<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Control List Config in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160668#M104664</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the others have said the problem you have is that if you deny traffic from B to A then the return traffic from a connection initiated from A to B is also blocked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However you can use reflexive acl's to overcome this. Reflexive acl's will allow you to say "allow traffic from A -&amp;gt; B and return traffic from B -&amp;gt; A that is part of the same connection" but "do not allow traffic to be initiated from network B -&amp;gt; A. See this link for details - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfreflx.html#wp1000897" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfreflx.html#wp1000897&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 May 2009 18:23:28 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2009-05-08T18:23:28Z</dc:date>
    <item>
      <title>Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160663#M104659</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a basic representation of my network topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before I attempt to apply any ACL's to the live environment, I have duplicated the basic topology in Packet Tracer, &lt;/P&gt;&lt;P&gt;so I can modify with the config without having any impact.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am trying to accomplish is to prevent all hosts on Network B, gaining access to Network A, but still allowing them access to Server X and other areas, not shown in the topology. Whilst still allowing hosts on Network A access to Server X and Network B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply a standard ACL to Fa 0/0.4, as follows:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa 0/0.4&lt;/P&gt;&lt;P&gt;ip access-group Block_DD out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list standard Block_DD&lt;/P&gt;&lt;P&gt;deny 172.16.0.0 0.0.3.255&lt;/P&gt;&lt;P&gt;permit any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;traffic from Network B is blocked, but the traffic from Network A across to Network B is also blocked,&lt;/P&gt;&lt;P&gt;which is not what I am trying to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply an extended ACL to Fa 0/0.3, as follows:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa 0/0.3&lt;/P&gt;&lt;P&gt;ip access-group Block_DD in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Block_DD&lt;/P&gt;&lt;P&gt;deny ip 172.16.0.0 0.0.3.255 192.168.54.0 0.0.0.255&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the same problem occurs where traffic from Network B is blocked, but the traffic from Network A across to Network B is also blocked, which again, is not what I am trying to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone please advise where I am going wrong or whether I am omitting some obvious permit/deny statements?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All guidance greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 12:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160663#M104659</guid>
      <dc:creator>Hawkgromit</dc:creator>
      <dc:date>2019-03-04T12:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160664#M104660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you post a .jpg rather than a visio file&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160664#M104660</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-08T11:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160665#M104661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neither of the access lists you have used are blocking traffic from Network A to Network B. The reason they don't work and appear to block this traffic is because you are blocking in the direction from Network B to Network A, and communication between two devices depends on a two-way path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only have one or two devices on network B that need to be accessable from Network A, then the simplest way to achieve your requirements is by your second extended ACL on the input of Fa0/0.3, but before the deny statement you need to add one or more permits to allow traffic between the particular host(s) on Network B and the specific host(s)on Network A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If however you need to be able to access everything on Network B from Network A, then you cannot limit traffic in the opposite direction in this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 13:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160665#M104661</guid>
      <dc:creator>donlerche</dc:creator>
      <dc:date>2009-05-08T13:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160666#M104662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JPEG uploaded, as requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 13:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160666#M104662</guid>
      <dc:creator>Hawkgromit</dc:creator>
      <dc:date>2009-05-08T13:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160667#M104663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell,&lt;/P&gt;&lt;P&gt;   Edit: Sorry I missed reading your question. You want to allow only A to access B but not for B to access A. Right?&lt;/P&gt;&lt;P&gt;   It can't be done with ACL. Because it's a stateless protocol. A will be blocked when traffic going back from B to A(Blocked by ACL as well). That's why you cannot go from A to B and vise versa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;Toshi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 16:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160667#M104663</guid>
      <dc:creator>Thotsaphon Lueangwattanaphong</dc:creator>
      <dc:date>2009-05-08T16:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160668#M104664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the others have said the problem you have is that if you deny traffic from B to A then the return traffic from a connection initiated from A to B is also blocked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However you can use reflexive acl's to overcome this. Reflexive acl's will allow you to say "allow traffic from A -&amp;gt; B and return traffic from B -&amp;gt; A that is part of the same connection" but "do not allow traffic to be initiated from network B -&amp;gt; A. See this link for details - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfreflx.html#wp1000897" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfreflx.html#wp1000897&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 18:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160668#M104664</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-08T18:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160669#M104665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a quick lab setup. I used tcp traffic as an example but if you look at the reference in my previous post you can see how to do udp and icmp as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 6500 switch&lt;/P&gt;&lt;P&gt;==================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip reflexive-list timeout 120&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended inbound&lt;/P&gt;&lt;P&gt;permit tcp any any reflect tcptraffic &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended outbound&lt;/P&gt;&lt;P&gt;evaluate tcptraffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa0/0.4&lt;/P&gt;&lt;P&gt;ip access-group inbound in&lt;/P&gt;&lt;P&gt;ip access-group outbound out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above config will allow all hosts on A to connect to server X and any hosts on B using any TCP application. It will allow return traffic from server X and network B to A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will not allow any traffic to be initiated from network B to network A nor from server X to network A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this example should give you a good start and you should be able to modify to meet your requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 19:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160669#M104665</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-08T19:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access Control List Config</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160670#M104666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your very valuable input. I will certainly read up on the reflexive access control lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did try to modify my existing packet tracer lab, but the IOS version does not support reflexive-lists, so will have to try other lab options to play with the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darrell&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2009 10:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/access-control-list-config/m-p/1160670#M104666</guid>
      <dc:creator>Hawkgromit</dc:creator>
      <dc:date>2009-05-12T10:28:16Z</dc:date>
    </item>
  </channel>
</rss>

