How to use the cisco acl builder
- Set ACL number or name, action (permit / deny), protocol, source, destination and optional port.
- Add each rule to the rule list. Order matters: first match wins.
- Copy the full ACL block straight to your Cisco config.
Build standard or extended access lists for Cisco IOS.
Standard ACLs match only on source IP. Extended ACLs match source, destination, protocol and port. Extended is what you almost always want.
Cisco evaluates ACL entries top-down and stops at the first match. A broad 'permit any' early in the list will hide every specific rule below it.
Add the deny line for the host first, then the permit for the subnet. The order is essential because of top-down matching.
Use named ACLs when you want to edit individual lines (numbered ACLs require deleting and re-creating the whole list). Almost all new deployments should be named.