552
Configuring Network Security with ACLs
Information About Network Security with ACLs
IPv4 ACL to a Terminal Line
You can use numbered ACLs to control access to one or more terminal lines. You cannot apply named ACLs to lines. You
must set identical restrictions on all the virtual terminal lines because a user can attempt to connect to any of them.
For procedures for applying ACLs to interfaces, see
Applying an IPv4 ACL to an Interface, page 560
. For applying ACLs
Monitoring and Maintaining Network Security with ACLs, page 562
IPv4 ACL Application to an Interface Guidelines
Apply an ACL only to inbound Layer 2 ports.
Apply an ACL to either
outbound or inbound Layer 3 interfaces.
When controlling access to an interface, you can use a named or numbered ACL.
If you apply an ACL to a port that is a member of a VLAN, the port ACL takes precedence over an ACL applied to
the VLAN interface.
If you apply an ACL to a Layer 2 interface that is a member of a VLAN, the Layer 2 (port) ACL takes precedence over
an input Layer 3 ACL applied to the VLAN interface. The port ACL always filters incoming packets received on the
Layer 2 port.
If you apply an ACL to a Layer 3 interface and routing is not enabled, the ACL only filters packets that are intended
for the CPU, such as SNMP, Telnet, or web traffic. You do not have to enable routing to apply ACLs to Layer 2
interfaces.
When private VLANs are configured, you can apply router ACLs only on the primary-VLAN SVIs. The ACL is applied
to both primary and secondary VLAN Layer 3 traffic.
Note:
By default, the router sends Internet Control Message Protocol (ICMP) unreachable messages when a packet is
denied by an access group. These access-group denied packets are not dropped in hardware but are bridged to the
switch CPU so that it can generate the ICMP-unreachable message. Port ACLs are an exception. They do not generate
ICMP unreachable messages.
ICMP unreachable messages can be disabled on router ACLs with the
no ip unreachables
interface command.
For inbound ACLs, after receiving a packet, the switch checks the packet against the ACL. If the ACL permits the packet,
the switch continues to process the packet. If the ACL rejects the packet, the switch discards the packet.
For outbound ACLs, after receiving and sending a packet to a controlled interface, the switch checks the packet against
the ACL. If the ACL permits the packet, the switch sends the packet. If the ACL rejects the packet, the switch discards
the packet.
By default, the input interface sends ICMP Unreachable messages whenever a packet is discarded, regardless of whether
the packet was discarded because of an ACL on the input interface or because of an ACL on the output interface. ICMP
Unreachables are normally limited to no more than one every one-half second per input interface, but this can be
changed by using the
ip icmp rate-limit unreachable
global configuration command.
When you apply an undefined ACL to an interface, the switch acts as if the ACL has not been applied to the interface
and permits all packets. Remember this behavior if you use undefined ACLs for network security.
Hardware and Software Handling of IP ACLs
ACL processing is primarily accomplished in hardware, but requires forwarding of some traffic flows to the CPU for
software processing. If the hardware reaches its capacity to store ACL configurations, packets are sent to the CPU for
forwarding. The forwarding rate for software-forwarded traffic is substantially less than for hardware-forwarded traffic.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...