<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem With ACLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767551#M1097430</link>
    <description>&lt;P&gt;Still not able to understand the requiremet here - what is the goal of this task ?&lt;/P&gt;
&lt;P&gt;First i would not suggested same ACL for this.&lt;/P&gt;
&lt;P&gt;Seconds this RFC 1918 address, i do not believe any traffil will come in from private IP address, so you will not see at all.&lt;/P&gt;
&lt;P&gt;you can use different ACL number 101 same match and use ip access-group 101 in (example)&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2023 15:44:54 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2023-02-02T15:44:54Z</dc:date>
    <item>
      <title>Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767544#M1097428</link>
      <description>&lt;P&gt;I am new to cisco and trying to setup a vlan with some access-lists in my cisco router 871. The router i have is connected to another router with default ip 192.168.1.1/24. My router has the WAN ip 192.168.1.110 and the vlan network is 10.0.0.0/29. The access list is monitoring the incomming trafic. My problem when i try to access the internet using a host from the vlan network (lets say ip 10.0.0.2). I am able to access the internet only when using the "Access list 100 permit 10.0.0.0 0.0.0.7 any",&amp;nbsp; but i dont understand why when this is saying "allow traffic from network 10.0.0.0/22 to any network" and i am monitoring the incomming trafic, shouldn't i use the opposite for that like "Access list 100 permit any 10.0.0.0 0.0.0.7" to get the result i want? Thanks in advance!&lt;/P&gt;&lt;P&gt;Here is my config:&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;description Openstack-Host&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;description compute1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;description compute2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;description FW_OUTSIDE_WAN&lt;BR /&gt;ip address 192.168.1.110 255.255.255.0&lt;BR /&gt;ip access-group 100 in&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;description Playground&lt;BR /&gt;ip address 10.0.0.1 255.255.255.248&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.1.1&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 100 interface FastEthernet4 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.110 22 192.168.1.110 3030 extendable&lt;BR /&gt;access-list 100 permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt;access-list 100 permit ip 10.0.0.0 0.0.0.7 any&lt;BR /&gt;access-list 100 permit tcp any any established&lt;BR /&gt;access-list 100 permit tcp host 8.8.8.8 eq 53 any&lt;BR /&gt;access-list 100 permit udp host 8.8.8.8 eq 53 any&lt;BR /&gt;access-list 100 permit tcp host 8.8.4.4 eq 53 any&lt;BR /&gt;access-list 100 permit udp host 8.8.4.4 eq 53 any&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 15:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767544#M1097428</guid>
      <dc:creator>Slargus</dc:creator>
      <dc:date>2023-02-02T15:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767551#M1097430</link>
      <description>&lt;P&gt;Still not able to understand the requiremet here - what is the goal of this task ?&lt;/P&gt;
&lt;P&gt;First i would not suggested same ACL for this.&lt;/P&gt;
&lt;P&gt;Seconds this RFC 1918 address, i do not believe any traffil will come in from private IP address, so you will not see at all.&lt;/P&gt;
&lt;P&gt;you can use different ACL number 101 same match and use ip access-group 101 in (example)&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 15:44:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767551#M1097430</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-02-02T15:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767552#M1097431</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ip access-group 100 in &amp;lt;&amp;lt;- your ACL is IN direction so it must 10.0.0.0/22 to any&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 15:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767552#M1097431</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-02T15:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767566#M1097434</link>
      <description>&lt;P&gt;So the ACL will also check the traffic comming from inside my router because is comming from different interface?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 15:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767566#M1097434</guid>
      <dc:creator>Slargus</dc:creator>
      <dc:date>2023-02-02T15:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767567#M1097435</link>
      <description>&lt;P&gt;Sorry if my question was confusing. I am able to recieve traffic from outside though, can you explain why i should use a second ACL? Also thanks for the quick Response!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 16:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767567#M1097435</guid>
      <dc:creator>Slargus</dc:creator>
      <dc:date>2023-02-02T16:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767568#M1097436</link>
      <description>&lt;P&gt;Yes,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;ACL IN&amp;nbsp;&lt;BR /&gt;LAN-Router-WAN(or any)&lt;BR /&gt;ACL will be&amp;nbsp;&lt;BR /&gt;permit/deny LAN WAN (or any)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ACL out&amp;nbsp;&lt;BR /&gt;LAN-Router-WAN&lt;BR /&gt;ACL will be&lt;BR /&gt;permit/deny WAN (or any)&amp;nbsp; LAN&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 16:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767568#M1097436</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-02T16:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Problem With ACLs</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767576#M1097438</link>
      <description>&lt;P&gt;ok i understand now, thank you!!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 16:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-acls/m-p/4767576#M1097438</guid>
      <dc:creator>Slargus</dc:creator>
      <dc:date>2023-02-02T16:06:16Z</dc:date>
    </item>
  </channel>
</rss>

