Hi all,
a very basic IP ACL question i guess:
scenario:

The goal is to filter traffic from PC1 to reach PC3.
I seen that guidelines say that the IP Standard ACL is to put preferably on the closer interface to the device we want to filter and in the inbound side.
With regard to these guidelines then the configuration on router1 could look like follows:
router1(config)#access-list 18 deny <ip address of PC1> 0.0.0.0
router1(config)#access-list 18 permit 0.0.0.0 255.255.255.255
router1(config)#int e0/0
router1(config)#ip access-group 18 in
I read always that the other possible option is to put the Standard IP ACL into another interface on to the outbound side (for example outbound of s1/0 of router1), but this can carry to an unwanted consequence that the packet can be routed over another interface if that fails and the packet would go anyway (for example through s1/1 of router1). This brings to write the same IP ACL on all the interfaces where the packet can be routed!
But they don't consider to put the Standard IP ACL under the same, closer to device, interface but onto the outbound side.
In fact the foutrh line seems to me freely interchangeable with this:
router1(config)#ip access-group 18 out
Because the packet ask to exit from e0/0 (for example direct toward PC3), but it's not yet exit from e0/0, then the packet don't would be routed and a routing action would not have to happen.
However it depends from how CISCO router consider outbound and inbound regard to routing.
I also read in somewhere that IP ACLs placed on to the inbound side of an interface are always not routed, while packet taken from an IP ACLs in an outbound side of an interface are always routed.
I wanted ask which are issues to filter traffic in the outbound side of the closer interface, if they are.
Thank You.