{"id":456,"date":"2020-04-06T15:51:31","date_gmt":"2020-04-06T13:51:31","guid":{"rendered":"http:\/\/tech.sosthe.sk\/?page_id=456"},"modified":"2020-04-06T15:51:31","modified_gmt":"2020-04-06T13:51:31","slug":"8-acl-access-control-list","status":"publish","type":"page","link":"http:\/\/tech.sosthe.sk\/index.php\/ccna\/cisco-ios\/8-acl-access-control-list\/","title":{"rendered":"8. ACL &#8211; Access Control List"},"content":{"rendered":"<p><strong><em><span>Access Control List<\/span><\/em><\/strong><span>\u00a0(\u010falej len ACL) je zoznam pravidiel, ktor\u00e9 riadi pr\u00edstup k nejak\u00e9mu objektu.\u00a0ACL s\u00fa pou\u017e\u00edvan\u00e9 v rade aplik\u00e1ci\u00ed, \u010dasto u akt\u00edvnych sie\u0165ov\u00fdch prvkov, ale napr\u00edklad aj u opera\u010dn\u00fdch syst\u00e9mov pri riaden\u00ed pr\u00edstupu k objektu (s\u00faboru).\u00a0Ak niekto po\u017eaduje pr\u00edstup k nejak\u00e9mu objektu, tak sa najprv skontroluje ACL priraden\u00fd k tomuto objektu, \u010di je t\u00e1to oper\u00e1cia povolen\u00e1 (pr\u00edpadne povolen\u00e1 komu).<\/span><\/p>\n<h4><span>Cisco ACL<\/span><\/h4>\n<p><span>Na akt\u00edvnych prvkoch Cisco s\u00fa ACL vlastnost\u00ed IOSu.\u00a0M\u00f4\u017eeme ich pou\u017e\u00edva\u0165 na nieko\u013ek\u00fdch miestach, ale naj\u010dastej\u0161ie pou\u017eitie je pre riadenie (obmedzovanie) sie\u0165ovej prev\u00e1dzky, teda pre\u00a0<\/span><em><strong><span>filtrovanie paketov<\/span><\/strong><\/em><span>\u00a0.\u00a0R\u00f4znych typov ACL je cel\u00fd rad, niektor\u00e9 typy ACL sa daj\u00fa aplikova\u0165 na r\u00f4zne miesta a tie\u017e s\u00fa tu ur\u010dit\u00e9 v\u00e4zby.\u00a0Tak\u017ee m\u00e1me napr\u00edklad\u00a0<\/span><em><strong><span>IP Extended Named ACL<\/span><\/strong><\/em><span>\u00a0.\u00a0Pok\u00fasil som sa vytvori\u0165 trochu menej tradi\u010dn\u00e9, ale pre m\u0148a viac praktick\u00fd, zoznam typov ACL.<\/span><\/p>\n<ul>\n<li><strong><span>IP ACL<\/span><\/strong><span>\u00a0&#8211; filtruje IPv4 prev\u00e1dzka &#8211; IP, TCP, UDP, IGMP (multicast), ICMP<\/span>\n<ul>\n<li><strong><span>Port ACL<\/span><\/strong><span>\u00a0&#8211; pre fyzick\u00fd L2 interface (aplikujeme na port), len prich\u00e1dzaj\u00face smer<\/span>\n<ul>\n<li><strong><span>Numbered\u00a0<\/span><\/strong><strong><span>Standard<\/span><\/strong><span>\u00a0&#8211; \u010d\u00edslovan\u00e9, iba zdrojov\u00e1 adresa<\/span><\/li>\n<li><strong><span>Numbered\u00a0<\/span><\/strong><strong><span>Extended<\/span><\/strong><span>\u00a0&#8211; \u010d\u00edslovan\u00e9, zdrojov\u00e1 aj cie\u013eov\u00e1 adresa a volite\u013ene port<\/span><\/li>\n<li><strong><span>Named Standard<\/span><\/strong><span>\u00a0&#8211; pomenovan\u00e9 \u0161tandard<\/span><\/li>\n<li><strong><span>Named Extended<\/span><\/strong><span>\u00a0&#8211; pomenovan\u00e9 extended<\/span><\/li>\n<\/ul>\n<\/li>\n<li><strong><span>Router ACL<\/span><\/strong><span>\u00a0&#8211; pre L3 interface &#8211; SVI (switch virtual interfaces &#8211; L3 interface pre VLAN), fyzick\u00fd L3 interface (port &#8211; vznikne pomocou no switchport), L3 EtherChannel (spojenie viac portov);\u00a0kontroluj\u00fa routovanie prev\u00e1dzku, odch\u00e1dzaj\u00face alebo prich\u00e1dzaj\u00face smer<\/span>\n<ul>\n<li><strong><span>Standard<\/span><\/strong><\/li>\n<li><strong><span>extended<\/span><\/strong><\/li>\n<li><strong><span>Named<\/span><\/strong><\/li>\n<\/ul>\n<\/li>\n<li><strong><span>VLAN m\u00e1p<\/span><\/strong><span>\u00a0&#8211; kontroluje v\u0161etky pakety (routovanie aj bridgovanie = switchovan\u00e9), m\u00f4\u017eeme kontrolova\u0165 prev\u00e1dzku medzi zariadeniami v r\u00e1mci jednej VLAN.\u00a0Nerie\u0161i sa smer (odch\u00e1dzaj\u00face, prich\u00e1dzaj\u00face)., Aplikuje sa na VLAN.<\/span>\n<ul>\n<li><strong><span>Standard<\/span><\/strong><\/li>\n<li><strong><span>extended<\/span><\/strong><\/li>\n<li><strong><span>Named<\/span><\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><span>MAC ACL (Ethernet ACL)<\/span><\/strong><span>\u00a0&#8211; non-IP prev\u00e1dzku<\/span>\n<ul>\n<li><strong><span>port ACL<\/span><\/strong>\n<ul>\n<li><strong><span>Standard<\/span><\/strong><\/li>\n<li><strong><span>extended<\/span><\/strong><\/li>\n<li><strong><span>Named Extended<\/span><\/strong><\/li>\n<\/ul>\n<\/li>\n<li><strong><span>VLAN m\u00e1p<\/span><\/strong>\n<ul>\n<li><strong><span>Named Extended<\/span><\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span>Hlavn\u00e9 delenie je teda pod\u013ea\u00a0<\/span><strong><span>typu adries<\/span><\/strong><span>\u00a0, ktor\u00e9 pou\u017e\u00edvame v pravidl\u00e1ch.