当前位置:网站首页>ACL (access control list) basic chapter - Super interesting learning network
ACL (access control list) basic chapter - Super interesting learning network
2022-06-24 22:34:00 【Zhuge iron and steel cloud】
ACL, yes Access Control List Abbreviation , The Chinese name is “ Access control list ”. It consists of a series of conditional rules ( That is, the judgment statement describing the matching condition of the message ) form , These conditional rules can be the source address of the message 、 Destination address 、 Port number, etc , It is an instruction list applied to various software and hardware interfaces of network devices .
One 、 Usage scenario of access control list :
* Filter
according to ACL Filter incoming and outgoing messages according to the matching conditions in . For example ,ACL It is actually a message filter ,ACL The rule is the filter element of the filter . What kind of filter element should be installed ( That is to configure corresponding according to message characteristics ACL The rules ),ACL What kind of message can be filtered out .
* classification
according to ACL The conditions in identify the flow , For further special treatment of the equipment .
Two 、 Type of access control list :
* standard
- Check the source address
- Normally allowed 、 What is rejected is the entire agreement
* Expand
- Check the source and destination addresses
- Normally allowed 、 What is rejected is a specific agreement
3、 ... and 、 Application of access control list :
* Into the direction
-ACL Application in the direction of equipment interface When the interface receives a packet , First, according to the... Applied to the interface ACL Match conditions , If allowed, forward according to the routing table , If rejected, discard it directly .
summary : Match first and then route .
* Exit direction
-ACL It is applied in the outgoing direction of the device interface The message is routed through the routing table and then transferred to the outgoing interface , According to the outgoing direction of the application on the interface ACL Match conditions , Is allowed permit Or reject deny, If allowed , Just forward the data according to the routing table , If it is rejected, the packet is directly discarded .
summary : Route first and then match .
ACL The order in which instructions are placed is important , Whether it's Cisco IOS It's Huawei VRP perhaps H3C Of Comware, This is the ACL The order of the instructions in checks whether the data packets meet an instruction condition in turn , When it is detected that an instruction meets the conditions, the actions specified in the instruction will be executed , And the following command conditions will not be detected .
The device defaults to ACL Instruction mechanism , Each group ACL There is an implied clause at the end deny Instructions for all messages . in other words , When received packets and ACL When all the details do not match , This hidden instruction will be triggered , Discard the message directly .

Four 、 How to identify ACL
* Standard No IPV4 list (1-99,1300-1999), Can only be set according to the source address IP Message filtering conditions .
Router(config)#access-list 10 permit 192.168.0.0 0.0.255.255
Router(config)#access-list 10 deny 172.16.0.0 0.0.255.255
Router(config)#do sh run | i access
access-list 10 permit 192.168.0.0 0.0.255.255
access-list 10 deny 172.16.0.0 0.0.255.255* Extension number IPV4 list (100-199,2000-2699), According to the source and destination address 、TCP/IP Agreement number and TCP/UDP Source destination port condition settings IP Message filtering conditions .
Router(config)#access-list 100 permit tcp 192.168.0.0 0.0.255.255 100.100.100.0 0.0.0.255 eq 8080
Router(config)#access-list 100 deny udp 172.16.0.0 0.0.0.255 eq 1000 100.100.100.0 0.0.0.255 eq 1234
Router(config)#do sh run | i access
access-list 100 permit tcp 192.168.0.0 0.0.255.255 100.100.100.0 0.0.0.255 eq 8080
access-list 100 deny udp 172.16.0.0 0.0.0.255 eq 1000 100.100.100.0 0.0.0.255 eq 1234* name ACL Use alphanumeric strings ( name ) identification IP standard ACL And extend ACL.
standard :
ip access-list standard XXXX
permit 192.168.0.0 0.0.255.255
permit 172.16.0.0 0.0.255.255Expand :
ip access-list extended YYYY
permit tcp 192.168.0.0 0.0.255.255 eq 8080 172.168.0.0 0.0.255.255 eq 8080
deny udp 172.16.0.0 0.0.255.255 eq 8080 192.168.0.0 0.0.255.255 eq 8080View directly in privileged mode ACL Detail item number
Router#sh access-lists
Standard IP access list XXXX
10 permit 192.168.0.0, wildcard bits 0.0.255.255
20 permit 172.16.0.0, wildcard bits 0.0.255.255
Extended IP access list YYYY
10 permit tcp 192.168.0.0 0.0.255.255 eq 8080 172.168.0.0 0.0.255.255 eq 8080
20 deny udp 172.16.0.0 0.0.255.255 eq 8080 192.168.0.0 0.0.255.255 eq 8080
It is generally recommended to use alphanumeric strings in practical use ( name ) To create a configuration ACL, Because in this way, the later stage can be based on ACL Naming is easy to identify ACL Use of , For example, we use F0/0 Interface input direction ACL You can call it “F0_0_inbound”
In addition to ACL Under the configuration plane , We can use ACL The number of is inserted between the front and back numbers , Such as items 10 And entries 20 Add an entry in the middle 15, You can also directly no entry Directly delete any specified entry . And in the basic numbering ACL The specified entry information cannot be deleted in , Only the whole ACL Delete reconfiguration .
PS: Huawei ACL The user experience of is much better than that of Cisco .
The popular science over.
ACL Access control list
https://zhuanlan.zhihu.com/p/39191464
https://blog.csdn.net/ningmeng_bumeng/article/details/78614362
https://blog.csdn.net/weixin_43205333/article/details/86562151
边栏推荐
- 华大4A0GPIO设置
- 直播软件app开发,左右自动滑动的轮播图广告
- Fanuc robot_ Introduction to Karel programming (1)
- Description of transparent transmission function before master and slave of kt6368a Bluetooth chip, 2.4G frequency hopping automatic connection
- Technology inventory: Technology Evolution and Future Trend Outlook of cloud native Middleware
- 产业互联网时代,并不存在传统意义上的互联网
- 嵌入式开发:技巧和窍门——干净地从引导加载程序跳转到应用程序代码
- Docker 安装 MySQL 8.0,详细步骤
- 进程的通信方式
- NIO、BIO、AIO
猜你喜欢

Information update on automatic control principle
Relationnet++: a representation of fusion of multiple detection targets based on transformer | neurips 2020

Chapter 10 project communication management

Docker installs redis-5.0.12. Detailed steps

嵌入式开发:技巧和窍门——干净地从引导加载程序跳转到应用程序代码
How to solve the problem that the computer suddenly can't connect to WiFi

中国SSD行业企业势力全景图

Shutter precautions for using typedef

Basic principles of spanning tree protocol

AQS源码分析
随机推荐
Envoy obtain the real IP address of the client
[Software Engineering] key points at the end of the period
nuScenes——数据集配置过程中遇到图像文件缺失或大小为0时的补救方法
Creating files, recursively creating directories
关于自动控制原理资料更新
leetcode:55. Jumping game [classic greed]
The profound meaning of unlimited ecological development in Poka -- Multidimensional Interpretation of parallel chain
Redis-跳表
Firewall working principle and detailed conversation table
Data communication and physical network
磁盤的結構
Basic principles of spanning tree protocol
SAP interface debug setting external breakpoints
Heartless sword Chinese English bilingual poem 003 The sea of books
Power system | IEEE paper submission process
NIO、BIO、AIO
Pinduoduo updates the merchant live broadcast service agreement and strictly punishes the illegal merchants
OA system -- save the verification code to session
NIO 零拷贝
interrupt、interrupted 、isInterrupted 区别