当前位置:网站首页>Network Security Learning (XX) ACL
Network Security Learning (XX) ACL
2022-07-20 10:08:00 【Shake light·】
ACL(Access Control List)
Basic concepts
ACL It's a packet filtering technology
ACL be based on IP Baotou IP Address 、 four layers TCP/UDP The port number of the header 、[5 The layer data ]
Based on three-layer and four layer filtering
ACL Configure... On the router , You can also configure on the firewall ( It is generally called strategy )
working principle
ACL There are two main categories :
1) standard ACL:
Table number :1-99
characteristic : It can only be based on the source IP Filter packets
command :
conf t
access-list Table number permit/deny Source ip Or source network segment Anti subnet mask
notes :
Anti subnet mask : Mask the subnet 0 and 1 The horse
255.0.0.0 -- 0.255.255.255
255.255.0.0 -- 0.0.255.255
255.255.255.0 -- 0.0.0.255
Anti subnet mask operation : To match , And 0 The corresponding needs to be strictly matched , And 1 Corresponding ignore !
for example :access-list 1 deny 10.1.1.1 0.255.255.255
explain : This entry is used to reject all sources IP by 10 At the beginning !
access-list 1 deny 10.1.1.1 0.0.0.0
explain : This entry is used to reject all sources IP by 10.1.1.1 At the beginning !
Abbreviation :access-list 1 deny host 10.1.1.1
access-list 1 deny 0.0.0.0 255.255.255.255
explain : This entry is used to deny everyone !
Abbreviation :access-list 1 deny any
take ACL Apply to the interface :
int f0/x
ip access-group Table number in/out take ACL Apply to the interface (no Cancel , But the watch is still )
exit
2) Expand ACL
Table number :100-199
characteristic : Can be based on source IP、 The goal is IP、 Port number 、 Protocols filter packets
command : The commands in brackets represent optional
acc 100 permit/deny agreement Source ip Or source network segment Anti subnet mask The goal is ip Or target network segment Anti subnet mask [eq Port number ]
notes :
agreement :tcp/udp/icmp/ip
ACL principle
1)ACL The table must be applied to the in or out direction of the interface to take effect
2) Only one table can be applied to one direction of an interface !
3) In or out direction Application ? Depends on the general direction of flow control
4) ACL The table checks every item strictly from top to bottom , All should be written in the main order
5) Each is composed of conditions and actions , When the flow completely meets the conditions When a certain flow does not meet a certain condition , Then continue to check the next
6) standard ACL Try to write close to the target
7) matters needing attention
Do flow control , First of all, judge ACL Where to write ( The router ? The direction of that interface ?)
Thinking about how to write ACL
How to write
First of all, we should decide whether to allow all or reject all
Then pay attention when writing : Will be strict
8) In general , Standard or extended ACL Once written , A certain item cannot be modified , You can't delete a certain item , Nor can you change the order , You can't insert a new entry in the middle , You can only always add new entries at the end .
If you want to modify , Or insert or delete , Only the whole table can be deleted , Rewrite
conf t
no access-list Table number Delete the entire table
see ACL surface :
show IP access-list Show all the tables
show IP access-list surface id Show a certain (id) surface
name ACL:
effect : Can be extended to standard or ACL Custom naming
advantage : Custom naming makes it easier to recognize , It's also easy to remember
You can modify a certain item at will , Or delete a day , You can also insert a certain day in the middle
conf t
name , Choose standard or extension ACL
ip access-list extended/standard Custom table name
notes :extended Expand /standard standard
Enter after input ACL Control mode ( Can enter other ACL Even if it is not created in a named way )
To configure
permit/deny agreement Source ip Or network segment Anti subnet mask The goal is ip Or network segment Anti subnet mask [eq Port number ]
Delete
To delete the next day , stay ACL Control mode Input
no entry id
Here is 20
add to
stay ACL Control mode Input
entry id permit/deny agreement Source ip Or network segment Anti subnet mask The goal is ip Or network segment Anti subnet mask [eq Port number ]
entry id Such as 15, The higher the value, the lower the position of the entry in the table
边栏推荐
- Detailed explanation of the principle of triode series linear voltage stabilizing circuit and Multisim Simulation
- 网安学习(二一)NAT 动态路由
- Leetcode:2. 两数相加【大数加法+模拟进位】
- How to put a "platform" into a small box? (Part 2) technical realization
- How to set the oil on the through hole cover when exporting the Gerber file of PCB
- Leetcode:13. Roman numeral to integer [key value pair mapping]
- Infrared decoding program based on timer capture function (NEC protocol)
- 网络安全学习(十六)
- Precautions for the selection and conversion of single power supply operational amplifier and dual power supply operational amplifier and their power supply mode
- Servlet概述
猜你喜欢
离散数据(数组)的过零位置搜索
2022-7-11 Gu Yujia's study notes of group 8 (JS)
Deep parsing ThreadLocal
使用gem5在fft上进行测试beta版本
After ise14.7 was installed in win10 system, the software flashed back and the driver could not be installed normally
FPGA network port implementation and detailed explanation (3)
Solution of STM32 cubeide breakpoint failure
2022-7-8 第八小组 顾宇佳 拓展训练
[markdown] about markdown, I want to say this~
Secure Code Warrlor学习记录(三)
随机推荐
2022-7-8 第八小组 顾宇佳 拓展训练
使用google cloud部署基于flask的网站
Leshan normal programming competition 2020-e: divide stones [01 backpacks]
網絡安全學習(十七)VlAN
When FPM generates packages, the associated Allegro cannot generate packages after it is opened. Solution to the problem
Reasons and solutions for the whitening of computer shortcuts -- the lesson of blood woo woo
Chrome developer tool shortcut key reference to improve development efficiency
Unity实用框架(三)事件系统
LeetCode:第302场周赛(总结)
vulnhub 靶機 Jangow: 1.0.1
Log access development with one person per day and nine people per day -- project development practice based on instruction set Internet of things operating system
Allegro cannot display drill legend information when adding drill legend
网络安全学习(十四)IP协议
多基线干涉仪系统测向误差分析
雷达基础知识
FPGA - encapsulation and call of IP core (vivado)
Leshan normal programming competition 2020-b: design web page [prime number]
南京大学计算方法(数值分析)期末复习笔记
vulnhub 靶机 Earth
numpy中选择特定两行