\u00a0Naj\u010dastej\u0161ie s\u00fa\u00a0<\/span><em><strong><span>IP a MAC ACL<\/span><\/strong><\/em><span>\u00a0, ale aj dnes tie\u017e (zatia\u013e menej vyu\u017e\u00edvan\u00e9)\u00a0<\/span><strong><span>IPv6 ACL<\/span><\/strong><span>\u00a0, ktor\u00e9 m\u00f4\u017eu by\u0165\u00a0<\/span><strong><em><span>Port<\/span><\/em><\/strong><span>\u00a0alebo\u00a0<\/span><strong><em><span>Router<\/span><\/em><\/strong><span>\u00a0a iba\u00a0<\/span><strong><em><span>Named<\/span><\/em><\/strong><span>\u00a0.\u00a0V konfigur\u00e1cii sa pou\u017e\u00edvaj\u00fa prefixy miesto Wildcard masky.\u00a0Alebo u\u017e skoro nepou\u017e\u00edvan\u00e9 IPX ACL.<\/span><\/p>\n<p><span>\u010eal\u0161ie delenie je pod\u013ea toho,\u00a0<\/span><em><strong><span>kam<\/span><\/strong><\/em><span>\u00a0danej ACL\u00a0<\/span><em><strong><span>aplikujeme<\/span><\/strong><\/em><span>\u00a0.\u00a0M\u00f4\u017eeme na\u00a0<\/span><em><strong><span>L2 interface<\/span><\/strong><\/em><span>\u00a0,\u00a0<\/span><em><strong><span>L3 interface<\/span><\/strong><\/em><span>\u00a0a alebo \u0161peci\u00e1lne\u00a0<\/span><em><strong><span>VLAN m\u00e1p<\/span><\/strong><\/em><span>\u00a0.\u00a0Potom u\u017e m\u00e1me vlastn\u00e9 typy ACL, bu\u010f\u00a0<\/span><em><strong><span>\u0161tandardn\u00e9<\/span><\/strong><\/em><span>\u00a0,\u00a0<\/span><em><strong><span>roz\u0161\u00edren\u00e9<\/span><\/strong><\/em><span>\u00a0alebo\u00a0<\/span><em><strong><span>pomenovan\u00e9<\/span><\/strong><\/em><span>\u00a0.<\/span><\/p>\n<p class=\"notice\"><span>V tomto \u010dl\u00e1nku sa venujem v\u0161eobecne ACL, potom viac IP ACL a na z\u00e1ver MAC ACL. \u010co sa t\u00fdka aplik\u00e1cie, tak je to s\u00edce v\u0161eobecn\u00e9, ale viac zameran\u00e9 na Port ACL. Router ACL (viac prakticky) sa venujem v \u010fal\u0161om \u010dl\u00e1nku\u00a0<\/span><span>\u00a0&#8211; inter-VLAN routing a ACL &#8211; smerovanie medzi VLANy<\/span><span>\u00a0.\u00a0\u0160pecifick\u00fdm pr\u00edpadom s\u00fa VLAN mapy, o ktor\u00fdch vyjde \u010fal\u0161\u00ed \u010dl\u00e1nok.<\/span><\/p>\n<p><strong><span>ACL sl\u00fa\u017ei hlavne \u00a0<\/span><\/strong><\/p>\n<ul>\n<li><span>ako z\u00e1kladn\u00fd sie\u0165ov\u00e1 bezpe\u010dnos\u0165 na blokovanie alebo povolenie (routovan\u00e9ho) prev\u00e1dzky<\/span><\/li>\n<li><span>ku kontrole \u0161\u00edrky p\u00e1sma<\/span><\/li>\n<li><span>Policy Based Routing<\/span><\/li>\n<li><span>vyn\u00fatenie sie\u0165ov\u00fdch polit\u00edk<\/span><\/li>\n<li><span>identifik\u00e1ciu alebo klasifik\u00e1ciu prev\u00e1dzky (pre QoS, NAT, a pod.)<\/span><\/li>\n<\/ul>\n<h4><span>Stru\u010dn\u00e1 charakteristika a vlastnosti<\/span><\/h4>\n<ul>\n<li><span>ACL je sekven\u010dn\u00e1 (raden\u00fd) zoznam pravidiel\u00a0<\/span><strong><span>permit<\/span><\/strong><span>\u00a0(povoli\u0165) a\u00a0<\/span><strong><span>deny<\/span><\/strong><span>\u00a0(zak\u00e1za\u0165), t\u00fdmto pravidl\u00e1m sa hovor\u00ed\u00a0<\/span><strong><span>ACE<\/span><\/strong><span>\u00a0(Access Control Entries).<\/span><\/li>\n<li><span>ACL m\u00f4\u017eeme identifikova\u0165\u00a0<\/span><em><strong><span>\u010d\u00edslom<\/span><\/strong><\/em><span>\u00a0alebo\u00a0<\/span><em><strong><span>menom<\/span><\/strong><\/em><span>\u00a0(pomenovan\u00e9 ACL).<\/span><\/li>\n<li><span>Nov\u00e9 pravidl\u00e1 sa prid\u00e1vaj\u00fa v\u017edy na koniec zoznamu.<\/span><\/li>\n<li><span>Pou\u017e\u00edva sa pravidlo\u00a0<\/span><em><strong><span>first-fit<\/span><\/strong><\/em><span>\u00a0.\u00a0Zoznam sa prech\u00e1dza od za\u010diatku ku koncu, a pokia\u013e d\u00f4jde k zhode, tak sa \u010falej neprech\u00e1dza.<\/span><\/li>\n<li><span>Ka\u017ed\u00fd nepr\u00e1zdny zoznam m\u00e1 na konci\u00a0<\/span><em><strong><span>defaultn\u00fd pravidlo<\/span><\/strong><\/em><span>\u00a0, ktor\u00e9 zakazuje v\u0161etko (deny any).\u00a0Pr\u00e1zdny zoznam povo\u013euje v\u0161etko.<\/span><\/li>\n<li><span>Je dobr\u00e9 umiest\u0148ova\u0165 viac \u0161pecifick\u00e9 pravidl\u00e1 na za\u010diatok a oby\u010dajn\u00e1 (subnetmi apod) na koniec.<\/span><\/li>\n<li><span>Ak sa v ACL vyhodnot\u00ed deny, tak sa odo\u0161le ICMP hos\u0165 nedosiahnute\u013en\u00fd (unreachable).