Skip to content

ACLs

ACLs are executable policy in netverdict. They are used for interface filters, flow search, firewall inputs, and route/policy analysis where packet-like matching is required.

AreaLevelNotes
IPv4 standard ACLsSupportedSource-only matching.
IPv4 extended ACLsSupportedProtocol, source/destination, ports, ranges, established-style flags where implemented.
IPv6 ACLsSupportedNamed IPv6 ACLs and interface traffic filters.
Object groupsSupportedNetwork and service object groups in ACL evaluation.
Time rangesSupportedACL entries can be active only during configured simulation time.
Flow searchSupportedACL evaluator is used by reachability search.
StandardCoverageNotes
Cisco IOS ACL semanticsBehaviour modelOrdered first-match permit/deny with implicit deny.
IPv6 ACL semanticsBehaviour modelIPv6 prefix/protocol/port matching.
FeatureStatusNotes
Numbered ACLSupportedStandard and extended ranges.
Numbered standard wildcard formSupportedaccess-list 10 permit 10.10.0.0 0.0.255.255.
Named ACLSupportedIPv4 and IPv6.
permit / denySupportedOrdered rule evaluation.
Protocol matchSupportedIP, TCP, UDP, ICMP, and common aliases.
Port operatorsSupportedeq, neq, lt, gt, range where parsed.
Object-group referencesSupportedNetwork and service groups.
Time-range referencesSupportedActive/inactive rule gating.
Interface bindingSupportedInbound/outbound direction.
LoggingConfig modelParsed/stored; syslog side effects are limited.
CommandIOS-styleJunos-styleVyOS-styleNotes
access-list 10 permit 10.0.0.0 0.0.0.255Supportedn/aPartialStandard IPv4 ACL.
access-list 10 permit 10.10.0.0 0.0.255.255Supportedn/an/aIOS/IOS-XE wildcard form is command-tree backed.
ip access-list extended WEBSupportedn/aPartialNamed extended ACL.
ipv6 access-list V6-INSupportedn/aPartialIPv6 ACL.
object-group network SERVERSSupportedn/aPartialObject group.
time-range WORKHOURSSupportedn/an/aTime-gated entries.
ip access-group WEB inSupportedn/aPartialInterface binding.
show access-listsSupportedPartialPartialACL view.

Evaluation is strictly ordered. The first matching ACE decides the result, and an implicit deny remains at the end. That rule is intentionally visible in flow search results because hidden policy failures are painful to debug.

Canonical example
configure terminal
ip access-list extended WEB-IN
permit tcp 10.0.0.0 0.0.0.255 host 192.0.2.10 eq 443
deny ip any any
interface GigabitEthernet0/0
ip access-group WEB-IN in
end
show access-lists

Vendor styles

IOS-style
ip access-list extended WEB-IN
permit tcp 10.0.0.0 0.0.0.255 host 192.0.2.10 eq 443
interface GigabitEthernet0/0
ip access-group WEB-IN in
Junos-style
set firewall family inet filter WEB-IN term allow-web from source-address 10.0.0.0/24
set firewall family inet filter WEB-IN term allow-web from destination-address 192.0.2.10/32
set firewall family inet filter WEB-IN term allow-web from destination-port 443
set firewall family inet filter WEB-IN term allow-web then accept
VyOS-style
set firewall ipv4 name WEB-IN rule 10 action accept
set firewall ipv4 name WEB-IN rule 10 protocol tcp
set firewall ipv4 name WEB-IN rule 10 destination port 443
set interfaces ethernet eth0 firewall in name WEB-IN

Reflexive ACLs, dynamic ACL lock-and-key, full logging side effects, and every vendor parser variant are not implemented.