On our previous lesson, we explored the fundamentals of standard ACLs, which filter traffic based solely on the source IP address. We discussed the importance of applying them close to the destination and how each ACL ends with an implicit ‘deny all’ that can unintentionally block desired traffic if not carefully managed. We also went through best practices, such as verifying ACL matches using show access-lists and ensuring the correct inbound/outbound direction is specified when applying the ACL to an interface. By understanding these essentials, you can now confidently create and troubleshoot standard ACLs in various network scenarios.
This time, we'll tackle extended ACLs, a more advanced type of ACL that not only checks source and destination IP addresses but can also evaluate protocols, TCP/UDP ports, and other criteria. Extended ACLs are typically placed close to the source to block unwanted traffic early, preventing it from traversing your network unnecessarily. With extended ACLs, you can allow specific types of traffic (like HTTP on port 80) while denying others (like Telnet on port 23). In the next lesson, we will walk through the configuration and verification steps to harness this added flexibility for granular traffic control.
In this lab, we will create an Extended ACL on R1 that:
We will then apply this ACL inbound on FastEthernet0/0 of R1 so that any Telnet traffic from 192.168.1.10 to 10.0.12.2 is denied on its way in. (While ACL direction can vary, we keep it simple by placing it inbound on F0/0 in this example.)
Expected Outcome: Interfaces are up and assigned IP addresses.
.Expected Outcome: ACL 100 is created. The first entry denies Telnet from 192.168.1.10 to 10.0.12.2, and the second entry permits all other traffic.
We will apply the ACL inbound on FastEthernet0/0:
Expected Outcome: Traffic coming into R1 on F0/0 will be checked against ACL 100.
Below are key verification commands, their explanations, and the exact console outputs you might expect on a Cisco router.
Show the ACL configuration
Show IP interfaces to confirm the ACL is applied
Testing the ACL
indicates the deny statement matched traffic (Telnet was denied).Incorrect ACL Number or Type
ACL Applied to the Wrong Interface or in the Wrong Direction
Missing or Incorrect Statement in ACL
Not Placing a Final Permit
(or the required permit lines) if you want all remaining traffic allowed.The lab is available for download from this link. Try recreating the sample lab above using the provided IP addressing scheme to reinforce your understanding.
Completing these tasks will deepen your understanding of extended ACLs and demonstrate their powerful traffic control capabilities.