<\/span><\/li>\n<li><span>Filtrovanie (pou\u017e\u00edvanie ACL) spoma\u013euje zariadenie (stoj\u00ed v\u00fdpo\u010dtov\u00fd v\u00fdkon).<\/span><\/li>\n<li><span>Odch\u00e1dzaj\u00face pravidl\u00e1 (outbound filters) neovplyv\u0148uj\u00fa prev\u00e1dzku, ktor\u00fd poch\u00e1dza lok\u00e1lne z routeru (filtruj\u00fa iba prech\u00e1dzaj\u00face prev\u00e1dzka).<\/span><\/li>\n<\/ul>\n<p><span>Ak chceme upravi\u0165 nejak\u00e9 hotov\u00e9 ACL, tak ho (vo v\u00e4\u010d\u0161ine pr\u00edpadov) mus\u00edme zmaza\u0165 a vytvori\u0165 znova.\u00a0Odpor\u00fa\u010da sa nap\u00edsa\u0165 najprv ACL v textovom editore a n\u00e1sledne skop\u00edrova\u0165 do\u00a0<\/span><strong><em><span>CLI<\/span><\/em><\/strong><span>\u00a0.\u00a0Pr\u00edpadne\u00a0<\/span><strong><em><span>Cisco Network Assistant<\/span><\/em><\/strong><span>\u00a0m\u00e1 n\u00e1stroj na \u00fapravu ACL.<\/span><\/p>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><span>\u00a0V\u00fdnimkou s\u00fa pomenovan\u00e9 ACL, kde s\u00fa ur\u010dit\u00e9 \u00fapravy mo\u017en\u00e9.<\/span><\/p>\n<ul>\n<li><span>na interfacu m\u00f4\u017eeme kombinova\u0165\u00a0<\/span><em><strong><span>IP ACL<\/span><\/strong><\/em><span>\u00a0a\u00a0<\/span><em><strong><span>MAC ACL<\/span><\/strong><\/em><span>\u00a0, aby sme filtrovali v\u0161etok prev\u00e1dzku<\/span><\/li>\n<li><span>tie\u017e m\u00f4\u017eeme pou\u017e\u00edva\u0165 dohromady\u00a0<\/span><em><strong><span>Port ACL<\/span><\/strong><\/em><span>\u00a0,\u00a0<\/span><em><strong><span>Router ACL<\/span><\/strong><\/em><span>\u00a0aj\u00a0<\/span><em><strong><span>VLAN m\u00e1p<\/span><\/strong><\/em><span>\u00a0, ale Port ACL m\u00e1 najv\u00e4\u010d\u0161iu prioritu, potom je Router ACL a a\u017e posledn\u00e1 VLAN m\u00e1p<\/span><\/li>\n<\/ul>\n<h4><span>Wildcard subnet mask<\/span><\/h4>\n<p><span>U ACL sa Cisco rozhodlo nepou\u017e\u00edva\u0165 tradi\u010dn\u00e9\u00a0<\/span><strong><em><span>masky podsiet\u00ed<\/span><\/em><\/strong><span>\u00a0(subnet mask), ale tzv.\u00a0<\/span><strong><span>Wildcard mask<\/span><\/strong><span>\u00a0.\u00a0Je to mal\u00e9 skomplikovanie, ale Nejde o ni\u010d zlo\u017eit\u00e9.\u00a0Iba je potrebn\u00e9 na t\u00fato vlastnos\u0165 nezabudn\u00fa\u0165 pri konfigur\u00e1cii, preto\u017ee by mohlo d\u00f4js\u0165 k mno\u017estvu probl\u00e9mov.\u00a0T\u00e1to maska sa tie\u017e ozna\u010duje ako\u00a0<\/span><strong><em><span>inverzne maska<\/span><\/em><\/strong><span>\u00a0(inverzia mask), \u010do ju lep\u0161ie popisuje.\u00a0Ide toti\u017e o opa\u010dn\u00fa masku k tradi\u010dnej maske.<\/span><\/p>\n<p><strong><em><span>V\u00fdpo\u010det inverzne masky<\/span><\/em><\/strong><span>\u00a0je jednoduch\u00fd, vezmeme postupne v\u0161etky \u0161tyri oktety masky a spo\u010d\u00edtame<\/span><code>255 - oktet<\/code><span>.\u00a0Tak\u017ee napr\u00edklad maska<\/span><code>255.255.255.0<\/code><span>m\u00e1 inverzn\u00fd verziu<\/span><code>0.0.0.255<\/code><span>alebo k<\/span><code>255.255.192.0<\/code><span>ich<\/span><code>0.0.63.255<\/code><span>.<\/span><\/p>\n<h3><span>Typy ACL<\/span><\/h3>\n<p><span>Najpou\u017e\u00edvanej\u0161ie je delenie ACL na dva typy<\/span><\/p>\n<ul>\n<li><strong><span>\u0161tandard ACL<\/span><\/strong><span>\u00a0&#8211; star\u0161\u00ed a jednoduch\u0161ie verzie ACL s menej mo\u017enos\u0165ami konfigur\u00e1cie<\/span><\/li>\n<li><strong><span>extended ACL<\/span><\/strong><span>\u00a0&#8211; nov\u0161ie a zlo\u017eitej\u0161ie ACL s viacer\u00fdmi mo\u017enos\u0165ami<\/span><\/li>\n<\/ul>\n<p><span>\u010ealej existuj\u00fa r\u00f4zne \u0161peci\u00e1lne ACL, ktor\u00e9 s\u00fa \u010dasto odvoden\u00e9 z t\u00fdchto dvoch, ako je\u00a0<\/span><em><span>dynamic ACL<\/span><\/em><span>\u00a0,\u00a0<\/span><em><span>context-based ACL<\/span><\/em><span>\u00a0,\u00a0<\/span><em><span>Reflexive ACL<\/span><\/em><span>\u00a0alebo\u00a0<\/span><em><span>named ACL<\/span><\/em><span>\u00a0.