How ACLs Work

  • When managing a network, one of your key responsibilities is deciding what traffic should be allowed and what should be blocked. That’s exactly what Access Control Lists (ACLs) are designed for.

    An ACL is a set of rules that filters traffic based on specific conditions. These rules are applied on Cisco routers or Layer 3 switches to permit or deny packets, helping you control how devices communicate across different parts of your network.

    ACLs and OSI Layers

    There are two main types of ACLs, each operating at different layers of the OSI model, as shown in Figure 1.

    What Is ACL and How It Works in Networking – OSI layers showing Standard and Extended ACL levels

    Figure 1 – ACLs and OSI Layers

    • Standard ACLs operate at Layer 3 (Network Layer) and filter traffic based only on the source IP address.

    • Extended ACLs operate at both Layer 3 and Layer 4 (Network and Transport Layers), allowing filtering based on source and destination IP, protocols, and even port numbers.

    Real-World Example — Inside a Company Network

    Imagine you’re the network administrator of a mid-size company. Each department has its own VLAN connected to a core router:

    • VLAN 10 — Legal Department: 192.168.1.0/24

    • VLAN 20 — HR Department: 192.168.2.0/24

    • VLAN 30 — Server VLAN: 192.168.3.0/24

    The Legal department needs access to the Legal Server in VLAN 30, but HR must not reach it for confidentiality reasons. ACLs are the perfect solution to enforce this rule directly on the router.

    Standard ACL example allowing legal network and blocking HR traffic

    Figure 2 – Standard ACL Example

    As shown in Figure 2, the router sits between departments and the server VLAN, making it the ideal point to control traffic flow.

    Configuration Example

    Here’s how a basic Standard ACL would look:

    R1(config)# ip access-list standard 10 
    R1(config-std-nacl)# permit 192.168.1.0 0.0.0.255
    R1(config-std-nacl)# deny 192.168.2.0 0.0.0.255

    What’s Happening Here?

    • 10 is the ACL ID number.

    • The Legal network (192.168.1.0/24) is allowed to access the server VLAN.

    • The HR network (192.168.2.0/24) is explicitly denied.

    This configuration enforces department-based access control, a common best practice in enterprise environments to ensure network segmentation and data protection.

    Key Takeway

    ACLs give you the power to define who can talk to whom on the network.
    They act as gatekeepers, ensuring that each department or service communicates only where it should.

    Now that you’ve seen how ACLs are used in a real company network, let’s look at how these rules are structured, starting with the Access Control Entries (ACEs) that make up every ACL.

    Answer the question below