{"id":194496,"date":"2023-10-08T14:07:32","date_gmt":"2023-10-08T14:07:32","guid":{"rendered":"https:\/\/ded9.com\/?p=194496"},"modified":"2025-11-03T08:46:41","modified_gmt":"2025-11-03T08:46:41","slug":"what-is-an-access-control-list-acl","status":"publish","type":"post","link":"https:\/\/ded9.com\/tr\/what-is-an-access-control-list-acl\/","title":{"rendered":"What Is an Access Control List (ACL)? Understanding ACLs in Networking and Security"},"content":{"rendered":"<p class=\"md-block-unstyled direction-rtl\">One way to properly use network equipment is to understand it and its other capabilities fully. This article will examine the different types of access control lists and some deployment concepts, including why and when to use them.<\/p>\n<h2 class=\"md-block-unstyled direction-rtl\">What is an access control list?<\/h2>\n<p class=\"md-block-unstyled direction-rtl\">They are a network filter used by routers and some switches to allow or restrict data flow to network interfaces. When an ACL is configured on an interface, the device analyzes the network data passing through it, compares it to the criteria described in the ACL, and allows or denies data flow. Prevents. Originally, ACLs were the only way to achieve firewall protection. Today, there are many different types of firewalls and alternatives to ACLs. However, organizations still use ACLs in technologies such as virtual private networks (VPNs) that specify which traffic should be encrypted and transmitted through a VPN tunnel.<\/p>\n<h3 class=\"md-block-unstyled\"><strong class=\"md-inline-bold direction-rtl\">1- Filesystem ACLs:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\">Use it to filter access to files and\/or directories. Filesystem ACLs tell the operating systems what users can use to access the system and limit the amount of access.<\/p>\n<h3 class=\"md-block-unstyled\"><strong class=\"md-inline-bold direction-rtl\">2- Networking ACLs:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\">Network ACLs instruct routers and switches on which types of traffic can access the network and which activities are permitted.<\/p>\n<h2 class=\"md-block-header-two\"><strong class=\"md-inline-bold direction-rtl\">Access control lists are available in two main categories:<\/strong><\/h2>\n<h3 class=\"md-block-unstyled\"><strong class=\"md-inline-bold direction-rtl\">1- Standard ACL:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\">The access list is created using only the source IP address. Hence, access control lists allow blocking of the entire protocol suite. They do not distinguish between IP traffic such as UDP, TCP, and HTTPS. Generally, they use the numbers 1-99 or 1999-1300 so that the router can recognize the address as a source IP address.<\/p>\n<h3 class=\"md-block-unstyled\"><strong class=\"md-inline-bold direction-rtl\">2- Extended ACL:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\">An extended access list is used to distinguish IP traffic. It generates IP traffic using source and destination IP addresses and port numbers. You can also specify which IP traffic is allowed or denied. The numbers used are 100-199 and 2000-2699.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-194497 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/10\/84c9b223a8c6714c621da18f86c7e819_1acc5ee177.png\" alt=\"Access control lists are available in two main categories\" width=\"900\" height=\"500\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/10\/84c9b223a8c6714c621da18f86c7e819_1acc5ee177.png 900w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/10\/84c9b223a8c6714c621da18f86c7e819_1acc5ee177-300x167.png 300w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/10\/84c9b223a8c6714c621da18f86c7e819_1acc5ee177-768x427.png 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p>\n<h2 class=\"md-block-header-two direction-rtl\">Why do we use access control lists?<\/h2>\n<p class=\"md-block-unstyled direction-rtl\">There are several reasons for using ACLs. The main reason is to provide a basic level of network security. ACLs are not as complex as firewalls and do not provide comprehensive protection. Still, they do offer protection for higher-speed interfaces where line speed is crucial and where firewalls may be limiting. ACLs are also used to restrict updates to routing from network peers and can effectively determine flow control for network traffic.<\/p>\n<p class=\"md-block-unstyled\"><strong class=\"md-inline-bold direction-rtl\">In general, it can be said that the reasons for using ACLs are:<\/strong><\/p>\n<p class=\"md-block-unstyled direction-rtl\">1- Traffic flow control<\/p>\n<p class=\"md-block-unstyled direction-rtl\">2- Limiting network traffic to improve network performance<\/p>\n<p class=\"md-block-unstyled direction-rtl\">3\u2014The security level for accessing the network determines whether a user can use the server, network, or service.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">4- Monitor the output and input to the system<\/p>\n<h2 class=\"md-block-header-two direction-rtl\">When do we use the access control list?<\/h2>\n<p class=\"md-block-unstyled direction-rtl\">As I mentioned earlier, ACLs for routers are not as complex and robust as <a class=\"md-inline-link direction-rtl\" href=\"https:\/\/ded9.com\/do-host-firewalls-important-in-cloud-deployment\/\" target=\"_blank\" rel=\"noopener nofollow\">firewalls<\/a>, but they offer more significant capabilities. As an IT network or security professional, putting up a defensive wall to protect your network, assets, and data is crucial. ACLs should be placed on external routers to filter traffic on known vulnerable networks and <a href=\"https:\/\/www.cloudflare.com\/learning\/network-layer\/what-is-a-protocol\/\" target=\"_blank\" rel=\"noopener\">protocols<\/a>.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">In this case, one of the most common methods is setting a DMZ or demilitarized buffer zone in the network. This architecture is typically implemented with two separate network devices. An example of this configuration is shown in the figure below.