<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL for security reason in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179388#M1075528</link>
    <description>&lt;P&gt;best place to put ACL depends on which side you would like to block. possible to place them close to source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you want to block internal users to going out&amp;nbsp; - Block at inside, so less impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;usere----in (router)--out&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;examples:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Nov 2020 15:25:21 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2020-11-05T15:25:21Z</dc:date>
    <item>
      <title>ACL for security reason</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179385#M1075527</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A security question pop up in my mind and I want an advice in this way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I made the ACL for intranet that I use, I want to know where is the best place to put the ACL and in which way, and why?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What other advice to you have for my, what other things to add to improving the security?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be easy I will let the whol config and I will bold the ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 5608 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1-ALFA&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 10 log&lt;BR /&gt;security passwords min-length 10&lt;BR /&gt;enable secret 5 *********************&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login local_auth local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;no network-clock-participate slot 1&lt;BR /&gt;no network-clock-participate wic 0&lt;BR /&gt;no ip source-route&lt;BR /&gt;no ip gratuitous-arps&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;login block-for 180 attempts 3 within 180&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username *************** password 7 ****************&lt;BR /&gt;archive&lt;BR /&gt;log config&lt;BR /&gt;hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh port ****** rotary 888&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;description The interface that talk with ISP&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;pppoe enable group global&lt;BR /&gt;pppoe-client dial-pool-number 12&lt;BR /&gt;no cdp enable&lt;BR /&gt;no mop enabled&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;description The interface that let you to play inside&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;no ip mroute-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;no cdp enable&lt;BR /&gt;no mop enabled&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.19&lt;BR /&gt;description The vlan from devices like printes (static)&lt;BR /&gt;encapsulation dot1Q 19&lt;BR /&gt;ip address 172.31.245.145 255.255.255.240&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.29&lt;BR /&gt;description The vlan for something I don't know&lt;BR /&gt;encapsulation dot1Q 29&lt;BR /&gt;ip address 172.16.0.1 255.255.255.240&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.55&lt;BR /&gt;description The vlan for play on net&lt;BR /&gt;encapsulation dot1Q 55&lt;BR /&gt;ip address 172.16.30.161 255.255.255.240&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;interface Dialer12&lt;BR /&gt;ip address negotiated&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;ip mtu 1492&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;encapsulation ppp&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;no ip mroute-cache&lt;BR /&gt;dialer pool 12&lt;BR /&gt;dialer idle-timeout 0&lt;BR /&gt;dialer persistent&lt;BR /&gt;dialer-group 12&lt;BR /&gt;no cdp enable&lt;BR /&gt;ppp authentication pap callin&lt;BR /&gt;ppp pap sent-username *********** password 7 **********&lt;BR /&gt;ppp ipcp dns request&lt;BR /&gt;ppp ipcp route default&lt;BR /&gt;ppp ipcp address accept&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 15 interface Dialer12 overload&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;ip access-list extended NotAllowIpsToBeUseed&lt;BR /&gt;remark those ip are use to Block Spoof/Malicious packets&lt;BR /&gt;deny ip 224.0.0.0 31.255.255.255 any&lt;BR /&gt;deny ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;deny ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;deny ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;deny ip 172.16.0.0 0.0.255.255 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;&lt;STRONG&gt;ip access-list extended NotAllowToInside&lt;BR /&gt;remark this ACL don't allow to access well know ports to attack the internal network&lt;BR /&gt;deny tcp any any eq echo&lt;BR /&gt;deny tcp any any eq discard&lt;BR /&gt;deny tcp any any eq daytime&lt;BR /&gt;deny tcp any any eq chargen&lt;BR /&gt;deny tcp any any eq telnet&lt;BR /&gt;deny tcp any any eq finger&lt;BR /&gt;deny tcp any any eq 3389&lt;BR /&gt;deny tcp any any eq 161&lt;BR /&gt;deny tcp any any eq www&lt;BR /&gt;deny tcp any any eq 37&lt;BR /&gt;deny tcp any any eq 69&lt;BR /&gt;deny tcp any any eq ftp-data&lt;BR /&gt;deny tcp any any eq ftp&lt;BR /&gt;permit tcp any 172.16.30.160 0.0.0.15 eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ip access-list extended fohSSH&lt;BR /&gt;deny tcp any any eq 22&lt;BR /&gt;permit tcp any any eq 8888&lt;BR /&gt;!&lt;BR /&gt;access-list 15 permit 172.16.30.160 0.0.0.15&lt;BR /&gt;dialer-list 12 protocol ip permit&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner motd ^CIf you're not the Admin get out!!^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 180 0&lt;BR /&gt;login authentication local_auth&lt;BR /&gt;line aux 0&lt;BR /&gt;login authentication local_auth&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class fohSSH in&lt;BR /&gt;rotary 888&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 9&lt;BR /&gt;access-class fohSSH in&lt;BR /&gt;rotary 12&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 10&lt;BR /&gt;access-class fohSSH in&lt;BR /&gt;login authentication local_auth&lt;BR /&gt;rotary 12&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 11 15&lt;BR /&gt;access-class fohSSH in&lt;BR /&gt;rotary 12&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 15:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179385#M1075527</guid>
      <dc:creator>b2kzone-beniamin</dc:creator>
      <dc:date>2020-11-05T15:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for security reason</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179388#M1075528</link>
      <description>&lt;P&gt;best place to put ACL depends on which side you would like to block. possible to place them close to source.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you want to block internal users to going out&amp;nbsp; - Block at inside, so less impact.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;usere----in (router)--out&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;examples:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/ip/access-lists/26448-ACLsamples.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 15:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179388#M1075528</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-11-05T15:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for security reason</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179410#M1075529</link>
      <description>&lt;P&gt;ola,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example I want the router to act also as a firewall, because I don't have one and I search for a good advice or guide line to know how to config my router to protect my intranet&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 15:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-security-reason/m-p/4179410#M1075529</guid>
      <dc:creator>b2kzone-beniamin</dc:creator>
      <dc:date>2020-11-05T15:56:56Z</dc:date>
    </item>
  </channel>
</rss>

