Standard Access Control Lists (ACLs): Basic Network Traffic Filtering

Learn about standard access control lists (ACLs) and their use in controlling network traffic based on source IP addresses. This guide explains how standard ACLs work, their simplicity, and their limitations compared to extended ACLs, which offer more granular control.



Standard Access Control Lists (ACLs): Basic Network Traffic Filtering

What is a Standard Access List?

An Access Control List (ACL) is a set of rules that controls network traffic. A standard access list is a simple type of ACL that filters traffic based *only* on the source IP address. It doesn't examine the contents of the packet or look at other factors (like destination address or protocol type). A standard ACL either permits or denies *all* traffic from a given source IP address or range of IP addresses.

Key Features of Standard Access Lists

  • Filter based on source IP address only.
  • Apply to all protocols.
  • Numbered ACLs (1-99, 1300-1999).
  • Rules are processed sequentially; the first match determines the action.
  • Implicit deny at the end of the list (traffic not explicitly permitted is denied).
  • Removing a rule in a numbered list deletes the entire list; named lists allow for individual rule removal.

Example: Blocking Network Traffic with a Standard ACL

Imagine you have three departments (Sales, Finance, Marketing), each on a different subnet:

  • Sales: 172.16.40.0/24
  • Finance: 172.16.50.0/24
  • Marketing: 172.16.60.0/24

You want to block all traffic from the Sales department to the Finance department. You can do this using a standard access list:

1. Configuring the Access List:

Access List Configuration

R1(config)# access-list 10 deny 172.16.40.0 0.0.0.255
Output

Standard Access List 10 configured to block Sales department access.

(The wildcard mask 0.0.0.255 is equivalent to a subnet mask of 255.255.255.0.)

2. Applying the Access List:

Applying the Access List

R1(config)# interface fa0/1
R1(config-if)# ip access-group 10 out
Output

Access list 10 applied outbound on interface fa0/1.

(This applies the ACL outbound on interface fa0/1. The location of ACL application depends on the network design.)

Named Standard Access Lists

Instead of numbered lists, you can use named access lists, which can often simplify management. This allows for easier modification and deletion of individual rules without impacting other rules. Example:

Named Access List Configuration

R1(config)# ip access-list standard block_sales
R1(config-std-nacl)# deny 172.16.40.0 0.0.0.255
R1(config-std-nacl)# permit any 

Controlling Telnet Access with Standard ACLs

Standard ACLs can also control Telnet access by applying them to virtual terminal (VTY) lines. Example:

Telnet Access Control

R1(config)# access-list 10 deny any
R1(config)# line vty 0 4
R1(config-line)# access-class 10 out

Conclusion

Standard ACLs provide a basic but useful mechanism for controlling network traffic. They're simple to configure but offer limited filtering capabilities. Extended ACLs provide more granular control over traffic.