Extended Access Lists
In the standard IP access list example earlier, notice how you had to block all access from the
Sales LAN to the finance department. What if you needed Sales to gain access to a certain server
on the Finance LAN but not to other network services, for security reasons? With a standard IP
access list, you can’t allow users to get to one network service and not another.
Said another way, when you need to make decisions based on both source and destination
addresses, a standard access list won’t allow you to do that since it only makes decisions based
on source address.
But an extended access list will hook you up. That’s because extended access lists allow you to
specify source and destination address as well as the protocol and port number that identify the
upper-layer protocol or application. By using extended access lists, you can effectively allow
users access to a physical LAN and stop them from accessing specific hosts—or even specific
services on those hosts.