Acl Notes
Acl Notes
Acl Notes
(ACL)
Review By Lavanya Rath / 3 years ago — Networking
The many security issues and breaches that we see today are mostly a result of
incorrect entities accessing certain resources. So, only authorized users must have
access to the required resources, so everyone is not accessing everything.
There are many ways to implement this streamlined access effectively, and one of
them is through the access control lists.
Let’s understand this with a simple example. The ACL rule for a node is to allow
access to IP addresses from 192.0.0.1 to 201.1.1.1 to access a drive. Now, if the
request comes from an IP address that falls within this range, it will allow. Otherwise,
the request will be denied access.
Broadly speaking, there are two types of ACLs and they are:
In this sense, a networking ACL is similar to a Stateless Firewall that restricts the
flow of traffic in both directions. Every time, when traffic enters or exits the network, it
is run through the predetermined filters and is allowed or restricted accordingly.
Out of these two types, networking ACLs are more commonly used. Also, it can be
extended to servers and other network devices as well.
Besides classifying ACLs based on the type of resource they protect, you can also
classify them based on their implementation, and they are:
Standard ACL This is a limited ACL that filters traffic based on the source of
the IP address and doesn’t distinguish based on the underlying protocol.
Standard ACLs are set with numbers from 1-99 or 1300-1999.
Thus, these are the different types of routers. Moving on, let’s look at its
components.
Components of ACL
Though ACLs can be customized to meet specific requirements, they still have to
follow a defined pattern to make it easy for devices to decipher it.
Name – This component identifies an ACL rule and it’s a good practice to
have a name that corresponds with the role and action of that ACL.
Source and Destination IPs – This is the range of IP addresses that will be
permitted or denied access
Log – the log contains a record of devices or IP addresses that were granted
access. This component may or may not be present in all implementations
Other options – Some custom ACLs will also have components such as the
Type of Service (ToS), priority, precedence, and more.
Many implementations also use network access control lists, which are table-like
data structures that contain three parts namely,
A rule
And a pattern that must be matched for granting access. These can be the
source or destination IP addresses, port numbers, boolean operators, and
masks.
Advantages of ACL
A few years ago, ACL was the best way to control incoming and outgoing traffic, but
today there are many alternatives to ACL.
Still, many organizations prefer to use it because of the convenience and flexibility
that it offers. Some of the advantages of ACL are:
At the same time, ACL comes with its disadvantages too and they are:
Complex to implement
Despite these disadvantages, ACL is still being used by many organizations because
of its high speed and low overhead costs.
Implementing ACL
An ACL implementation depends to a large extent on what you’re trying to achieve.
In general, when a packet enters the network, it is matched with the ACL rules in
sequential order, starting from the first. If the packet matches the first rule, then it is
moved on to the next, and so on until the packet matches all the rules.
On the other hand, if the packet doesn’t match any rule, it is denied permission right
there and no further processing takes place. This is how ACLs ensure good
performance and low overhead costs of operations.
For the highest levels of efficiency and optimization and fine granularity, the rules
should start from the most general and move down to the most specific. Otherwise, it
may not fulfill the purpose and can also get complex and expensive to implement.
Typically, implement ACL on a routing device that sits between the Internet and the
Demilitarized Zone (the area between the Internet and the private network) to filter
both the incoming and outgoing traffic. You can also choose to implement ACL on
another router that sits between the DMZ and the trusted zone for more fine filtering.
If you choose the above implementation, configure general rules on the router
between the Internet and the DMZ, and specific rules on the router between the DMZ
and trusted devices.
Wildcard Mask
The wildcard mask is a common implementation of ACL that aims to match specific
addresses with the ACL rules. Typically, the wildcard mask is the inverse of the
common subnet mask.
For example, if the subnet mask is 255.255.255.0, the wildcard mask would be
0.0.0.255. When you represent them in binary form, you’ll notice that the wildcard
mask is the reverse binary value of the subnet mask.
This implementation is typically a part of standard ACL and is often used to compare
specific source IP addresses with the ACL rules to decide on allowing or restricting
access to the network or certain resources within it.
Thus, these are some common implementations to give you an idea of how ACL can
be used. You can either use a similar implementation or customize it to meet your
specific requirements. Regardless of the implementation, you must follow some best
practices for easy management of ACL rules.
Uniform Implementation
For ease of use, make sure the ACLs are implemented similarly on all interfaces,
routers, and switches. This ensures that unwanted traffic never enters your network.
If you have many rules, you don’t have to document for every rule, but can write
down the purpose for every logical grouping. In particular, such documentation
reduces dependence on any single or group of individuals.
Include Comments
It’s always a good practice to include comments against all ACL rules, regardless of
whether it is written for the first time or is modified, as these comments can help
others to understand the reason for an ACL rule and the modifications that were
made to it.
Also, these audits can help to avoid conflict between different ACL rules, a common
problem faced by many IT administrators today. An audit will reveal these
inconsistencies, so they can be fixed right away to avoid costly problems.
Remember, ACLs are double-edged swords. While the right implementation can
streamline access and enhance security, a wrong implementation can also have dire
consequences for the network. So, use your judgment and configure wisely.
You can even log into the device and analyze the log or dump files to better
understand if the ACL rules meet your requirements.
Conclusion
To conclude, Access Control Lists help to filter your network traffic and access to
important resources within the organization. There are many types and
implementations, so choose an implementation that best addresses your security
and access needs.
But make sure you follow some best practices to make these ACL rules manageable
and easily scalable to meet your changing business needs.
We hope this was an insightful article for you about ACL, and do let us know your
thoughts in the comments section.