SlideShare a Scribd company logo
R E F L E X I V E
A C C E S S
L I S T S
W W W. N E T P R OTO CO L X P E R T. I N
• Reflexive Access Lists are used to allow IP traffic for sessions that
originates from inside the network, and deny IP traffic that originates
from outside the network.
• They seem to be somehow similar to Standard or Extended ACLs
that use established keyword to filter traffic based on session, but
actually are different. By using established keyword you can filter only
TCP sessions but with Reflexive Access Lists you can filter TCP sessions,
UDP, ICMP and so on.
• Reflexive ACLs should be configured on border routers, that separates
internal network from external.
• You can apply Reflexive ACL on an internal or external interface,
depending on your network requirements.
HOW AN REFLEXIVE ACCESS LIST WORKS
• When an IP upper layer session (for example ICMP, TCP, UDP) is started from
inside the network to outside the network, Reflexive Access List generates a
temporary entry that will allow traffic (that is part of current initiated session)
coming from outside to get in.
• The temporary added entry will be removed after the last packet of the session
comes in or when a configured timeout timer expires. Reflexive ACLs can’t be
applied directly on interface, they are “nested” in an Extended Named ACL that
is applied to interface.
• Reflexive Access Lists can be attached only to Extended Named IP ACLs.
• In the topology you can see Local router which is part of internal network,
Border router that separates internal and external network, and Remote router
that is part of external network.
• Reflexive ACL will be configured on Border router and applied to fa 0/1
interface. we have preconfigured interfaces according to topology and a
default route added on Local and Remote router to send all unknown traffic to
Border router.
PING TEST BETWEEN LOCAL AND BORDER ROUTER
Local
• Local#ping 192.168.0.2
• Type escape sequence to abort.
• Sending 5, 100-byte ICMP Echos to 192.168.0.2, timeout is 2 seconds:
• !!!!!
• Success rate is 100 percent (5/5), round-trip min/avg/max = 24/42/88 ms
• Local#
Remote
• Remote#ping 10.0.0.2
• Type escape sequence to abort.
• Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
• !!!!!
• Success rate is 100 percent (5/5), round-trip min/avg/max = 20/45/112 ms
• Remote#
• At this point we can ping Remote from Local and vice versa. After we apply
Reflexive Access List on Border router, the only successful ping should be from
Local to Remote router.
Border
• ip access-list extended OUTFILTER
• permit icmp any any reflect ICMPFILTER timeout 300
• interface FastEthernet0/1
• ip access-group OUTFILTER out
• Configuration of ACL is done in global configuration mode. This ACL analyze
traffic that goes from inside to outside the network.
• The entry “permit icmp any any reflect ICMPFILTER timeout 300” will add
an temporary Reflexive Access List entry when it is matched (The Reflexive ACL
name in this case will be ICMPFILTER), and will be removed when all packets of
this session are returned or when timeout timer expires (300 seconds in this
case).
• This ACL is applied as outbound. For packets coming from outside, an inbound
ACL will be applied, that will evaluate packets against temporary entry.
• ip access-list extended INFILTER
• evaluate ICMPFILTER
• interface FastEthernet0/1
• ip access-group INFILTER in
• Second ACL is applied as inbound and evaluates packets according to
temporary generated Reflexive ACL’s entry
• Border#show ip access-lists
• Reflexive IP access list ICMPFILTER
• Extended IP access list INFILTER
• 10 evaluate ICMPFILTER
• Extended IP access list OUTFILTER
• 10 permit icmp any any reflect ICMPFILTER
• Border#
• Local#ping 192.168.0.2
• Type escape sequence to abort.
• Sending 5, 100-byte ICMP Echos to 192.168.0.2, timeout is 2 seconds:
• !!!!!
• Success rate is 100 percent (5/5), round-trip min/avg/max = 20/36/68 ms
• Border#show ip access-lists
• Reflexive IP access list ICMPFILTER
• permit icmp host 192.168.0.2 host 10.0.0.2 (10 matches) (time left 297)
• Extended IP access list INFILTER
• 10 evaluate ICMPFILTER
• Extended IP access list OUTFILTER
• 10 permit icmp any any reflect ICMPFILTER (6 matches)
• Now you can see temporary generated entry, which is highlighted with red. One more thing
we should do is to check if sessions initiated from outside are denied. We can check this
with a ping from Remote to Local
• Remote#ping 10.0.0.2
• Type escape sequence to abort.
• Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds:
• UUUUU
• Success rate is 0 percent (0/5)
• The results are as expected. For protocols such as ICMP or UDP (which are
connectionless protocols) the temporary entry is removed when timeout timer
expires, but for TCP ( which is connection oriented protocol and keeps track of
session state), temporary entry is removed after TCP session ends.
FOLLOW US ON
https://www.facebook.com/N
etProtocolXpert/
https://www.linkedin.com/c
ompany/netprotocol-xpert
https://plus.google.com/u/
0/collection/AYQ-EB
https://www.instagram.com/
netprotocol_xpert/
https://twitter.com/NPX_cisco
https://branded.me/netprot
ocolxpert