<\/span><\/p>\n<h4><span>Standard ACL &#8211; \u0161tandardn\u00e9 ACL<\/span><\/h4>\n<ul>\n<li><span>pou\u017e\u00edva \u010d\u00edsla\u00a0<\/span><strong><span>1 &#8211; 99<\/span><\/strong><span>\u00a0a\u00a0<\/span><strong><span>1300 &#8211; 1999<\/span><\/strong><span>\u00a0v roz\u0161\u00edrenom m\u00f3de<\/span><\/li>\n<li><span>je jednoduch\u00e9 na konfigur\u00e1ciu<\/span><\/li>\n<li><span>filtruje (pozer\u00e1 sa) len pod\u013ea zdrojov\u00e9 adresy a pou\u017e\u00edva sa ako odch\u00e1dzaj\u00face<\/span><\/li>\n<li><span>pou\u017e\u00edva sa pre blokovanie prev\u00e1dzky bl\u00edzko cie\u013ea<\/span><\/li>\n<\/ul>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list <em>\u010d\u00edslo {deny | permit}<\/em> {hos\u0165 | source source-wildcard | any} [log]<\/strong><\/span><\/pre>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><strong>\u00a0<\/strong><span>Konfigur\u00e1cia \u0161tandard aj extended ACL sa vykon\u00e1va rovnako, rozli\u0161uje sa pod\u013ea pou\u017eit\u00e9ho \u010d\u00edsla.<\/span><\/p>\n<p><span>Na mieste\u00a0<\/span><code>deny|permit<\/code><span>m\u00f4\u017eeme tie\u017e pou\u017ei\u0165 k\u013e\u00fa\u010dov\u00e9 slovo\u00a0<\/span><code>remark<\/code><span>\u00a0a za neho vlo\u017ei\u0165 popis (koment\u00e1r) dan\u00e9ho pravidla.<\/span><\/p>\n<p><span>Volite\u013en\u00fd atrib\u00fat\u00a0<\/span><code>log<\/code><span>sp\u00f4sob\u00ed, \u017ee na konzolu a do logu bud\u00fa posielan\u00e9 inform\u00e1cie o paketoch, ktor\u00e9 splnia dan\u00e9 krit\u00e9ria (dan\u00e9 pravidlo).\u00a0Hod\u00ed sa pre ladenie, ale pre ostr\u00fa prev\u00e1dzku pr\u00edli\u0161 za\u0165a\u017euje zariaden\u00ed.<\/span><\/p>\n<p><strong><em><span>Pr\u00edklad:<\/span><\/em><\/strong><\/p>\n<p><span>Nasleduj\u00face ACL s \u010d\u00edslom 5 povo\u013euje pr\u00edstup subnetu 10.5.1.0\/24 mimo adresy 10.5.1.10, v\u0161etky ostatn\u00e9 adresy s\u00fa zak\u00e1zan\u00e9.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list 5 deny host 10.5.1.10<\/strong> \r\nSWITCH (config) # <strong>access-list 5 permit 10.5.1.10 0.0.0.255 <\/strong>\r\nSWITCH (config) # <strong>access-list 5 deny any<\/strong><\/span><\/pre>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><span>\u00a0Posledn\u00e9 pravidlo je defaultn\u00fd a nevklad\u00e1 sa.<\/span><\/p>\n<h4><span>Extended ACL &#8211; roz\u0161\u00edren\u00e9 ACL<\/span><\/h4>\n<ul>\n<li><span>pou\u017e\u00edva \u010d\u00edsla\u00a0<\/span><strong><span>100 &#8211; 199<\/span><\/strong><span>\u00a0a\u00a0<\/span><strong><span>2000 &#8211; 2699<\/span><\/strong><span>\u00a0v roz\u0161\u00edrenom m\u00f3de<\/span><\/li>\n<li><span>pozer\u00e1 sa na IP adresu zdroje aj ciele<\/span><\/li>\n<li><span>kontroluje rad polo\u017eiek v hlavi\u010dke vrstvy 3 a 4 (protokol, port a pod.)<\/span><\/li>\n<li><span>m\u00f4\u017ee blokova\u0165 prev\u00e1dzku kdeko\u013evek (najlep\u0161ie bl\u00edzko zdroja)<\/span><\/li>\n<\/ul>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0\u010eal\u0161ie \u010d\u00edseln\u00e9 rozsahy sa pou\u017e\u00edvaj\u00fa pre ostatn\u00e9 typy ACL, ako IPX, AppleTalk, XNS, apod.<\/span><\/p>\n<p><strong><em><span>Extended ACL m\u00f4\u017ee kontrolova\u0165 tieto parametre<\/span><\/em><\/strong><\/p>\n<ul>\n<li><span>Vo\u00a0<\/span><strong><em><span>3. vrstve<\/span><\/em><\/strong><span>\u00a0ISO \/ OSI, teda v IP hlavi\u010dke kontroluje:\u00a0<\/span><em><span>IP adresy<\/span><\/em><span>\u00a0,\u00a0<\/span><em><span>protokol<\/span><\/em><span>\u00a0,\u00a0<\/span><em><span>\u00fadaje z ToS<\/span><\/em><span>\u00a0(Type of Service &#8211; prioritu 802.1Q slu\u017ebu).<\/span><\/li>\n<li><span>Vo\u00a0<\/span><strong><em><span>4. vrstve<\/span><\/em><\/strong><span>\u00a0kontroluje v TCP hlavi\u010dke:\u00a0<\/span><em><span>porty a protokoly<\/span><\/em><span>\u00a0, v UDP hlavi\u010dke:\u00a0<\/span><em><span>porty<\/span><\/em><span>\u00a0, v ICMP hlavi\u010dke\u00a0<\/span><em><span>typ spr\u00e1vy<\/span><\/em><span>\u00a0.<\/span><\/li>\n<\/ul>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0Pri vyu\u017e\u00edvan\u00ed \u00fadajov z 4. vrstvy (teda portov) je treba uva\u017eova\u0165 fragmentovan\u00fd prev\u00e1dzku, preto\u017ee pri fragment\u00e1cii iba prv\u00fd paket obsahuje \u00fadaje zo 4. vrstvy.\u00a0M\u00f4\u017eeme vyu\u017ei\u0165 k\u013e\u00fa\u010dov\u00e9 slovo<\/span><code>fragments<\/code><span>v pravidle.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list <em>\u010d\u00edslo {deny | permit} protokol<\/em> {hos\u0165 | source source-wildcard | any} [port] {hos\u0165 | destination destination-wildcard | any} [port]<\/strong> <\/span><\/pre>\n<p><span>Vy\u0161\u0161ie uveden\u00fd z\u00e1pis extended ACL je len zjednodu\u0161en\u00fd, je tu mo\u017en\u00e9 pou\u017ei\u0165 rad \u010fal\u0161\u00edch parametrov a vytvori\u0165 napr\u00edklad dynamick\u00fd ACL \u010di obmedzi\u0165 \u010dasovo platnos\u0165 ACL.