Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.
It is a sort of filtering for the traffic that passes through the port of the switch or the router.
In CISCO (I don't know anything about the remaining), there are three types of ACLs for the IP-based network:
1- Standard ACL.
2- Extended ACL.
3- Named ACL.
For Standard & extended ACL there is specific numeric ranges that can be used
For example, the range 1 – 2699 is divided as follow:
<1-99> IP standard access list
<100-199> IP extended access list
<200-299> Protocol type-code access list
<300-399> DECnet access list
<600-699> Appletalk access list
<700-799> 48-bit MAC address access list
<800-899> IPX standard access list
<900-999> IPX extended access list
<1000-1099> IPX SAP access list
<1100-1199> Extended 48-bit MAC address access list
<1200-1299> IPX summary address access list
<1300-1999> IP standard access list (expanded range)
<2000-2699> IP extended access list (expanded range)
AS you can see, it depends on the type of access control & the network protocol (IP, MAC DECnet, Appletalk , IPX). The numeric ranges are used for the Standard is <1-99> & <1300-1999>
Standard ACL uses the IP address on filtering (Layer 3).
Extended ACL uses the IP address, port no. (Layer 3 & 4).
In named ACL, you should mention inside the command line if it is extended or basic. Just It allows you to give an intuitive name instead of numbers allows
Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical resources (a bank account, with a limited number of people authorized to make a withdrawl), or digital resources (for example, a private text document on a computer, which only certain users should be able to read).
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.