Table of Contents

Cisco : Extended Access Control List

Pada Halaman sebelumnya Cisco : Standard Access Control List kita telah menkonfigurasi Acess Control list standard sekarang kita akan konfigurasi Extended Access control list. Berbeda dengan standard ACL ,extended ACL berkemampuan untuk menfilter paket tidak hanya dengan source ip address melainkan dengan sourceip, destination ip, Port, Type connection (tcp/udp). Sehingga memungkinkan filtering paket lebih tepat sasaran.

Syntax

Berikut adallah syntax dalam menkongfigurasi Extended ACL:

Membuat Extended ACL (number)

Router(config)# access-list [ACL_NUMBER] [permit|deny] protocol source source-wildcard destination destination-wildcard [eq port]

Contoh:

Router(config)# access-list 101 permit tcp 192.168.1.0 0.0.0.255 172.16.0.0 0.0.0.255 eq 80

Membuat Standard ACL (Named)

Router(config)# ip access-list extended [ACL_NAME]
Router(config-ext-nacl)# [permit|deny] protocol source source-wildcard destination destination-wildcard [eq port]

contoh:

Router(config)# ip access-list extended WEB_FILTER
Router(config-ext-nacl)# permit tcp 192.168.1.0 0.0.0.255 172.16.0.0 0.0.0.255 eq 80
Router(config-ext-nacl)# deny tcp any any eq 23

Terapkan ACL ke interface

Router(config)# interface <nama_interface>
Router(config-if)# access-list <nomor_acl>/<named_acl> in/out

Contoh:

Router(config)# interface FastEthernet0/0
Router(config-if)# access-list 10 in
Router(config)# interface GigabitEthernet 0/0
Router(config-if)# ip access-group WEB_FILTER in

Troubleshot

Router# show access-lists

Topologi

Tujuan:

  1. Block akses http pada LAN 1 ke Server
  2. Block akses ssh pada LAN 2 ke Server-C

Preconfig

Preconfig

* R1: Preconfig

hostname R1
!
ip dhcp excluded-address 192.168.1.1 
ip dhcp excluded-address 192.168.2.1
!
ip dhcp pool LAN1
   network 192.168.1.0 255.255.255.0
   default-router 192.168.1.1
!
ip dhcp pool LAN2
   network 192.168.2.0 255.255.255.0
   default-router 192.168.2.1
!
interface FastEthernet0/0
 ip address 172.16.1.1 255.255.255.252
 no shutdown
!
interface FastEthernet0/1
 ip address 192.168.1.1 255.255.255.0
 no shutdown
!
interface FastEthernet1/2
 ip address 192.168.2.1 255.255.255.0
 no shutdown
!
router ospf 1
 network 172.16.1.0 0.0.0.3 area 0
 network 192.168.1.0 0.0.0.255 area 0
 network 192.168.2.0 0.0.0.255 area 0
!

* R2: Preconfig

hostname R2
!
ip dhcp pool SERVER
   network 10.10.10.0 255.255.255.0
   default-router 10.10.10.1
!
interface FastEthernet0/0
 ip address 172.16.1.2 255.255.255.252
 no shutdown
!
interface FastEthernet0/1
 ip address 10.10.10.1 255.255.255.0
 no shutdown
!
router ospf 1
 network 10.10.10.0 0.0.0.255 area 0
 network 172.16.1.0 0.0.0.3 area 0

Konfigurasi

Apabilsa standar ACL umumnya ditempatkan paling dekat dengan tujuan. Extended ACL lebih baik ditempatkan paling dekat dengan sumber.

Membuat extended ACL rules

block https access dari lan1

R1(config)#ip access-list extended Block-HTTP
R1(config-ext-nacl)#$192.168.1.0 0.0.0.255 10.10.10.0 0.0.0.255 eq 80
R1(config-ext-nacl)#  permit ip any any
R1(config)#interface fa0/1
R1(config-if)# ip access-group Block-HTTP in

block ssh access dari lan2

R1(config)#ip access-list extended Block-SSH
R1(config-ext-nacl)#$192.168.2.0 0.0.0.255 10.10.10.0 0.0.0.255 eq 22
R1(config-ext-nacl)#  permit ip any any
R1(config)#interface fa1/0
R1(config-if)# ip access-group Block-SSH in

Testing