<\/span><\/p>\n<p><span>Ako\u00a0<\/span><strong><span>protokol<\/span><\/strong><span>\u00a0je mo\u017en\u00e9 pou\u017ei\u0165 IP, TCP, ICMP, UDP alebo aj rad \u010fal\u0161\u00edch.\u00a0Pod\u013ea zvolen\u00e9ho protokolu sa men\u00ed aj parametre, ktor\u00e9 m\u00f4\u017eeme v ACL pou\u017ei\u0165, napr\u00edklad port je mo\u017en\u00e9 pou\u017ei\u0165 len pri TCP a UDP.<\/span><\/p>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0Ak chceme filtrova\u0165 v\u0161etky protokoly, tak pou\u017eijeme<\/span><strong><span>\u00a0IP<\/span><\/strong><span>\u00a0, ostatn\u00e9 patr\u00ed pod neho.<\/span><\/p>\n<p><span>Obmedzenie na\u00a0<\/span><strong><span>port<\/span><\/strong><span>\u00a0sa zad\u00e1va pomocou oper\u00e1tora, m\u00f4\u017eeme pou\u017ei\u0165 oper\u00e1tory\u00a0<\/span><code>eq<\/code><span>(rovn\u00e1 sa),\u00a0<\/span><code>neq<\/code><span>(nerovn\u00e1),\u00a0<\/span><code>gt<\/code><span>(v\u00e4\u010d\u0161ie ako),\u00a0<\/span><code>lt<\/code><span>(men\u0161ie ako) a\u00a0<\/span><code>range<\/code><span>(rozsah).\u00a0Oper\u00e1tor s portom sa zad\u00e1va za zdrojov\u00fa adresu alebo za cie\u013eov\u00fa adresu a port sa potom aplikuje pri zdroji alebo cie\u013ea.<\/span><\/p>\n<p><span>Treba si dobre premyslie\u0165, kam umiestni\u0165 kontrolu portu (\u010di k zdroju alebo k cie\u013eu), pod\u013ea toho, \u010di aplikujeme ACL ako vstupn\u00e9 alebo v\u00fdstupn\u00e9 (je pop\u00edsan\u00e9 \u010falej).\u00a0Nasleduj\u00faci pr\u00edklad ukazuje dve mo\u017enosti.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list 105 permit tcp 10.1.0.0 0.0.0.255 any eq www<\/strong> \r\nSWITCH (config) # <strong>access-list 105 permit tcp 10.1.0.0 0.0.0.255 eq www any<\/strong><\/span><\/pre>\n<p><strong><em><span>Pr\u00edklad:<\/span><\/em><\/strong><\/p>\n<p><span>ACL \u010d\u00edslo 105 povo\u013euje pr\u00edstup na server 10.5.1.10 odkia\u013eko\u013evek, ale iba na port 80 (teda http) a ping.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list 105 permit tcp any hos\u0165 10.5.1.10 eq 80<\/strong>  \r\nSWITCH (config) # <strong>access-list 105 permit ICMP any any echo<\/strong>  \r\nSWITCH (config) # <strong>access-list 105 permit ICMP any any echo-reply <\/strong>SWITCH ( config) # <strong>access-list 105 deny ip any any<\/strong>  <\/span><\/pre>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><span>\u00a0Posledn\u00e9 pravidlo je defaultn\u00fd a nevklad\u00e1 sa.<\/span><\/p>\n<h4><span>Named ACL &#8211; pomenovan\u00e9 ACL<\/span><\/h4>\n<ul>\n<li><span>m\u00f4\u017eeme ho pou\u017ei\u0165 pre \u0161tandard aj extended ACL<\/span><\/li>\n<li><span>umo\u017e\u0148uje upravova\u0165 \u010di maza\u0165 jednotliv\u00e9 pravidl\u00e1 v ACL<\/span><\/li>\n<li><span>men\u00e1 sa lep\u0161ie pam\u00e4taj\u00fa<\/span><\/li>\n<li><span>m\u00f4\u017eeme pou\u017ei\u0165 &#8222;neobmedzen\u00fd&#8220; po\u010det pomenovan\u00fdch ACL<\/span><\/li>\n<li><span>ako meno m\u00f4\u017eeme pou\u017ei\u0165 aj \u010d\u00edslo, ale to mus\u00ed patri\u0165 do spr\u00e1vneho rozsahu<\/span><\/li>\n<\/ul>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><span>\u00a0Hoci maj\u00fa pomenovan\u00e9 ACL ur\u010dit\u00e9 v\u00fdhody, tak Cisco v niektor\u00fdch materi\u00e1loch odpor\u00fa\u010da sk\u00f4r pou\u017e\u00edva\u0165 be\u017en\u00e9 ACL.\u00a0Pomenovan\u00e1 ACL nejd\u00fa pou\u017ei\u0165 \u00faplne v\u0161ade, ja v\u0161ak s nimi v praxi nemal probl\u00e9m.<\/span><\/p>\n<p><span>Pomenovan\u00e9 ACL sa vytv\u00e1ra in\u00fdm sp\u00f4sobom.\u00a0Najprv vytvor\u00edme ACL a z\u00e1rove\u0148 sa prepneme do\u00a0<\/span><em><strong><span>konfigura\u010dn\u00e9ho ACL m\u00f3du<\/span><\/strong><\/em><span>\u00a0.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>ip access-list {\u0161tandard | extended} meno<\/strong><\/span><\/pre>\n<p><span>\u010ealej zad\u00e1vame jednotliv\u00e9 pravidl\u00e1 pod\u013ea typu ACL a s rovnak\u00fdmi mo\u017enos\u0165ami ako u \u010d\u00edslovan\u00fdch ACL.\u00a0\u010c\u00edslo riadka (na za\u010diatku pr\u00edkazu) je nepovinn\u00e9.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config-ext-nacl) # [\u010d\u00edslo riadka] <strong>permit | deny. <\/strong>..<\/span><\/pre>\n<p><span>Ak si zobraz\u00edme ACL, tak uvid\u00edme, \u017ee jednotliv\u00e9 riadky s\u00fa o\u010d\u00edslovan\u00e9.