HSR Sector 6 · Bangalore +91 96110 27980 Mon–Sat · 09:30–20:30
Chapter 13 of 20 — Networking Fundamentals
intermediate Chapter 13 of 20

Access Control Lists (ACLs) — Filtering Traffic on Routers

By Vikas Swami, CCIE #22239 | Updated Mar 2026 | Free Course

What Are Access Control Lists — Purpose & How They Work

Access Control Lists (ACLs) are fundamental security features used in networking to filter traffic passing through routers and switches. They serve as gatekeepers, allowing or denying data packets based on predefined rules, thereby controlling access to network resources. Understanding the purpose and operation of ACLs is critical for network administrators aiming to secure their infrastructure effectively.

The primary purpose of an access control list ACL is to enhance network security by restricting unauthorized access while permitting legitimate traffic. ACLs can be applied at various points within the network, such as on router interfaces, to enforce policies that prevent malicious activities like unauthorized access, data leakage, or denial of service attacks.

Operationally, an ACL functions by inspecting incoming or outgoing packets against a list of permit or deny rules. These rules specify criteria such as source IP, destination IP, protocol type, or port number. When a packet matches a rule, the specified action (permit or deny) is executed. If no match occurs, a default policy—typically deny—applies, ensuring that only explicitly allowed traffic traverses the network.

In Cisco devices, ACLs are processed sequentially from top to bottom. Once a match is found, processing stops, and the corresponding action is enforced. This makes the order of rules critical in designing effective ACLs. Proper configuration of ACLs ensures that only desired traffic is permitted, reducing exposure to threats and improving overall network performance.

Networkers Home, as India's leading IT training institute in Bangalore, offers comprehensive courses on Networking Fundamentals, including detailed modules on ACLs, their configuration, and practical deployment scenarios. Mastering ACLs is essential for professionals pursuing certifications like Cisco CCNA and CCNP.

Standard ACLs — Filtering by Source IP Address

Standard ACLs are the simplest form of traffic filtering mechanisms, primarily used to control network access based solely on the source IP address of packets. They are ideal for implementing basic security policies where filtering is required based on the origin of traffic without considering the destination or protocol specifics.

In the context of Networking Fundamentals, understanding how to configure standard ACLs is essential. These ACLs use a single number range (1-99 and 1300-1999) and are applied closest to the source of traffic for efficiency and simplicity.

For example, suppose an organization wants to block all traffic originating from IP addresses in the range 192.168.10.0/24, except for specific hosts. The standard ACL would be configured as follows:

access-list 10 deny 192.168.10.0 0.0.0.255
access-list 10 permit any

This configuration denies all traffic from the 192.168.10.0/24 network while permitting all other traffic. The wildcard mask 0.0.0.255 indicates the specific subnet.

Applying a standard ACL to an interface involves entering interface configuration mode and associating the ACL with inbound or outbound traffic:

interface GigabitEthernet0/1
 ip access-group 10 in

It's important to note that standard ACLs are limited because they do not differentiate traffic based on destination IP or protocol. They are most effective in simple environments where source IP filtering suffices. For more granular control, extended ACLs are preferred.

Best practices include placing standard ACLs as close as possible to the source of traffic to prevent unwanted data from traversing the network, thus conserving bandwidth and reducing processing load on downstream devices.

Extended ACLs — Filtering by Source, Destination, Port & Protocol

Extended ACLs provide a far more granular approach to network traffic filtering than standard ACLs. They allow administrators to specify rules based on multiple criteria, including source and destination IP addresses, protocols (TCP, UDP, ICMP, etc.), and port numbers. This level of control is essential for implementing comprehensive security policies and managing complex network environments.

In a typical network environment, you might want to permit HTTP traffic from a specific subnet to a web server while blocking FTP or SSH access. Extended ACLs enable such detailed filtering. For example:

access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 10.0.0.10 eq 80
access-list 100 deny ip any any

This configuration permits TCP traffic from the subnet 192.168.1.0/24) to the host 10.0.0.10 on port 80 (HTTP), and denies all other IP traffic. The eq keyword specifies the destination port, providing precise control over allowed services.

Extended ACLs are configured similarly to standard ACLs but with additional parameters. Here’s how to apply an extended ACL to an interface:

interface GigabitEthernet0/2
 ip access-group 100 in

Comparison table between standard and extended ACLs:

Feature Standard ACL Extended ACL
Filtering criteria Source IP only Source IP, Destination IP, Protocol, Ports
Number range 1-99, 1300-1999 100-199, 2000-2699
Complexity Basic Advanced
Use case Simple source filtering Granular traffic management

Extended ACLs are vital for securing enterprise networks, controlling access to sensitive servers, and complying with security policies. Properly configuring and testing these ACLs ensures robust security posture and optimized traffic flow.

