Miscellaneous Design Details
Access Control Lists (ACLs)
Access Control Lists (ACLs) are router configuration statements that control how packets are processed by a router.
At Sunnyslope school, there is a need to restrict traffic from the Curriculum (C) VLAN entering the Administration / Staff (A) VLAN except for traffic destined for the server that provides the Network Operating System (NOS), Domain Name service (DNS) and email. This is achieved by applying access list 101 to the ethernet 0 interface (A LAN interface) in an outbound direction. The access list statement is shown below:
access-list 101 permit ip 130.10.8.0 0.0.1.255 host 130.10.6.159
access-list 101 deny ip 130.10.8.0 0.0.1.255 any
access-list 101 permit ip any any
Packets routed to the ethernet 0 interface are checked against the statements of the access list. They can be permitted and queued for delivery or denied and dropped.
The first line of the access list checks to confirm that the source address is from a host on the C LAN, 130.10.8.0 and the destination is the server at 130.10.6.159. The wildcard mask, 0.0.1.255, causes the router to ignore the source host addresses but match the subnet network address. The statement host informs the router to check and match the destination host address. If a match is made, the packet is permitted. If no match is made, the next line is checked.
The second line checks for a source address on the C LAN and any destination on the A LAN. If a match is made, the packet is denied. If no match is made, the next line is checked.
The third line checks for any source and any destination address and if a match is made, the packet is permitted. If no match is made the packet is dropped due to the implicit deny statement.
At Sunnyslope school there is also a need to restrict access from the C LAN to particular services outwith the school. These being WWW, DNS and email. This is achieved by applying access list 102 to the serial 0 interface (WAN interface) to check outbound traffic.
access-list 102 permit tcp 130.10.8.0 0.0.1.255 any eq 80
access-list 102 permit tcp 130.10.8.0 0.0.1.255 any eq 25
access-list 102 permit tcp 130.10.8.0 0.0.1.255 any eq 53
access-list 102 permit udp 130.10.8.0 0.0.1.255 any eq 53
access-list 102 deny ip 130.10.8.0 0.0.1.255 any
access-list 102 permit ip any any
In line 1, a match is made if the source address is a host on the C LAN, the destination is any and the TCP port number is 80, i.e. WWW. If matched, the packet is permitted.
If not matched, line 2 is checked. A match is made if the source address is a host on the C LAN, the destination is any and the TCP port number is 25, i.e. SMTP (email). If matched, the packed is permitted.
If not matched, line 3 is checked. A match is made if the source address is a host on the C LAN, the destination is any and the TCP port number is 53, i.e. DNS. If matched, the packed is permitted.
If not matched, line 4 is checked. A match is made if the source address is a host on the C LAN, the destination is any and the UDP port number is 53, i.e. DNS. If matched, the packed is permitted.
If not matched, line 5 is checked. A match is made if the source address is a host on the C LAN, the destination is any address. If matched, the packed is denied.
If not matched, line 6 is checked. A match is made if the protocol is IP and any source and any destination address. If matched, the packed is permitted.
Again the implicit deny statement denies traffic that does not meet any of the conditions.
The Firewall router has a similar access list to access list 101 above restricting traffic to WWW, DNS and SMTP only.
access-list 101 permit tcp any any eq 80
access-list 101 permit tcp any any eq 25
access-list 101 permit tcp any any eq 53
access-list 101 permit udp any any eq 53
The access list allows any source and destination address and makes use of the implicit deny statement to restrict traffic. This access list is applied to both the ethernet 0 and serial 0 interfaces in an outbound direction allowing only WWW, DNS and SMTP traffic between the Internet and the Public Backbone.
The PhoenixCOA router has the access list shown below applied to the ethernet 2 interface in an inbound direction. While inbound ACLs are normally considered less efficient, in this instance only traffic from the Public Backbone is checked not internal traffic through the router.
access-list 101 permit ip any any established
Established means that only traffic returning to hosts using an already established connection will match the statement and be permitted, i.e. the acknowledgement (ACK) or the reset (RST) bit is set.
See also Network Security Description.