Cisco::ACL - generate access control lists for Cisco IOS
use Cisco::ACL; my $acl = Cisco::ACL->new( permit => 1, src_addr => '10.1.1.1/24', dst_addr => '10.1.2.1/24', ); print "$_\n" for( $acl->acls );
Cisco::ACL is a module to create cisco-style access lists. IOS uses a wildcard syntax that is almost but not entirely unlike netmasks, but backwards (at least that's how it has always seemed to me).
This module makes it easy to think in CIDR but emit IOS-compatible access lists.
To construct a Cisco::ACL object, call the new method. The following optional arguments can be passed as a hash of key/val pairs:
A boolean value indicating that this ACL is a permit ACL. If not provided, defaults to true.
The opposite of permit. The value must be true in Perl's eyes.
A boolean value indicating that this ACL should only allow established packets. If not provided, defaults to false.
The source address in CIDR format. May be a single scalar or an arrayref of addresses. See "src_addr()" for more details. If not provided, defaults to 'any'.
The source port. May be a single scalar or an arrayref of ports or port ranges. If not provided, defaults to 'any'.
The destination address in CIDR format. May be a single scalar or an arrayref of addresses. See "src_addr()" for more details on address format. If not provided, defaults to 'any'.
The destination port. May be a single scalar or an arrayref of ports or port ranges. If not provided, defaults to 'any'.
The protocol. If not provided, defaults to 'tcp'.
A Cisco::ACL object has several accessor methods which may be used to get or set the properties of the object. These accessors are generated by Class::MethodMaker - for more information see Class::MethodMaker. The C::MM type of accessor is in brackets following the accessor name.
A boolean accessor, it returns 1 or 0 depending on whether the object represents a 'permit' rule or a 'deny' rule. Passing a true value to the accessor sets it to 1.
There are also clear_permit() and set_permit() methods which set the property without requiring an explicit argument.
A boolean accessor, it returns 1 or 0 depending on whether the object represents a rule which should only allow established sessions or not. Passing a true value sets it to 1.
A list of source addresses, returned as an arrayref in scalar context and an array in list context. Passing an argument replaces the entire content of the list. If you want to add an address to the list, use src_addr_push.
Source and destination addresses may be specified in any combination of three syntaxes: a single IP address, a range of addresses in the format a.a.a.a-b.b.b.b or a.a.a.a-b, or a CIDR block in the format x.x.x.x/nn. Use the word "any" to specify all addresses. For example, all of the following are legal:
10.10.10.20 10.10.10.10-200 22.214.171.124-126.96.36.199 10.10.10.20 10.10.10.10-200 10.10.10.10/8 188.8.131.52
Multiple entries may be passed to the accessor functions.
There are also src_addr_pop(), src_addr_shift(), src_addr_unshift(), src_addr_unsplice(), src_addr_clear(), src_addr_count(), src_addr_index() and src_addr_set() methods which perform the familiar array operations on the list of addresses.
A list of source ports or source port ranges. A range of ports is denoted as two port numbers joined by a
-. The same methods as src_addr() (renamed) are also available.
As with src_addr(), but for destination addresses.
As with src_port(), but for destination ports.
If you have Class::MethodMaker v1.xx installed, the object will only have the accessor methods described above. If you have Class::MethodMaker v2.xx installed then there will be more accessor methods. Only the accessor methods documented here are officially supported and tested.
Generates the access lists and returns then as an array in list context or an arrayref in scalar context.
Resets all of the ACL values. Useful if you want to construct an object, generate an ACL and then re-use the same object for a completely different ACL rather than one which is incrementally different.
Resetting an ACL object:
To create an access list that allows traffic from 192.168.0.1 with any source port to any host on the class B network 10.1.1.1/16 with a destination port of 21937:
my $acl = Cisco::ACL->new( src_addr => '192.168.0.1', dst_addr => '10.1.1.1/16', dst_port => 21937, ); print "$_\n" for( $acl->acls );
To create an access list that will deny all traffic (regardless of whether it is TCP or UDP) to or from 184.108.40.206:
my $acl = Cisco::ACL->new( src_addr => '220.127.116.11', protocol => 'ip', ); print "$_\n" for( $acl->acls ); $acl->src_addr_clear; $acl->dst_addr( '18.104.22.168' ); print "$_\n" for( $acl->acls );
Using multiple addresses and/or ports: permit SSH and SFTP traffic from 192.168.1.1/25 and 10.1.1.1/26 to anywhere.
my $acl = Cisco::ACL->new( src_addr => [ '192.168.1.1/25', '10.1.1.1/26' ], dst_port => [ 22, 25 ], ); print "$_\n" for( $acl->acls );
Using the established parameter, permit any sessions which are already established.
my $acl = Cisco::ACL->new( established => 1 ); print "$_\n" for( $acl->acls );
These are the known limitations from the original acl.pl. I hope to address these in the near future.
Address ranges must be supplied in ascending order, e.g. 10.10.10.10-10.10.20.20. If you use 10.10.20.20-10.10.10.10 it won't handle that.
Currently there is no way to specify a combination of permit and deny rules in the same ACL. Generate them separately and edit them together by hand.
This may or may not be addressed based upon feedback received from CPAN users. With a web app this bug is an annoyance, but in a program that can have two distinct ACL objects, one for permit and one for deny it becomes less of a problem.
The initial version of this module is pretty much an OO wrapper around Chris' original code. Future plans include (hopefully in order of implementation):
The original code did all it's own CGI processing - I'd like to move to CGI.pm instead.
I want to build up the test suite to a fair size and then start looking for places to make things cleaner, faster, smaller, etc.
It's been a while since I've had to play with a Cisco, so what I know might not be totally up to date with the latest software revs.
This distribution includes aclmaker.pl, a simple CGI frontend to Cisco::ACL.
If you need a more generic framework for ACLs, take a look at Net::ACL by Martin Lorensen.
James FitzGibbon, <jfitz@CPAN.org>.
The code in this module started life as acl.pl, a CGI script written by Chris De Young (chd AT chud DOT net). I was about to embark on writing a module to do this from scratch when I stumbed across his web version, which was procedural. He graciously accepted my offer to OOP-ize the code. Any mistakes in this module are probably mine.
Nicolas Georgel contribued changes to implement Cisco's port range syntax and to allow for port numbers to be specified in reverse order (highest first).
This module is free software. You may use and/or modify it under the same terms as perl itself.