More Related Content

PPTX
Dynamic Access List
PPTX
IPv6 Static Routes
PPTX
IPv6 DHCP
PDF
FreeSWITCH on Docker
PDF
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
PDF
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
PDF
Using GTP on Linux with libgtpnl
PDF
Introduction to RPKI
Dynamic Access List
IPv6 Static Routes
IPv6 DHCP
FreeSWITCH on Docker
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Using GTP on Linux with libgtpnl
Introduction to RPKI

What's hot (20)

PDF
EIGRP (enhanced interior gateway routing protocol)
PDF
EtherChannel
PPT
Exploration Routing Chapter 4
PPT
VLSM (1).ppt
PDF
Layer 3 redundancy hsrp
PDF
Bgp route reflector
PPT
Arp spoofing
PPTX
Border Gateway Protocol (BGP)
PDF
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 11
PDF
IPV6 Hands on Lab
PPTX
Cisco router basic
PDF
Iperf Tutorial
PDF
Kamailio - Secure Communication
PDF
PDF
CCN3Switching_lab_5_5_2
PDF
DDoS Mitigation using BGP Flowspec
PPTX
IPSec and VPN
PPTX
FreeSWITCH as a Kickass SBC
EIGRP (enhanced interior gateway routing protocol)
EtherChannel
Exploration Routing Chapter 4
VLSM (1).ppt
Layer 3 redundancy hsrp
Bgp route reflector
Arp spoofing
Border Gateway Protocol (BGP)
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
CCNA 2 Routing and Switching v5.0 Chapter 11
IPV6 Hands on Lab
Cisco router basic
Iperf Tutorial
Kamailio - Secure Communication
CCN3Switching_lab_5_5_2
DDoS Mitigation using BGP Flowspec
IPSec and VPN
FreeSWITCH as a Kickass SBC
Ad

Viewers also liked (13)

PPTX
Regular expression examples
PPTX
Types of interfaces in a Cisco Router
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
PPTX
OTV Configuration
PPTX
IP Source Guard
PPTX
Dynamic ARP Inspection (DAI)
PPTX
Regular expressions
PPTX
Regular Expression
PPTX
Converting ipv4 to ipv6 and vice versa
PPTX
Regular expression (compiler)
PPTX
Password recovery cisco catalyst 3850
KEY
Regular Expressions 101
PPTX
Comiler construction Notes
Regular expression examples
Types of interfaces in a Cisco Router
TCLSH and Macro Ping Test on Cisco Routers and Switches
OTV Configuration
IP Source Guard
Dynamic ARP Inspection (DAI)
Regular expressions
Regular Expression
Converting ipv4 to ipv6 and vice versa
Regular expression (compiler)
Password recovery cisco catalyst 3850
Regular Expressions 101
Comiler construction Notes
Ad

Similar to Reflexive Access List (20)