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">The outermost router provides access to all external network connections. This router typically has more restrictive ACLs, but access blocks offer additional protection for areas of the global routing table that you want to restrict. This router protects against known protocols that cannot enter or exit your network. Additionally, ACLs must be set here to restrict peer access to the network. They can be used with routing protocols to limit the number of route updates sent or received through network peers.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">Most IT professionals place systems that require external access in the DMZ. The most common examples are web servers, DNS servers, and remote access systems or VPNs.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">The internal DMZ router features more restrictive ACLs to safeguard the internal network against threats. ACLs are often configured with permit and deny statements for specific addresses and protocol services.<\/p>\n<h2 class=\"md-block-header-two\"><strong class=\"md-inline-bold direction-rtl\">What do access control lists contain?<\/strong><\/h2>\n<p class=\"md-block-unstyled direction-rtl\">Regardless of which routing platform you use, all these routers have similar specifications for specifying an access control list. More advanced lists have more specific controls, but general guidelines are as follows:<\/p>\n<ul class=\"md-block-unordered-list-item\">\n<li>The name of the access control list (depending on the type of router, its name can be a number or a combination of numbers and words).<\/li>\n<li>A sequence of names for each entry<\/li>\n<li>Description of allowing or denying this entry<\/li>\n<li>A network protocol and its associated functions or ports: examples include IP, IPX, ICMP, TCP, UDP, NetBIOS, and many others.<\/li>\n<li>Source or destination targets: These are typically addresses and can be defined as an individual address, a range or subnet, or all addresses.<\/li>\n<li>Additional flags or identifiers<\/li>\n<\/ul>\n<h2 class=\"md-block-header-two direction-rtl\">ACL best practices:<\/h2>\n<p class=\"md-block-unstyled direction-rtl\">When configuring ACLs, there are a few best practices to follow to ensure security is tight and suspicious traffic is blocked:<\/p>\n<h3 class=\"md-block-header-three\"><strong class=\"md-inline-bold direction-rtl\">1- ACL everywhere:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\">These ACLs are applied to every interface and security or routing equipment. This is good because you cannot have the same rules for the interfaces and external interfaces that make up your network.<\/p>\n<p class=\"md-block-unstyled direction-rtl\">The ACL method on all interfaces is necessary for inbound ACLs, especially rules that decide which addresses can pass data into your network. These are rules that make a significant difference.<\/p>\n<h3 class=\"md-block-header-three direction-rtl\">2- ACL respectively:<\/h3>\n<p class=\"md-block-unstyled direction-rtl\">In almost all cases, the ACL booster engine starts at the top and works its way down the list. This has implications for how ACLs work with a particular data stream. One reason organizations use ACLs is that they are less computationally intensive than firewalls and work at high speeds.<\/p>\n<h3 class=\"md-block-header-three\"><strong class=\"md-inline-bold direction-rtl\">3- Work documentation:<\/strong><\/h3>\n<p class=\"md-block-unstyled direction-rtl\"><span class=\"VIpgJd-yAWNEb-VIpgJd-fmcmS-sn54Q\">Before adding ACLs, determine what you will do and when you will add them.<\/span><\/p>\n<h2>FAQ<\/h2>\n<div id=\"rank-math-rich-snippet-wrapper\"><div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-1\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What is an Access Control List (ACL)?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>An Access Control List (ACL) is a set of rules that define permissions attached to objects, specifying which users or system processes can access resources and what operations they are allowed to perform.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-2\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Where are ACLs commonly used?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>ACLs are commonly used in network security, file systems, and operating systems to control access to files, directories, network devices, and services.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-3\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">How do ACLs improve security?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>By explicitly defining who can access or modify resources and what actions they can perform, ACLs help prevent unauthorized access and ensure proper enforcement of security policies.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>One way to properly use network equipment is to understand it and its other capabilities fully. This article will examine the different types of access control lists and some deployment concepts, including why and when to use them. What is an access control list? They are a network filter used by routers and some switches [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":194500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[96],"tags":[3132,10670,10669,1397],"class_list":["post-194496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network","tag-nfv-network-functions-virtualization","tag-access-control-list","tag-acl","tag-software"],"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/posts\/194496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/comments?post=194496"}],"version-history":[{"count":5,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/posts\/194496\/revisions"}],"predecessor-version":[{"id":264633,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/posts\/194496\/revisions\/264633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/media\/194500"}],"wp:attachment":[{"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/media?parent=194496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/categories?post=194496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ded9.com\/tr\/wp-json\/wp\/v2\/tags?post=194496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}