Cisco Access Control List Order

With the code below, it allows a device to send a broadcast for a DHCP address. Once it gets a 192.168.81.x IP it should be able to communicate over the network.  My question is, doesn't the deny statements get hit first and 'match' the 192.168.81.x address before it hits the permit statement for that network?

ip access-list extended guest-wifi
 permit udp any any eq bootps
 permit udp any any eq bootpc
 deny   ip any 192.168.0.0 0.0.255.255
 deny   ip any 172.16.0.0 0.15.255.255
 deny   ip any 10.0.0.0 0.255.255.255
 permit ip 192.168.81.0 0.0.0.255 any
lconnellAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Don JohnstonInstructorCommented:
My question is, doesn't the deny statements get hit first and 'match' the 192.168.81.x address before it hits the permit statement for that network?
You are correct. The "permit ip 192.168.81.0 0.0.0.255 any" should be before the deny statement.
0
AkinsdNetwork AdministratorCommented:
The 1st line of an acl is hit 1st before the 2nd line and so forth.
Once a match exists, the device stops checking through the lines.

In your example,  access-list extended guest-wifi
10  permit udp any any eq bootps
 20 permit udp any any eq bootpc
30  deny   ip any 192.168.0.0 0.0.255.255
 40 deny   ip any 172.16.0.0 0.15.255.255
50  deny   ip any 10.0.0.0 0.255.255.255
 60 permit ip 192.168.81.0 0.0.0.255 any

I added the sequence numbers to explain this
10 gets hit first, then 20, then 30 etc

60 would never get a hit as seq 30 matches that address. This means 192.168.81.0 /24 will be denied based on seq 30
0
gcl_hkCommented:
Better to clarify "match the 192.168.81.x address before it hits the permit" the matching address you mean source or destination?

This ACL should be working normally if it is for the guest network purpose. The deny statements are to prevent the 192.168.81.x subnet to communicate with any other internal subnets, and the last permit statement is to allow the 192.168.81.x to reach internet. No conflict at all.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Don JohnstonInstructorCommented:
Good catch gcl_hk.  I missed the source/destination (I'll blame it on the iPad)  :-)

You're absolutely right. Only traffic to private addresses would be blocked by the ACL.   Internet traffic would be permitted.
0
lconnellAuthor Commented:
Thank you to everyone who commented, very much appreciated! :)
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.