ACLs are ordered lists of permit/deny statements. The router checks each statement top-down and acts on the first match. An implicit deny any is always at the end.
A 0 bit = must match. A 1 bit = don't care (any value). Calculate as: 255.255.255.255 − subnet mask.
/28 mask 255.255.255.240 → wildcard 0.0.0.15
/30 mask 255.255.255.252 → wildcard 0.0.0.3
| Shorthand | Wildcard | Meaning |
|---|---|---|
host 10.1.1.1 | 0.0.0.0 | Exact single host |
any | 255.255.255.255 | Any IP address |
10.1.1.0 0.0.0.255 | 0.0.0.255 | Entire /24 subnet |
172.16.0.0 0.0.255.255 | 0.0.255.255 | Entire /16 range |
NAT translates private IPs to public IPs. PAT (Port Address Translation / NAT Overload) maps many private IPs to a single public IP using unique port numbers.
Limits which MAC addresses can connect to a switch port. Violation actions: protect, restrict, shutdown (default).
DAI (Dynamic ARP Inspection): Validates ARP packets using the DHCP Snooping binding table — prevents ARP spoofing.
ACEs (Access Control Entries) are evaluated top-down, first match wins. The moment a packet matches an ACE the action is taken and evaluation stops. Every ACL ends with an implicit deny any — if no ACE matches, the packet is dropped. Always add a permit before the end if you want any traffic through.
noNAT translates private RFC 1918 addresses to routable public addresses. PAT (also called NAT overload) is most common in SOHO and enterprise edge — it maps thousands of inside hosts to a single public IP using unique port numbers.
| Type | Mapping | Use Case | Public IPs Needed |
|---|---|---|---|
| Static NAT | 1 private → 1 public (fixed) | Servers that need consistent inbound access | One per host |
| Dynamic NAT | 1 private → 1 public (from pool) | Many hosts, limited public IPs (no overload) | Pool of addresses |
| PAT / Overload | Many private → 1 public (port-based) | Typical enterprise/home internet access | One address |
SSH encrypts management traffic (Telnet is cleartext — always replace it). 802.1X enforces identity-based access control at the switch port level using EAP and a RADIUS server.
Security & ACL Drills
Multiple choice questions on ACLs, NAT, and Layer 2 security.
Packet Tracer Labs
Step-by-step security configuration walkthroughs.
Security Topology Diagrams
Security Cheatsheet
eq, lt, gt, range operatorsInteractive Calculators
Tools for ACL wildcard mask calculations.
permit ip 192.168.1.0 0.0.0.255
Topic Checklist
Track your progress through security concepts.