To learn more about practical Cisco ACL examples and best practices, visit the Networkers Home Blog for detailed tutorials and real-world scenarios.

Named ACLs vs Numbered ACLs — Syntax & Best Practices

Both named and numbered ACLs serve the same fundamental purpose—filtering network traffic—but differ significantly in configuration, readability, and management. Understanding their syntax and best practices is essential for maintaining an efficient and scalable network security policy.

Numbered ACLs

Numbered ACLs are identified by a specific number within predefined ranges (1-99, 1300-1999 for standard; 100-199, 2000-2699 for extended). They are straightforward to configure but can become cumbersome in large networks due to the lack of descriptive identifiers. For example:

access-list 10 permit 192.168.1.0 0.0.0.255
interface GigabitEthernet0/1
 ip access-group 10 in

Named ACLs

Named ACLs allow administrators to assign descriptive names instead of numeric identifiers, improving clarity and manageability. They support both standard and extended rules with syntax like:

ip access-list standard BLOCK_SOURCES
 permit 192.168.1.0 0.0.0.255
deny any
interface GigabitEthernet0/1
 ip access-group BLOCK_SOURCES in

Advantages of named ACLs include easier troubleshooting, modification, and documentation. They also support multiple entries under a single name, facilitating complex policies.

Best practices recommend using named ACLs for larger or evolving networks due to their readability and flexibility. Consistent naming conventions and proper documentation are critical for effective ACL management.

ACL Placement — Inbound vs Outbound & Where to Apply

Deciding where to apply an access control list ACL—either inbound or outbound—is crucial for effective traffic filtering and optimal network performance. Placement influences not only security but also network efficiency and troubleshooting complexity.

Inbound ACLs

Inbound ACLs are applied on the interface facing the source of incoming traffic. They filter packets as they enter the router or switch port. For example, placing an inbound ACL on an external router interface can block unwanted traffic before it reaches internal network segments. Benefits include reducing load on internal devices and preventing malicious traffic from propagating further.

Outbound ACLs

Outbound ACLs are applied on the interface facing the destination network. They filter traffic as it exits the router or switch towards its destination. This approach is useful for controlling what data leaves an internal network or for implementing policies on specific server interfaces.

Where to Apply & Best Practices

  • Security: Place ACLs as close to the source as possible (preferably inbound) to prevent unwanted traffic from traversing the network.
  • Performance: Minimize processing overhead by filtering traffic early in the path.
  • Complexity: Using inbound ACLs simplifies troubleshooting since rules are evaluated at entry points.

For example, to block all traffic from a malicious IP address at the network perimeter, apply an inbound ACL on the external interface. Conversely, to restrict certain outbound traffic, configure outbound ACLs on internal interfaces.

Proper placement of ACLs enhances network security, conserves bandwidth, and simplifies policy enforcement. Regular review and testing are necessary to ensure ACLs perform as intended without inadvertently blocking legitimate traffic.

Wildcard Masks Explained — How ACLs Match IP Ranges

Wildcard masks are a key component in ACL configuration, allowing flexible matching of IP address ranges. They are used to specify which bits in an IP address should be ignored during filtering, enabling efficient and precise rule definitions.

Wildcard Mask Syntax & Function

A wildcard mask is a 32-bit number, similar to a subnet mask, but inverted. In wildcard masks, a '0' indicates that the corresponding bit must match exactly, while a '1' indicates that any value is acceptable in that position.

For example, to match the network 192.168.10.0/24, the wildcard mask would be:

192.168.10.0 0.0.0.255

This configuration matches any IP address where the first 24 bits are 192.168.10, regardless of the last 8 bits.

Examples of Wildcard Masks

  • 0.0.0.0: Matches a single IP address exactly.
  • 0.0.0.255: Matches all IP addresses in the last octet (e.g., 192.168.1.0 - 192.168.1.255).
  • 0.0.255.255: Matches a /16 network (e.g., 192.168.0.0 - 192.168.255.255).

Using Wildcard Masks Effectively

Designing ACLs with wildcard masks requires understanding IP ranges and subnetting. Proper use of wildcard masks ensures that ACLs are both precise and efficient, avoiding unintended traffic filtering. For instance, matching a specific host involves a wildcard mask of 0.0.0.0, whereas broad network filtering uses larger wildcard masks like 0.0.255.255.