\u00a0Pomocou t\u00fdchto \u010d\u00edsel m\u00f4\u017eeme pravidl\u00e1 maza\u0165 a nov\u00e9 pravidl\u00e1 m\u00f4\u017eeme vklada\u0165 na ur\u010dit\u00e9 miesto.<\/span><\/p>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0Automatick\u00e1 \u010d\u00edsla riadku sa vytv\u00e1raj\u00fa po desiatkach (prv\u00e9 pravidlo 10, potom 20, 30 &#8230;) a riadky sa \u010d\u00edsluj\u00fa aj u nepomenovan\u00fdch ACL.\u00a0Ak zad\u00e1vame vlastn\u00e9 \u010d\u00edsla, tak tie sa pou\u017eij\u00fa a vid\u00edme je pri zobrazen\u00ed ACL.\u00a0Ak sa v\u0161ak pozrieme do running-config, tak tu tieto \u010d\u00edsla nie s\u00fa a po re\u0161tarte switcha sa automaticky pre\u010d\u00edsluj\u00fa.<\/span><\/p>\n<p><strong><em><span>Pr\u00edklad:<\/span><\/em><\/strong><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>ip access-list extended meno<\/strong>  \r\nSWITCH (config-ext-nacl) # <strong>deny ip 192.168.190.100 0.0.0.1 host 192.168.190.200<\/strong>  \r\nSWITCH (config-ext-nacl) # <strong>permit ip any any<\/strong> <\/span><\/pre>\n<h4><span>Mal\u00e9 rady<\/span><\/h4>\n<ul>\n<li><strong><span>k\u013e\u00fa\u010dov\u00e9 slovo host<\/span><\/strong><span>\u00a0&#8211; miesto\u00a0<\/span><strong><span>10.0.5.2 0.0.0.0<\/span><\/strong><span>\u00a0m\u00f4\u017eeme pou\u017ei\u0165\u00a0<\/span><strong><span>host 10.0.5.2<\/span><\/strong><\/li>\n<li><strong><span>k\u013e\u00fa\u010dov\u00e9 slovo any<\/span><\/strong><span>\u00a0&#8211; miesto\u00a0<\/span><strong><span>0.0.0.0 255.255.255.255<\/span><\/strong><span>\u00a0d\u00e1me\u00a0<\/span><strong><span>any<\/span><\/strong><\/li>\n<li><span>Nemo\u017eno editova\u0165 alebo meni\u0165 poradie v be\u017en\u00fdch ACL, pravidl\u00e1 sa prid\u00e1vaj\u00fa na koniec.\u00a0Ak chceme nie\u010do zmeni\u0165, tak mus\u00edme cel\u00e9 ACL zmaza\u0165 a znova vytvori\u0165.<\/span><\/li>\n<li><span>Pri odstr\u00e1nen\u00ed ACL sa m\u00f4\u017ee sta\u0165, \u017ee ak je st\u00e1le aplikovan\u00e9 na interface, tak sa nahrad\u00ed defaultn\u00fdm z\u00e1kazom v\u0161etk\u00e9ho.\u00a0Spr\u00e1vne by v\u0161ak pri neexistencii ACL malo prech\u00e1dza\u0165 v\u0161etko.<\/span><\/li>\n<\/ul>\n<h3><span>Konfigur\u00e1cia ACL<\/span><\/h3>\n<p><span>Konfigur\u00e1cia ACL sa vykon\u00e1va v dvoch krokoch<\/span><\/p>\n<ul>\n<li><strong><span>vytvorenie ACL<\/span><\/strong><span>\u00a0&#8211; najprv vytvor\u00edme pravidl\u00e1 pod\u013ea typu ACL, vi\u010f.\u00a0predch\u00e1dzaj\u00face odseky<\/span><\/li>\n<li><strong><span>aplik\u00e1cie ACL na rozhranie<\/span><\/strong><span>\u00a0&#8211; n\u00e1sledne mus\u00edme toto ACL priradi\u0165 k nejak\u00e9mu objektu, v tomto pr\u00edpade interfacu, to sa rob\u00ed v\u017edy rovnako<\/span><\/li>\n<\/ul>\n<h4><span>Aplik\u00e1cia ACL<\/span><\/h4>\n<p><span>T\u00fdm, \u017ee aplikujeme ACL na\u00a0<\/span><strong><em><span>interface<\/span><\/em><\/strong><span>\u00a0, tak riadime pr\u00edstup paketov k tomuto interfacu.\u00a0ACL (v rozsahu popisovanom v tomto \u010dl\u00e1nku) m\u00f4\u017eeme aplikova\u0165 na nejak\u00e9 rozhranie, ktor\u00fdm m\u00f4\u017ee by\u0165 port, s\u00e9riov\u00e1 linka, VLAN, a pod.<\/span><\/p>\n<p><span>M\u00f4\u017eeme aplikova\u0165 iba jedno ACL pre interface, smer a protokol.\u00a0Protokolom je myslen\u00e9 IP, IPX, Apple Talk pod. Tak\u017ee napr\u00edklad pre jeden port v TCP \/ IP sieti m\u00f4\u017eeme aplikova\u0165 maxim\u00e1lne dve ACL (jedno vstupn\u00e9 &#8211; inbound a jedno v\u00fdstupn\u00e9 &#8211; outbound).<\/span><\/p>\n<p><span>Pri umiest\u0148ovan\u00ed ACL je treba dobre rozm\u00fd\u0161\u013ea\u0165, aby bolo umiestnenie efekt\u00edvne.\u00a0Pokia\u013e to ide, tak je dobr\u00e9 voli\u0165 \u010do najbli\u017e\u0161ie zdroju, aby nebola za\u0165a\u017eovan\u00e1 sie\u0165.\u00a0M\u00f4\u017eeme v\u0161ak umiest\u0148ova\u0165 ACL iba na zariadenia, ktor\u00e9 kontrolujeme, tak\u017ee \u010dasto je potrebn\u00e9 nastavi\u0165 ACL bl\u00edzko cie\u013ea.<\/span><\/p>\n<p><strong><em><span>Aplik\u00e1cia ACL<\/span><\/em><\/strong><span>\u00a0je jednoduch\u00e1.\u00a0Prepneme sa na dan\u00fd interface a pomocou pr\u00edkazu ip<\/span><code>access-group<\/code><span>nastav\u00edme ACL ur\u010dit\u00e9ho \u010d\u00edsla alebo mena, spolu s ur\u010den\u00edm smeru.