Extended ACL

An Extended ACL lets you filter traffic not only by source but also by destination, protocol, and port number. In this lesson, you’ll see how to configure, apply, and verify Extended ACLs to gain precise control over network traffic.

  • When managing a network, you often need more than just blocking traffic by source IP.

    That’s where Extended Access Control Lists (ACLs) come in.

    An Extended ACL is different from a Standard ACL. It allows you to filter traffic by source IP, destination IP, protocol, and port numbers.

    Let’s say you have this topology:

    Extended ACL diagram showing Cisco router R1 allowing HTTPS traffic from Legal PC (192.168.1.1) to Legal Server (192.168.2.1) and blocking all traffic to HR Server (192.168.3.1) using visual arrows and a stop sign.

    Figure 1 – Extended ACL Use Case

    In this example, we want to control access using an Extended ACL:

    • Allow HTTPS traffic from the Legal PC to a secure Legal Server at 192.168.2.1

    • Deny all access from the Legal PC to the HR Server at 192.168.3.1

    This is a common situation that requires Extended ACLs. Standard ACLs can't filter by protocol or port.

    Answer the question below