Solved

Access List usage

Posted on 2011-09-08
4
241 Views
Last Modified: 2012-05-12
If I understand there are 3 types of Access list.

Standard 1-99
Extended 100-xxxx
Named Access list

Standard is used for allow/deny IP , ex:access-list 99 permit ip 192.168.1.0 0.0.0.255 any

Extended is used to allow specific port ex:access-list 101 permit TCP  192.168.1.0 0.0.0.255 any eq 23

I am not sure about the named access list when they are used.

Can you please go through my statements and correct me?

Thanks

0
Comment
Question by:jskfan
4 Comments
 
LVL 35

Assisted Solution

by:Ernie Beek
Ernie Beek earned 166 total points
ID: 36501527
From IOS release 11.2 it was possible to use a name instead of an access list number.
So instead of: access-list 99 permit ip 192.168.1.0 0.0.0.255 any you can use: access-list in-out permit ip 192.168.1.0 0.0.0.255 any

You might to have a look at: http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml
0
 
LVL 18

Accepted Solution

by:
fgasimzade earned 167 total points
ID: 36501544
Well, there are 2 types of access-lists, standard and extended. Each of them can be either named or numbered.


With standard access list you can only specify source address, not destination:

access-list 99 permit ip 192.168.1.0 0.0.0.255

With extended access list you can specify destination as well as ports.

Named access lists (standard or extended) is just an evolution of numbered access-lists, it allows you to specify a meaningful name for access-list
0
 
LVL 17

Assisted Solution

by:MAG03
MAG03 earned 167 total points
ID: 36508618
Just to add to what fgasimzade has said,

Named access lists don't just let you specify a meaningful name but it is the only ACL where you can use sequence numbers so you do not have to remove edit and then add the existing access list when you need to make modifications.  With Named ALC you can just enter the sequence number where you want to place the new entry in the ACL and you are done.
0
 

Author Closing Comment

by:jskfan
ID: 36585212
Thank you Guys!
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
f5 Persistence 14 51
New firewall implementation guidance 12 59
spanning tree loop even though stp is enabled 10 31
Choice of router 8 21
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question