Named ACLs – Detailed Explanation
1. What are Named ACLs?
Named Access Control Lists (ACLs) are ACLs identified by a custom name (like BLOCK_WEB
) instead of a numeric value.
Purpose: Increase readability, simplify management, and enable more flexible, granular editing of ACL entries.
Named ACLs support both standard (source IP only) and extended (source, destination, protocol, port) types.
2. Difference Between Numbered and Named ACLs
Feature | Numbered ACL | Named ACL |
---|---|---|
Identification | Numeric (e.g., 10, 101) | Text name (e.g., BLOCK_HTTP) |
Editing | Must delete & recreate | Edit individual lines |
Sequence Numbers | Not supported | Supported |
Readability | Lower | Higher |
Flexibility | Lower | Higher |
3. Advantages of Named ACLs
- Easier to identify and manage using descriptive names.
- Support for incremental editing—add, delete, or reorder entries with sequence numbers.
- Work with both standard and extended ACLs.
- Enable precise control over the order of rules.
4. Creating Named ACLs
Standard Named ACL Example:ip access-list standard BLOCK_LOCAL permit 192.168.10.0 0.0.0.255 deny anyExtended Named ACL Example:
ip access-list extended BLOCK_WEB permit tcp any host 10.0.0.1 eq 80 deny ip any any
Enter ACL configuration submode and add rules line by line. Sequence numbers are optional but recommended for easier editing.
5. Applying Named ACLs
- To interfaces (router or switch):
interface GigabitEthernet0/1 ip access-group BLOCK_WEB in
- Other uses: SVIs on Layer 3 switches, route-maps (for PBR, NAT), VPN filters, VTY lines, etc.
6. Editing Named ACLs
Adding entries with sequence numbers:ip access-list extended BLOCK_WEB 10 permit tcp any host 10.0.0.1 eq 80 20 deny ip any anyRemoving an entry:
ip access-list extended BLOCK_WEB no 10Inserting between entries:
ip access-list extended BLOCK_WEB 15 permit icmp any any
This adds a rule between sequence 10 and 20.
7. Viewing Named ACLs
- show access-lists BLOCK_WEB — View the rules in a named ACL.
- show running-config | section access-list — List all ACL definitions.
8. Named vs Numbered ACL – Functional Differences
Aspect | Named ACL | Numbered ACL |
---|---|---|
Editing | Add/remove lines, reorder with sequence numbers | Delete/recreate the whole ACL to change order |
Identification | Descriptive, easier documentation | Numeric, less intuitive |
Use case | Preferred for large or frequently modified lists | Simple/legacy configs or automation scripts |
9. Best Practices for Named ACLs
- Use descriptive names (e.g., BLOCK_TELNET, PERMIT_ADMIN).
- Follow a naming convention: uppercase, underscores, concise and clear.
- Comment and document the purpose of each ACL and rule.
- Order rules logically—most specific first, general last.
- Use sequence numbers for easy insertion and management.
10. Troubleshooting Named ACLs
- Check that the ACL is applied to the correct interface and in the right direction (
in
/out
). - Watch for overlapping/conflicting rules or missing permits (implicit deny).
- Debug with:
- show access-lists BLOCK_WEB
- show ip interface [int]
- Add
log
keyword for real-time monitoring of matches.
11. Verifying ACL Effectiveness
- Check hit counts using show access-lists [name].
- Use show ip interface to confirm ACL application and direction.
- Test with
ping
,telnet
, or actual application traffic.
12. Limitations and Considerations
- IOS Version: Named ACLs require IOS 12.0(1) or later (most modern equipment supports them).
- Entry Limits: Subject to platform/software, but supports thousands of entries on enterprise devices.
- Case Sensitivity: Names may be case-sensitive on some platforms—be consistent.
- Syntax: Some features (like reflexive or time-based ACLs) may have unique needs with named ACLs.
Example Scenario:
Block all HTTP access to server 10.10.10.10 but allow all other traffic.
Block all HTTP access to server 10.10.10.10 but allow all other traffic.
ip access-list extended BLOCK_HTTP deny tcp any host 10.10.10.10 eq 80 permit ip any any ! interface GigabitEthernet0/2 ip access-group BLOCK_HTTP inThis blocks HTTP to 10.10.10.10 from any source on inbound traffic, but permits all else.
Key Points and Exam Tips
Key Point | Explanation |
---|---|
Descriptive Names | Named ACLs are easier to identify and manage than numbered ACLs. |
Sequence Numbers | Support incremental editing and precise order control. |
Both Standard & Extended | Can create named ACLs for either type. |
Apply to Interface | With ip access-group [name] in|out |
Verification | Use show access-lists [name] to view rules and hits. |
Use Naming Conventions | Keep names clear and consistent for troubleshooting. |
Test Thoroughly | Always test after editing to avoid unintentional blocks. |
Document Purpose | Comment ACLs for clarity, especially in large environments. |
When and Where to Use Named ACLs:
In any environment needing large, complex, or frequently updated access policies.
Ideal for: Enterprise networks, collaborative troubleshooting, and where documentation and clarity are priorities.
In any environment needing large, complex, or frequently updated access policies.
Ideal for: Enterprise networks, collaborative troubleshooting, and where documentation and clarity are priorities.