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config-if) # <strong>ip access-group {\u010d\u00edslo | meno ACL} {in | out}<\/strong><\/span><\/pre>\n<p class=\"notice\"><strong><em><span>Pozn .:<\/span><\/em><\/strong><span>\u00a0Na ot\u00e1zku jedn\u00e9ho \u010ditate\u013ea som sa do\u010d\u00edtal, \u017ee smer<\/span><strong><span>\u00a0out<\/span><\/strong><span>\u00a0nie je podporovan\u00fd na<\/span><strong><span>\u00a0L2 interface<\/span><\/strong><span>\u00a0(tzn. Portoch), ale iba na L3 (typicky VLAN a routovanie port).\u00a0A to sa t\u00fdka iba L3 (C3750) a vy\u0161\u0161\u00edch switchov, L2 switch (C2960) m\u00e1 iba in ACL.\u00a0Tak\u017ee smer<\/span><strong><span>\u00a0out<\/span><\/strong><span>\u00a0vyu\u017eijeme iba na routeroch a L3 switchoch.\u00a0Pokia\u013e n\u00e1m ide o port ACL a switch, tak mus\u00edme dan\u00fd port previes\u0165 na routovanie, pomocou<\/span><code>no switchport<\/code><span>a nastavenie IP adresy.<\/span><\/p>\n<p><strong><em><span>Pr\u00edklad:<\/span><\/em><\/strong><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>interface Serial0<\/strong>  \r\nSWITCH (config-if) # <\/span><strong><span><span style=\"font-size: 10pt;\">ip access-group 5 i<\/span>n<\/span><\/strong><\/pre>\n<p><strong><span>Ur\u010denie smeru<\/span><\/strong><\/p>\n<p><span>Ur\u010denie smeru, v ktorom m\u00e1 ACL p\u00f4sobi\u0165 nie je zlo\u017eit\u00e9.\u00a0Treba sa pozrie\u0165 na switch, kde ho aplikujeme a rozhodn\u00fa\u0165, \u010di chceme obmedzi\u0165 pakety, ktor\u00e9 z neho odch\u00e1dza (out) alebo hne\u010f na vstupe, tie ktor\u00e9 prich\u00e1dza (in).<\/span><\/p>\n<p><strong><em><span>Standard ACL<\/span><\/em><\/strong><span>\u00a0sa umiest\u0148uje bl\u00edzko cie\u013ea a mal by teda by\u0165 v\u017edy odch\u00e1dzaj\u00face &#8211;<\/span><code>out<\/code><span>.\u00a0Na nasleduj\u00facom obr\u00e1zku obmedzujeme prev\u00e1dzku, ktor\u00fd prich\u00e1dza na server.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-457 size-full\" src=\"http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000544.jpg\" alt=\"\" width=\"341\" height=\"253\" srcset=\"http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000544.jpg 341w, http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000544-300x223.jpg 300w\" sizes=\"(max-width: 341px) 100vw, 341px\" \/><\/p>\n<p><strong><em><span>Extended ACL<\/span><\/em><\/strong><span>\u00a0sa v\u00e4\u010d\u0161inou sna\u017e\u00edme umiestni\u0165 \u010do najbli\u017e\u0161ie k zdroju a v tom pr\u00edpade je filter vstupn\u00e9 &#8211;<\/span><code>in<\/code><span>.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-458 size-full\" src=\"http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000545.jpg\" alt=\"\" width=\"346\" height=\"253\" srcset=\"http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000545.jpg 346w, http:\/\/tech.sosthe.sk\/wp-content\/uploads\/2020\/04\/000545-300x219.jpg 300w\" sizes=\"(max-width: 346px) 100vw, 346px\" \/><\/p>\n<h3><span>Kontrola ACL<\/span><\/h3>\n<p><span>P\u00e1r show pr\u00edkazov pre kontrolu ACL.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH # <strong>show ip interface       <\/strong> \/\/ zobraz\u00ed info interface a je tu vidie\u0165, ak je aplikovan\u00fd ACL \r\nSWITCH # <strong>show access-lists        <\/strong>\/\/ zoznam ACL (IP aj MAC) s pravidlami \r\nSWITCH # <strong>show ip access-lists     <\/strong>\/\/ zoznam IP ACL \r\nSWITCH # <strong>show <\/strong><strong>running-config <\/strong>\/\/ v be\u017eiaci konfigur\u00e1cii s\u00fa take vidie\u0165 ACL aj ich aplik\u00e1cie     <\/span><\/pre>\n<p><span>\u010eal\u0161ou met\u00f3dou pre ladenie ACL je vyu\u017eitie logovanie.\u00a0Ku ka\u017ed\u00e9mu pravidlu m\u00f4\u017eeme na koniec prida\u0165 k\u013e\u00fa\u010dov\u00e9 slovo log a potom s\u00fa logovanie v\u0161etky pakety, ktor\u00e9 splnia toto pravidlo.<\/span><\/p>\n<p><span>Napr\u00edklad ak chceme vidie\u0165 komunik\u00e1ciu, ktor\u00e1 nie je zachyten\u00e1 \u017eiadnym pravidlom v ACL a je teda zak\u00e1zan\u00e1, m\u00f4\u017eeme na koniec prida\u0165 pravidlo<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>access-list 5 deny any log<\/strong> <\/span><\/pre>\n<h3><span>ACL pre VTY<\/span><\/h3>\n<p><span>Mimo fyzick\u00fdch interface (ako s\u00fa porty) m\u00e1me aj virtu\u00e1lne, napr. Virtual Terminal (VTY, kam m\u00f4\u017eeme pristupova\u0165 cez telnet \u010di ssh).\u00a0Na VTY by sme mali aplikova\u0165 iba jedno ACL, aj ke\u010f sa vytv\u00e1ra viac spojen\u00ed pre viac u\u017e\u00edvate\u013eov (preto\u017ee ich nem\u00f4\u017eeme rozli\u0161ova\u0165 &#8211; \u200b\u200bnevieme, cez ktor\u00e9 sa u\u017e\u00edvate\u013e pripoj\u00ed).