390 likes | 535 Views
Access Control Lists. Accessing the WAN – Chapter 5. Objectives. Explain how ACLs are used to secure a medium-size Enterprise branch office network. Configure standard ACLs in a medium-size Enterprise branch office network.
E N D
Access Control Lists Accessing the WAN– Chapter 5
Objectives • Explain how ACLs are used to secure a medium-size Enterprise branch office network. • Configure standard ACLs in a medium-size Enterprise branch office network. • Configure extended ACLs in a medium-size Enterprise branch office network. • Describe complex ACLs in a medium-size Enterprise branch office network. • Implement, verify and troubleshoot ACLs in an enterprise network environment.
Security in the Campus Model • Core: not here. Fastest part of the network, implementing security here would slow it down. Besides, traffic has already got into the network. • Access switches: switch ports set to specific VLANs. Port security: disable port if too many MAC addresses. • Access routers: let traffic in/out from outside the network. Good place to enforce security • Inter-VLAN routers or L3 switches: allows traffic to cross between VLANs. Good place to enforce security
Routers Inspect Packet Fields • Routers already inspect the destination IP address of a packet to determine how to route it • and may drop the packet if there is no route • We add a security mechanism: Access Control Lists (ACLs) • ACL: a set of rules that inspect some fields in a packet. • If the packet matches the rule, we can choose to keep the packet or drop the packet
Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network • What steps occur in a complete TCP conversation?
What Fields Can Be Inspected? • IP Source address • IP Destination address • Layer 4 protocol, e.g. TCP, IP, ICMP • Layer 4 source port • Layer 4 destination port, e.g. port 80 for the web • If the packet is start of a connection (SYN) or not • NOTE: traffic is bi-directional. Port 80 might be the destination port in one direction, but the source port in the other direction
Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network • Explain how a packet filter allows or blocks traffic
Where Can ACL Rules be Applied? • A group of rules (tests, entries) form an Access Control List • An ACL can be applied to a router interface in-bound • As soon as traffic arrives, before it is routed • An ACL can be applied to a router interface out-bound • As packets are queued for retransmission • On each interface, we can have two ACLs: • One in-bound and one out-bound
Rules in an Access Control List • Each rule (test, entry) is applied. If no match, move to next • If match, obey the permit or deny operation • If no rule matches drop the packet
Standard and Extended ACLs • A standard ACL has rules that only match the source IP address and wildcard. Example: • An extended ACL has rules that match destination IP, L4 protocol and source & destination ports. • Wildcard: inverse of netmask. Think of it as a range. • 192.168.30.0 0.0.0.255 means 30.0 up to 30.255
Naming or Numbering an ACL • ACLs can be numbered or named • Standard ACLs: name or number from 1 to 99 • Extended ACLs: name or number from 100 to 199
Where to Place ACLs: Rule of Thumb • Extended: as close to the traffic source as possible • Standard: as close to the destination as possible
ACL Best Practices • ACLs implement your organisation’s security policy • Often unreadable, so give each one a description • Fiddly to edit, so use a text editor • Will cause havoc when mistakes made, so always test them on a development network before you put them into production
ACLs: Rule Order is Important • We want to block all of 131.70.5.0/24 from coming into our LAN, but we want to let 131.70.5.42 in. • access-list 10 deny 131.70.5.0 0.0.0.255 • access-list 10 permit 131.70.5.42 0.0.0.0 • This in fact will also block 131.70.5.42 • And it will block all traffic: implict deny all rule at the bottom • Reorder the rules: • access-list 10 permit 131.70.5.42 0.0.0.0 • access-list 10 deny 131.70.5.0 0.0.0.255 • access-list 10 permit 0.0.0.0 255.255.255.255
Special Shorthand Keywords • “host X” matches a single host address • “any” matches all IP addresses • We can rewrite the ACL on the previous slide: • access-list 10 remark Let Sandeep’s PC in to the LAN • access-list 10 permit host 131.70.5.42 • access-list 10 remark But stop the rest of subnet 5.0 • access-list 10 deny 131.70.5.0 0.0.0.255 • access-list 10 remark All other traffic can come in • access-list 10 permit any
Applying an ACL to an Interface • Once we have an ACL, we have to apply it to a specific interface an in a specific direction • interface fa0/0 • ip access-group 10 out
Editing ACLs: The Easy Way • Show the entries for a specific ACL from the running configuration • Copy theminto a text file • Edit the text file • Do “no access-list 10” to remove the ACL from the router • Paste the corrected ruleset back into the router
Named ACLs • Named ACLs are good as they help to document the purpose of the ACL
Is My ACL Working? • How do I know if my ACL is working? Has it permitted or denied any traffic? Which rules are being used?
Extended ACLs: More Power • Src/dest IP, L4 protocol, src/dest ports
Extended ACLs • Operators to test if ports match, don’t match or are in a specific range; if pkt starts connection of part of an established connection
Configure Extended ACLs in a Medium-Size Enterprise Branch Office Network • Describe how to apply an extended ACL to an interface
Configure Extended ACLs in a Medium-Size Enterprise Branch Office Network • Describe how to create named extended ACLs
Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network • List the three types of complex ACLs
Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network • Explain how and when to use dynamic ACLs
Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network • Explain how and when to use reflexive ACLs
Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network • Explain how and when to use time-based ACLs
Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network • Describe how to troubleshoot common ACL problems
Implement, Verify and Troubleshoot ACLs in an Enterprise Network Environment • Create, place and verify a standard/ extended ACL and verify its placement. • Verify ACL’s functionality and troubleshoot as needed.
Summary • An Access List (ACL) is: • A series of permit and deny statements that are used to filter traffic • Standard ACL • Identified by numbers 1 - 99 and 1300 - 1999 • Filter traffic based on source IP address • Extended ACL • Identified by number 100 -199 & 2000 - 2699 • Filter traffic based on • Source IP address • Destination IP address • Protocol • Port number
Summary • Named ACL • Used with IOS 11.2 and above • Can be used for either standard or extended ACL • ACL’s use Wildcard Masks (WCM) • Described as the inverse of a subnet mask • Reason • 0 check the bit • 1 ignore the bit
Summary • Implementing ACLs • 1st create the ACL • 2nd place the ACL on an interface • Standard ACL are placed nearest the destination • Extended ACL are placed nearest the source • Use the following commands for verifying & troubleshooting an ACL • Show access-list • Show interfaces • Show run
Summary • Complex ACL • Dynamic ACL • Reflexive ACL • Time based ACL