NAME

Cisco::ACL - generate access control lists for Cisco IOS

SYNOPSIS

  use Cisco::ACL;
  my $acl = Cisco::ACL->new(
    permit   => 1,
    src_addr => '10.1.1.1/24',
    dst_addr => '10.1.2.1/24',
  );
  print "$_\n" for( $acl->acls );

DESCRIPTION

Cisco::ACL is a module to create cisco-style access lists. IOS uses a wildcard syntax that is almost but not entirely unlike netmasks, but backwards (at least that's how it has always seemed to me).

This module makes it easy to think in CIDR but emit IOS-compatible access lists.

CONSTRUCTOR

To construct a Cisco::ACL object, call the new method. The following optional arguments can be passed as a hash of key/val pairs:

  • permit

    A boolean value indicating that this ACL is a permit ACL. If not provided, defaults to true.

  • deny

    The opposite of permit. The value must be true in Perl's eyes.

  • established

    A boolean value indicating that this ACL should only allow established packets. If not provided, defaults to false.

  • src_addr

    The source address in CIDR format. May be a single scalar or an arrayref of addresses. See "src_addr()" for more details. If not provided, defaults to 'any'.

  • src_port

    The source port. May be a single scalar or an arrayref of ports or port ranges. If not provided, defaults to 'any'.

  • dst_addr

    The destination address in CIDR format. May be a single scalar or an arrayref of addresses. See "src_addr()" for more details on address format. If not provided, defaults to 'any'.

  • dst_port

    The destination port. May be a single scalar or an arrayref of ports or port ranges. If not provided, defaults to 'any'.

  • protocol

    The protocol. If not provided, defaults to 'tcp'.

ACCESSORS

A Cisco::ACL object has several accessor methods which may be used to get or set the properties of the object. These accessors are generated by Class::MethodMaker - for more information see Class::MethodMaker. The C::MM type of accessor is in brackets following the accessor name.

permit() [boolean]

A boolean accessor, it returns 1 or 0 depending on whether the object represents a 'permit' rule or a 'deny' rule. Passing a true value to the accessor sets it to 1.

There are also clear_permit() and set_permit() methods which set the property without requiring an explicit argument.

established() [boolean]

A boolean accessor, it returns 1 or 0 depending on whether the object represents a rule which should only allow established sessions or not. Passing a true value sets it to 1.

src_addr() [list]

A list of source addresses, returned as an arrayref in scalar context and an array in list context. Passing an argument replaces the entire content of the list. If you want to add an address to the list, use src_addr_push.

Source and destination addresses may be specified in any combination of three syntaxes: a single IP address, a range of addresses in the format a.a.a.a-b.b.b.b or a.a.a.a-b, or a CIDR block in the format x.x.x.x/nn. Use the word "any" to specify all addresses. For example, all of the following are legal:

  10.10.10.20
  10.10.10.10-200
  20.20.20.20-30.30.30.30
  10.10.10.20
  10.10.10.10-200
  10.10.10.10/8
  45.45.45.45 

Multiple entries may be passed to the accessor functions.

There are also src_addr_pop(), src_addr_shift(), src_addr_unshift(), src_addr_unsplice(), src_addr_clear(), src_addr_count(), src_addr_index() and src_addr_set() methods which perform the familiar array operations on the list of addresses.

src_port() [list]

A list of source ports or source port ranges. A range of ports is denoted as two port numbers joined by a -. The same methods as src_addr() (renamed) are also available.

dst_addr() [list]

As with src_addr(), but for destination addresses.

dst_port() [list]

As with src_port(), but for destination ports.

protocol() [get_set]

If you have Class::MethodMaker v1.xx installed, the object will only have the accessor methods described above. If you have Class::MethodMaker v2.xx installed then there will be more accessor methods. Only the accessor methods documented here are officially supported and tested.

METHODS

acls()

Generates the access lists and returns then as an array in list context or an arrayref in scalar context.

reset()

Resets all of the ACL values. Useful if you want to construct an object, generate an ACL and then re-use the same object for a completely different ACL rather than one which is incrementally different.

Resetting an ACL object:

  • clears the permit, established and protocol attributes.

  • empties the source and destination ports and address attribute lists.

EXAMPLES

To create an access list that allows traffic from 192.168.0.1 with any source port to any host on the class B network 10.1.1.1/16 with a destination port of 21937:

  my $acl = Cisco::ACL->new(
    src_addr => '192.168.0.1',
    dst_addr => '10.1.1.1/16',
    dst_port => 21937,
  );
  print "$_\n" for( $acl->acls );

To create an access list that will deny all traffic (regardless of whether it is TCP or UDP) to or from 24.223.251.222:

  my $acl = Cisco::ACL->new(
    src_addr => '24.223.251.222',
    protocol => 'ip',
  );
  print "$_\n" for( $acl->acls );
  $acl->src_addr_clear;
  $acl->dst_addr( '24.223.251.222' );
  print "$_\n" for( $acl->acls );

Using multiple addresses and/or ports: permit SSH and SFTP traffic from 192.168.1.1/25 and 10.1.1.1/26 to anywhere.

  my $acl = Cisco::ACL->new(
    src_addr => [ '192.168.1.1/25', '10.1.1.1/26' ],
    dst_port => [ 22, 25 ],
  );
  print "$_\n" for( $acl->acls );

Using the established parameter, permit any sessions which are already established.

  my $acl = Cisco::ACL->new( established => 1 );
  print "$_\n" for( $acl->acls );

BUGS

These are the known limitations from the original acl.pl. I hope to address these in the near future.

  • Address Ranges Ordering

    Address ranges must be supplied in ascending order, e.g. 10.10.10.10-10.10.20.20. If you use 10.10.20.20-10.10.10.10 it won't handle that.

  • Permit/Deny in one rule

    Currently there is no way to specify a combination of permit and deny rules in the same ACL. Generate them separately and edit them together by hand.

    This may or may not be addressed based upon feedback received from CPAN users. With a web app this bug is an annoyance, but in a program that can have two distinct ACL objects, one for permit and one for deny it becomes less of a problem.

TODO

The initial version of this module is pretty much an OO wrapper around Chris' original code. Future plans include (hopefully in order of implementation):

  • use CPAN modules where possible

    The original code did all it's own CGI processing - I'd like to move to CGI.pm instead.

  • refactor mercilessly

    I want to build up the test suite to a fair size and then start looking for places to make things cleaner, faster, smaller, etc.

  • make sure that everything produced is up-to-date with IOS

    It's been a while since I've had to play with a Cisco, so what I know might not be totally up to date with the latest software revs.

SEE ALSO

This distribution includes aclmaker.pl, a simple CGI frontend to Cisco::ACL.

If you need a more generic framework for ACLs, take a look at Net::ACL by Martin Lorensen.

AUTHOR

James FitzGibbon, <jfitz@CPAN.org>.

ORIGINAL AUTHOR

The code in this module started life as acl.pl, a CGI script written by Chris De Young (chd AT chud DOT net). I was about to embark on writing a module to do this from scratch when I stumbed across his web version, which was procedural. He graciously accepted my offer to OOP-ize the code. Any mistakes in this module are probably mine.

CONTRIBUTORS

Nicolas Georgel contribued changes to implement Cisco's port range syntax and to allow for port numbers to be specified in reverse order (highest first).

COPYRIGHT

This module is free software. You may use and/or modify it under the same terms as perl itself.