DOCX
CIsco ACL- Network and host security
PDF
IRJET - Implementation of Network Security and Traffic Filtering using Access...
DOC
Enterprise Network Manager: the Router-On-A-stick
PPTX
Time Based ACL
PPT
CCNP 642-732 Training
PPT
CCNA Security 09- ios firewall fundamentals
PDF
Access List in Networks
PPTX
Standard Access List
PPT
redes telematicas CISCO para ingenieros parte 2
PDF
Ch4-Implementing Firewall Technologies.pdf
PPT
Chapter 4 overview
PPT
CCNA Security - Chapter 4
DOCX
1 SEC450 ACL Tutorial This document highlights.docx
PPT
Chapter10ccna
PDF
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
PDF
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
PDF
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
PDF
Modul 5 access control list
PDF
Ccna rse chp7 Access Control List (ACL)
PDF
1. Task In this assignment you are asked to provide named.pdf
CIsco ACL- Network and host security
IRJET - Implementation of Network Security and Traffic Filtering using Access...
Enterprise Network Manager: the Router-On-A-stick
Time Based ACL
CCNP 642-732 Training
CCNA Security 09- ios firewall fundamentals
Access List in Networks
Standard Access List
redes telematicas CISCO para ingenieros parte 2
Ch4-Implementing Firewall Technologies.pdf
Chapter 4 overview
CCNA Security - Chapter 4
1 SEC450 ACL Tutorial This document highlights.docx
Chapter10ccna
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
Modul 5 access control list
Ccna rse chp7 Access Control List (ACL)
1. Task In this assignment you are asked to provide named.pdf

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
MPLS Layer 3 VPN
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPTX
Storm-Control
PPTX
DHCP Snooping
PPTX
Password Recovery
PPTX
Application & Data Center
PPTX
Cisco ISR 4351 Router
PPTX
Cisco ASR 1001-X Router
PPTX
Securing management, control & data plane
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
Avoid DNS lookup when mistyping a command
PPTX
Private VLANs
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
PPTX
Cisco OTV 
PPTX
OTV(Overlay Transport Virtualization)
PPTX
Eigrp is restricted to stub connections
PPTX
Cisco 2960x switch password recovery
PPTX
VMware ESXi 6.0 Installation Process
PPTX
EtherChannel Configuration
Basic Cisco ASA 5506-x Configuration (Firepower)
MPLS Layer 3 VPN
Common Layer 2 Threats, Attacks & Mitigation
Storm-Control
DHCP Snooping
Password Recovery
Application & Data Center
Cisco ISR 4351 Router
Cisco ASR 1001-X Router
Securing management, control & data plane
Point to-point protocol (ppp), PAP & CHAP
Avoid DNS lookup when mistyping a command
Private VLANs
MTU (maximum transmission unit) & MRU (maximum receive unit)
Cisco OTV 
OTV(Overlay Transport Virtualization)
Eigrp is restricted to stub connections
Cisco 2960x switch password recovery
VMware ESXi 6.0 Installation Process
EtherChannel Configuration

Recently uploaded (20)

DOCX
573137875-Attendance-Management-System-original
PPT
Mechanical Engineering MATERIALS Selection
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
UNIT 4 Total Quality Management .pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Current and future trends in Computer Vision.pptx
PDF
composite construction of structures.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
573137875-Attendance-Management-System-original
Mechanical Engineering MATERIALS Selection
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
UNIT 4 Total Quality Management .pptx
R24 SURVEYING LAB MANUAL for civil enggi
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding
Automation-in-Manufacturing-Chapter-Introduction.pdf
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
Embodied AI: Ushering in the Next Era of Intelligent Systems
Safety Seminar civil to be ensured for safe working.
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Current and future trends in Computer Vision.pptx
composite construction of structures.pdf
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)

