{"id":349,"date":"2015-08-06T21:44:10","date_gmt":"2015-08-06T21:44:10","guid":{"rendered":"https:\/\/learncisco.net\/index.php\/data-plane-security-controls\/"},"modified":"2023-01-19T20:20:41","modified_gmt":"2023-01-19T13:20:41","slug":"data-plane-security-controls","status":"publish","type":"page","link":"https:\/\/www.learncisco.net\/courses\/iins\/security-on-cisco-routers\/data-plane-security-controls.html","title":{"rendered":"Data Plane Security Controls"},"content":{"rendered":"

One of our most basic and fundamental protections for the data plane is an interface ACL \u2013 an access control list that’s applied in a certain direction \u2013 inbound or outbound, ingress or egress \u2013 on an interface to block unwanted traffic or to block particular users. This will help us mitigate against denial-of-service attacks, it’s an antispoofing mechanism as well. We can also use ACLs to provide bandwidth control, and we can classify the traffic to protect other planes. So we can use the interface ACL to control access to VTY lines for management, that would be reducing the attack surface is what we call that, or we can restrict the content of routing updates, that can help protect the control plane.<\/p>\n

Here is a list with the most common use cases of the ACLs:<\/p>\n