Two advanced options of the extended access control list

Source: Internet
Author: User
1. Overview: This article discusses the following two questions: understanding and using the fragment option of the extended access control list; understanding and using the established option of the extended access control list. 2. Use the fragment option: (1) When an ACL contains only three layers of information, all packages are controlled. (2) When the frament option is not used

1. Overview: This article discusses the following two questions: understanding and using the fragment option of the extended access control list; understanding and using the established option of the extended access control list. 2. Use the fragment option: (1) When an ACL contains only three layers of information, all packages are controlled. (2) When the frament option is not used

1. Overview:

This article discusses the following two questions:

Understanding and using Extension Access Control ListFragment Option;

Understanding and using Extension Access Control ListEstablished Option.

2. Use fragmentOption:

(1) When an ACL contains only three layers of information Control.

(2) When frament is not used OptionAn acl entry that contains layer-3 and layer-4 Information performs the following operations on all data packets: Control:

If it is a nonfragmented packet or the first fragment of the multipart packet (initial fragment), it will be performed according to the normal ACL. Control(Permit or deny ).

If it is a subsequent shard (noninitial fragment) of the multipart data packet, only the three layers (Protocol Number, source, and destination) in the ACL entry are checked ). If the layer-3 match and it is permit ControlThe slice is allowed to pass through. If the layer-3 match and it is deny ControlTo check the next ACL entry (and the normal ACL Control).

(3) When fragment is used OptionAn acl entry only performs the noninitial fragment ControlAnd the ACL entries cannot contain layer-4 information.

Accesskeysecret 101 permit <协议> <源> <目的> Fragment

3. Use establishedOptionACL entry:

Access-list 101 permit tcp <源> <目的> Established

The OptionIt can only be used for the tcp protocol to implement code based on the tcp Data Segment (4-layer pdu) ControlBit Flag for session ControlFor example, only the traffic of established tcp sessions is allowed (the feature is ACK or RST flag is set ).

For example, suppose you want to implement the following ControlOnly allow all hosts of Net A to initialize TCP communication to Net B, but do not allow the host of NetB to initialize TCP communication to Net A. You can use the following ACL.

Hostname R1

Interface ethernet0

Ip access-group 102 in

Access-list 102 permit tcp any gt 1023 established

4. Summary

Only by a good understanding of the format and content of data units at each layer of the TCP/IP protocol can we correctly use various types of ACL Advanced OptionFunction.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.