Reflexive Access List

  • 1. R E F L E X I V E A C C E S S L I S T S W W W. N E T P R OTO CO L X P E R T. I N
  • 2. • Reflexive Access Lists are used to allow IP traffic for sessions that originates from inside the network, and deny IP traffic that originates from outside the network. • They seem to be somehow similar to Standard or Extended ACLs that use established keyword to filter traffic based on session, but actually are different. By using established keyword you can filter only TCP sessions but with Reflexive Access Lists you can filter TCP sessions, UDP, ICMP and so on. • Reflexive ACLs should be configured on border routers, that separates internal network from external. • You can apply Reflexive ACL on an internal or external interface, depending on your network requirements.
  • 3. HOW AN REFLEXIVE ACCESS LIST WORKS • When an IP upper layer session (for example ICMP, TCP, UDP) is started from inside the network to outside the network, Reflexive Access List generates a temporary entry that will allow traffic (that is part of current initiated session) coming from outside to get in. • The temporary added entry will be removed after the last packet of the session comes in or when a configured timeout timer expires. Reflexive ACLs can’t be applied directly on interface, they are “nested” in an Extended Named ACL that is applied to interface. • Reflexive Access Lists can be attached only to Extended Named IP ACLs.
  • 4. • In the topology you can see Local router which is part of internal network, Border router that separates internal and external network, and Remote router that is part of external network. • Reflexive ACL will be configured on Border router and applied to fa 0/1 interface. we have preconfigured interfaces according to topology and a default route added on Local and Remote router to send all unknown traffic to Border router.
  • 5. PING TEST BETWEEN LOCAL AND BORDER ROUTER Local • Local#ping 192.168.0.2 • Type escape sequence to abort. • Sending 5, 100-byte ICMP Echos to 192.168.0.2, timeout is 2 seconds: • !!!!! • Success rate is 100 percent (5/5), round-trip min/avg/max = 24/42/88 ms • Local#
  • 6. Remote • Remote#ping 10.0.0.2 • Type escape sequence to abort. • Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds: • !!!!! • Success rate is 100 percent (5/5), round-trip min/avg/max = 20/45/112 ms • Remote# • At this point we can ping Remote from Local and vice versa. After we apply Reflexive Access List on Border router, the only successful ping should be from Local to Remote router.
  • 7. Border • ip access-list extended OUTFILTER • permit icmp any any reflect ICMPFILTER timeout 300 • interface FastEthernet0/1 • ip access-group OUTFILTER out • Configuration of ACL is done in global configuration mode. This ACL analyze traffic that goes from inside to outside the network. • The entry “permit icmp any any reflect ICMPFILTER timeout 300” will add an temporary Reflexive Access List entry when it is matched (The Reflexive ACL name in this case will be ICMPFILTER), and will be removed when all packets of this session are returned or when timeout timer expires (300 seconds in this case). • This ACL is applied as outbound. For packets coming from outside, an inbound ACL will be applied, that will evaluate packets against temporary entry.
  • 8. • ip access-list extended INFILTER • evaluate ICMPFILTER • interface FastEthernet0/1 • ip access-group INFILTER in • Second ACL is applied as inbound and evaluates packets according to temporary generated Reflexive ACL’s entry
  • 9. • Border#show ip access-lists • Reflexive IP access list ICMPFILTER • Extended IP access list INFILTER • 10 evaluate ICMPFILTER • Extended IP access list OUTFILTER • 10 permit icmp any any reflect ICMPFILTER • Border#
  • 10. • Local#ping 192.168.0.2 • Type escape sequence to abort. • Sending 5, 100-byte ICMP Echos to 192.168.0.2, timeout is 2 seconds: • !!!!! • Success rate is 100 percent (5/5), round-trip min/avg/max = 20/36/68 ms • Border#show ip access-lists • Reflexive IP access list ICMPFILTER • permit icmp host 192.168.0.2 host 10.0.0.2 (10 matches) (time left 297) • Extended IP access list INFILTER • 10 evaluate ICMPFILTER • Extended IP access list OUTFILTER • 10 permit icmp any any reflect ICMPFILTER (6 matches) • Now you can see temporary generated entry, which is highlighted with red. One more thing we should do is to check if sessions initiated from outside are denied. We can check this with a ping from Remote to Local
  • 11. • Remote#ping 10.0.0.2 • Type escape sequence to abort. • Sending 5, 100-byte ICMP Echos to 10.0.0.2, timeout is 2 seconds: • UUUUU • Success rate is 0 percent (0/5) • The results are as expected. For protocols such as ICMP or UDP (which are connectionless protocols) the temporary entry is removed when timeout timer expires, but for TCP ( which is connection oriented protocol and keeps track of session state), temporary entry is removed after TCP session ends.