<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure Access-list to protect IP address in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305496#M221838</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santu,&lt;BR /&gt;&lt;BR /&gt;Can you put client and server in different VLAN?&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Lei Tian&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Aug 2013 10:41:00 GMT</pubDate>
    <dc:creator>Lei Tian</dc:creator>
    <dc:date>2013-08-26T10:41:00Z</dc:date>
    <item>
      <title>Configure Access-list to protect IP address</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305495#M221837</link>
      <description>&lt;P&gt;I have connected around 30 server with 2 cisco 2950 switch. the switch are connected to a mikrotik router. I am doing BGP with /24 IP address provided by APNIC. I have enabled DHCP in the router so that each server can get an IP automatically. Some of client have additional ip address too. they are configured manually. &lt;SPAN style="font-size: 10pt;"&gt; now how can i protect ip address to be stolen from client. One suggest me to configure &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;ACL &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; so that&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; no IPs can be "stolen". Client can access only the IP allow them in switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So please give me a example how to configure it. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;if my address block is xxx.yyy.zzz.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 04:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305495#M221837</guid>
      <dc:creator>megahostzone</dc:creator>
      <dc:date>2019-03-05T04:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Access-list to protect IP address</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305496#M221838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santu,&lt;BR /&gt;&lt;BR /&gt;Can you put client and server in different VLAN?&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Lei Tian&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 10:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305496#M221838</guid>
      <dc:creator>Lei Tian</dc:creator>
      <dc:date>2013-08-26T10:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Access-list to protect IP address</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305497#M221839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two ways to achieve it, but the first and better way is only available on newer switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Using DHCP-Snooping and IP Source-Guard&lt;/P&gt;&lt;P&gt;The switch monitors the DHCP-comunication from the client to the server and limits the communication to only that IP that was assigned by the DHCP-server. Additional IPs can be configured manually. These functions add some more security-measures that are very usefull in environments with untrusted clients. So if there is a chance to upgrade your switch to at least a 2960, then go for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Using port-ACLs where only the IP of the server is allowed as a source. That could look like the following and works also with older switches:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list standard Server1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit host 10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list standard Server2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit host 10.10.10.11&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit host 10.10.10.12&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;interface fast 0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; description Server1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip access-group Server1 in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;interface fast 0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; description Server2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip access-group Server2 in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 10:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305497#M221839</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-08-26T10:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Access-list to protect IP address</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305498#M221840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't want to use vlan as its &lt;SPAN style="font-size: 10pt;"&gt;waste of IP Address i have only /24 IP block&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 11:14:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/configure-access-list-to-protect-ip-address/m-p/2305498#M221840</guid>
      <dc:creator>megahostzone</dc:creator>
      <dc:date>2013-08-26T11:14:43Z</dc:date>
    </item>
  </channel>
</rss>