<\/span><\/p>\n<p><span>ACL pre VTY sa vytv\u00e1raj\u00fa rovnako, ale aplik\u00e1cia sa vykon\u00e1va pomocou pr\u00edkazu\u00a0<\/span><code>access-class<\/code><span>.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>line vty 0 4<\/strong>  \r\nSWITCH (config-line) # <strong>access-class 2 in<\/strong> <\/span><\/pre>\n<h3><span>Named Extended MAC ACL &#8211; pomenovan\u00e9 roz\u0161\u00edren\u00e9 MAC ACL<\/span><\/h3>\n<p><span>Rovnako ako\u00a0<\/span><strong><span>IP ACL<\/span><\/strong><span>\u00a0m\u00f4\u017eeme vytv\u00e1ra\u0165\u00a0<\/span><strong><span>MAC ACL<\/span><\/strong><span>\u00a0, ktor\u00e9 filtruj\u00fa komunik\u00e1ciu pomocou\u00a0<\/span><em><strong><span>MAC adries<\/span><\/strong><\/em><span>\u00a0a pou\u017e\u00edvaj\u00fa sa na interface druhej vrstvy (pod\u013ea OSI modelu).\u00a0Konfigur\u00e1cia a pou\u017eitie je podobn\u00e9.<\/span><\/p>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0M\u00f4\u017eeme pou\u017ei\u0165 bu\u010f<\/span><em><strong><span>\u00a0\u010d\u00edslovan\u00e9 \u0161tandardn\u00e9 MAC ACL<\/span><\/strong><\/em><span>\u00a0(\u010d\u00edsla 700 &#8211; 799),<\/span><em><strong><span>\u00a0o\u010d\u00edslovan\u00e9 roz\u0161\u00edren\u00e9 MAC ACL<\/span><\/strong><\/em><span>\u00a0(\u010d\u00edsla 1100 &#8211; 1199) alebo<\/span><em><strong><span>\u00a0pomenovan\u00e9 roz\u0161\u00edren\u00e9 MAC ACL<\/span><\/strong><\/em><span>\u00a0.\u00a0Na rade switchov je ale k dispoz\u00edcii iba<\/span><em><strong><span>\u00a0pomenovanej roz\u0161\u00edren\u00e9 MAC ACL<\/span><\/strong><\/em><span>\u00a0.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>mac access-list extended jmeno<\/strong><\/span><\/pre>\n<p><span>T\u00fdm prejdeme do\u00a0<\/span><em><strong><span>extended MAC access-list<\/span><\/strong><\/em><span>\u00a0konfigura\u010dn\u00e9ho m\u00f3du, kde definujeme jednotliv\u00e9 pravidl\u00e1.<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config-ext-Maclou) # [\u010d\u00edslo riadka] <strong>{deny | permit} {hos\u0165 source MAC | source MAC mask | any} {hos\u0165 destination MAC | destination MAC mask | any}<\/strong><\/span><\/pre>\n<p class=\"notice\"><em><strong><span>Pozn .:<\/span><\/strong><\/em><span>\u00a0Vy\u0161\u0161ie uveden\u00e9 pravidlo m\u00f4\u017ee obsahova\u0165 i rad volite\u013en\u00fdch parametrov, ktor\u00e9 ur\u010duj\u00fa napr\u00edklad EtherType alebo COS.<\/span><\/p>\n<p><strong><em><span>Pr\u00edklad:<\/span><\/em><\/strong><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config) # <strong>mac access-list extended test<\/strong>  \r\nSWITCH (config-ext-Maclou) # <strong>permit hos\u0165 0000.1111.2222 any <\/strong>\r\nSWITCH (config-ext-Maclou) # <strong>deny any any<\/strong><\/span><\/pre>\n<p><em><strong><span>MAC ACL<\/span><\/strong><\/em><span>\u00a0sa aplikuje na interface 2. vrstvy a m\u00f4\u017eeme aplikova\u0165 iba jeden MAC ACL na interface.\u00a0Aplik\u00e1cia m\u00f4\u017ee by\u0165 len na vstupe (in).\u00a0Pre aplik\u00e1ciu sl\u00fa\u017ei pr\u00edkaz:<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH (config-if) # <strong>mac access-group meno-ACL in<\/strong><\/span><\/pre>\n<p><span>Pre zobrazenie aplik\u00e1cie MAC ACL na porty m\u00f4\u017eeme pou\u017ei\u0165 pr\u00edkaz:<\/span><\/p>\n<pre><span style=\"font-size: 10pt;\">SWITCH # <strong>show mac access-group<\/strong><\/span><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Access Control List\u00a0(\u010falej len ACL) je zoznam pravidiel, ktor\u00e9 riadi pr\u00edstup k nejak\u00e9mu objektu.\u00a0ACL s\u00fa pou\u017e\u00edvan\u00e9 v rade aplik\u00e1ci\u00ed, \u010dasto u akt\u00edvnych sie\u0165ov\u00fdch prvkov, ale&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":431,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/pages\/456"}],"collection":[{"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":1,"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/pages\/456\/revisions"}],"predecessor-version":[{"id":459,"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/pages\/456\/revisions\/459"}],"up":[{"embeddable":true,"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/pages\/431"}],"wp:attachment":[{"href":"http:\/\/tech.sosthe.sk\/index.php\/wp-json\/wp\/v2\/media?parent=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}