmoush

Author

Reply to DevOps Training

2 years ago

You’re welcome =)

Reply

Rob

2 years ago

Hey Ed,

I want to thank you for your quality content, I would like to ask, is there any packet tracer file of each lab that you have been doing? it would be great to download it and follow along with you,

Regards,

Reply

Ed Harmoush

Author

Reply to Rob

2 years ago

I’m afraid there isn’t. I used GNS3 for these demos, and the GNS3 files are not backed up. You’d have to re-create the topology manually.

Glad you enjoyed the content!

1

Reply

1 year ago

thank you for your taching
please find a way to get rid of the sound of mouth click when you make a video
thank you again

Reply

Lanre

9 months ago

Very Explanatory and devoid of sales talk

Reply

jacqueline

3 days ago

The best detail oriented and didact course ever.
thank you

Reply

Access Control Lists (ACLs) – Practical Networking .net (2024)

References

Top Articles
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 6144

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.