For hands-on practice and real-world scenarios, consider exploring Networkers Home Blog for detailed tutorials on wildcard mask calculations and ACL design strategies.

Configuring ACLs on Cisco Routers — Practical Lab Scenarios

Configuring ACLs on Cisco routers involves a series of steps that require precision and understanding of network policies. Practical lab scenarios help reinforce theoretical knowledge, enabling students to deploy ACLs in real-world environments.

Scenario 1: Blocking Specific IPs Using Standard ACL

  1. Identify the source IP addresses to block, e.g., 192.168.10.50.
  2. Configure the ACL:
  3. access-list 10 deny host 192.168.10.50
    access-list 10 permit any
    
  4. Apply the ACL inbound on the interface facing the source network:
  5. interface GigabitEthernet0/0
     ip access-group 10 in
    

Scenario 2: Allowing Web Traffic to a Server

  1. Create an extended ACL permitting TCP traffic on port 80 from the subnet to the server:
  2. access-list 110 permit tcp 192.168.1.0 0.0.0.255 host 10.0.0.20 eq 80
    access-list 110 deny ip any any
    
  3. Apply on the outbound interface:
  4. interface GigabitEthernet0/1
     ip access-group 110 out
    

These configurations demonstrate how to enforce security policies effectively. For detailed step-by-step instructions, tutorials, and labs, visit Networkers Home for hands-on training courses.

ACL Troubleshooting — Common Mistakes & Verification Commands

Effective troubleshooting of ACLs is vital to ensure network security policies are correctly enforced. Common mistakes include incorrect rule order, improper wildcard masks, and misapplied ACLs. Understanding verification commands helps identify and resolve issues efficiently.

Common Mistakes

  • Order of rules: Since ACLs process rules sequentially, placing a permit statement before a deny can lead to unintended access.
  • Incorrect wildcard masks: Using the wrong mask can match unintended IP ranges, compromising security.
  • Applying ACLs to wrong interfaces: Applying inbound when outbound was intended or vice versa can cause traffic flow issues.

Verification Commands

  • show access-lists: Displays all configured ACLs with their rules and hit counts.
  • show ip interface brief: Shows which ACLs are applied to interfaces and their status.
  • show access-lists [ACL number/name]: Provides detailed info about specific ACLs.
  • ping and traceroute: Test connectivity and identify where traffic is being blocked.

Best Practices

Regularly monitor ACL hit counts to identify unexpected traffic patterns. Use simulation tools or packet captures for detailed analysis. Always document changes and test configurations in controlled environments before deployment in production.

For more in-depth troubleshooting techniques and real-world examples, consult the Networkers Home Blog.

Key Takeaways

  • Access control lists ACL are essential for securing networks by filtering traffic based on rules.
  • Standard ACLs filter solely by source IP, while extended ACLs provide granular control including destination, protocol, and port.
  • Wildcard masks are crucial for matching specific IP ranges efficiently in ACLs.
  • Proper placement—either inbound or outbound—affects network security and performance.
  • Named ACLs improve manageability over numbered ACLs, especially in complex environments.
  • Regular troubleshooting and verification commands help ensure ACLs are functioning as intended.
  • Hands-on configuration and real-world scenarios are critical for mastering ACL deployment, as offered by Networkers Home.

Frequently Asked Questions

What is the main difference between standard and extended ACLs?

The primary difference lies in their filtering capabilities. Standard ACLs filter traffic based only on the source IP address, making them suitable for simple access control. Extended ACLs offer more granular control by allowing filtering based on source and destination IP addresses, protocols, and port numbers, making them ideal for detailed security policies.

How do wildcard masks work in ACL configuration?

Wildcard masks specify which bits in an IP address should be ignored during matching. A '0' indicates an exact match, while a '1' allows any value in that position. Proper wildcard mask selection enables precise matching of IP address ranges, crucial for effective network traffic filtering.

Where should ACLs be applied on a network device for optimal security?

ACLs should generally be applied as close to the source of traffic as possible (inbound) to block unwanted traffic early, reducing unnecessary load on internal devices. Outbound ACLs are used to restrict data leaving the network. Proper placement depends on security policy and network topology, with inbound application preferred for most security scenarios.

Ready to Master Networking Fundamentals?

Join 45,000+ students at Networkers Home. CCIE-certified trainers, 24x7 real lab access, and 100% placement support.

Explore Course