<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic access-list problem ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182954#M361492</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allow them Inbound? Well, there is an easy fix for this instead of modifying the ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip inspect name FW tcp &lt;/P&gt;&lt;P&gt;Ip inspect name FW udp&lt;/P&gt;&lt;P&gt;Ip inspect name FW icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; ip inspect FW in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply the ACL and let us know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Feb 2013 17:24:27 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2013-02-26T17:24:27Z</dc:date>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182951#M361489</link>
      <description>&lt;P&gt;Hello, I/m having problems getting an access-list to work.With the access-group 104 in i lose my internet connectivity.&lt;/P&gt;&lt;P&gt;Here's the config. If i remove the access-group 104 in from the gigabitinterface0/0 all works but I want to have the settings on this interface.&lt;/P&gt;&lt;P&gt;What am I missing ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname r01&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging buffered 15000&lt;BR /&gt;no logging console&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;clock timezone CET 1 0&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 172.17.1.1 172.17.1.30&lt;BR /&gt;ip dhcp excluded-address 172.17.1.240 172.17.1.254&lt;BR /&gt;ip dhcp excluded-address 172.17.3.1 172.17.3.30&lt;BR /&gt;ip dhcp excluded-address 172.17.3.240 172.17.3.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN1&lt;BR /&gt;network 172.17.1.0 255.255.255.0&lt;BR /&gt;domain-name r1.local&lt;BR /&gt;default-router 172.17.1.254&lt;BR /&gt;dns-server 212.54.40.25 212.54.35.25&lt;BR /&gt;lease 0 1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VLAN100&lt;BR /&gt;network 172.17.3.0 255.255.255.0&lt;BR /&gt;domain-name r1_Guest&lt;BR /&gt;default-router 172.17.3.254&lt;BR /&gt;dns-server 212.54.40.25 212.54.35.25&lt;BR /&gt;lease 0 1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain name r1.lan&lt;BR /&gt;ip name-server 212.54.40.25&lt;BR /&gt;ip name-server 212.54.35.25&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;object-group network temp&lt;/P&gt;&lt;P&gt;description dummy addresses&lt;BR /&gt;1.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;2.2.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object-group network vlan1-lan&lt;BR /&gt;172.17.1.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object-group network vlan100-guest&lt;BR /&gt;172.17.3.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object-group network ziggo-dns&lt;BR /&gt;host 212.54.40.25&lt;BR /&gt;host 212.54.35.25&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Embedded-Service-Engine0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip access-group 104 in&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description r1.local lan&lt;BR /&gt;ip address 172.17.1.254 255.255.255.0&lt;BR /&gt;ip access-group 102 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.1&lt;BR /&gt;description Vlan100 r1_Guest&lt;BR /&gt;encapsulation dot1Q 100&lt;BR /&gt;ip address 172.17.3.254 255.255.255.0&lt;BR /&gt;ip access-group 103 in&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 101 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip route 172.17.2.0 255.255.255.0 172.17.1.253&lt;BR /&gt;!&lt;BR /&gt;access-list 23 permit 172.17.1.0 0.0.0.255&lt;BR /&gt;access-list 101 permit ip any any&lt;BR /&gt;access-list 102 deny ip any object-group vlan100-guest&lt;BR /&gt;access-list 102 permit ip any any log&lt;/P&gt;&lt;P&gt;access-list 103 deny ip any object-group vlan1-lan&lt;BR /&gt;access-list 103 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp any any eq 22&lt;BR /&gt;access-list 104 permit udp any any eq snmp&lt;/P&gt;&lt;P&gt;access-list 104 permit icmp any any time-exceeded&lt;BR /&gt;access-list 104 permit icmp any any echo-reply&lt;BR /&gt;access-list 104 permit icmp object-group temp any echo&lt;BR /&gt;access-list 104 permit icmp 172.17.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 104 deny ip any any log&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;login local&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;login local&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 23 in&lt;BR /&gt;login local&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182951#M361489</guid>
      <dc:creator>ramon</dc:creator>
      <dc:date>2019-03-12T01:05:02Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182952#M361490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ramon, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of the ACL? The question goes beucase there are sometings wide opened there. Basically, what is happening is that when the traffic goes out, the reply is being denied by the ACL. It really depends on what you want to block back in. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know what is the purpose of the ACL and then we can give you suggestions to modify the ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 23:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182952#M361490</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-02-25T23:21:16Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182953#M361491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Maykol,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The purpose of the acl 104 is to restrict the public interface to allow monitoring from for example the temp object network group to the router.&lt;/P&gt;&lt;P&gt;Idea is to filter public internet --&amp;gt; public router.&lt;/P&gt;&lt;P&gt;As you mentioned already when the acl 104 is applied to the int 0/0 things get blocked.&lt;/P&gt;&lt;P&gt;Later i will adjust the acl 102 and 103 to allow the 2 subnets only specific ports/protocols.&lt;/P&gt;&lt;P&gt;Can you give me a idea how to setup what i want ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 11:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182953#M361491</guid>
      <dc:creator>ramon</dc:creator>
      <dc:date>2013-02-26T11:47:42Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182954#M361492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allow them Inbound? Well, there is an easy fix for this instead of modifying the ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip inspect name FW tcp &lt;/P&gt;&lt;P&gt;Ip inspect name FW udp&lt;/P&gt;&lt;P&gt;Ip inspect name FW icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; ip inspect FW in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply the ACL and let us know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 17:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182954#M361492</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-02-26T17:24:27Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182955#M361493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied the rules and that works.&lt;/P&gt;&lt;P&gt;Only thing i have now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reboot router.&lt;/P&gt;&lt;P&gt;Interface 0/0 gets no dhcp address from isp.&lt;/P&gt;&lt;P&gt;I have to remove the 104 in from int 0/0&lt;/P&gt;&lt;P&gt;Then Router logs : %DHCP -6 - ADDRESS_ASSIGN: Interface GigabitEthernet0/0 assigned DHCP address x.x.x.x, mask x.x.x.x,hostname r01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Int0/0 gets dhcp ip address, next i apply the acl 104 in to int 0/0 and all works until the next reboot.&lt;/P&gt;&lt;P&gt;Maybe i have to put in a static ip address on int0/0 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 00:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182955#M361493</guid>
      <dc:creator>ramon</dc:creator>
      <dc:date>2013-02-27T00:05:29Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182956#M361494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ramon, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Modify the following; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No ip inspect name FW udp&lt;/P&gt;&lt;P&gt;Ip inspect name FW udp router-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 00:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182956#M361494</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-02-27T00:28:54Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182957#M361495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ok i will try this today.&lt;/P&gt;&lt;P&gt;Last questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Can you provide me a rule for the acl 102 that allows the subnet 172.17.1.0 to only http, https inside --&amp;gt; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Can you provide me a rule for a&amp;nbsp; local server to only allow smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) The NAT rules for this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 07:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182957#M361495</guid>
      <dc:creator>ramon</dc:creator>
      <dc:date>2013-02-27T07:54:10Z</dc:date>
    </item>
    <item>
      <title>access-list problem ?</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182958#M361496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ok :&lt;/P&gt;&lt;P&gt;the dhcp was the following problem :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 104 permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the int 0/0 gets an ip after a reboot of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i put the : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW in&lt;/P&gt;&lt;P&gt;ip inspect FW out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on int 0/0 0/1 and 0/1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Changed the acl 102 and acl 103 to allow specific traffic and all works fine now !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for helping me out !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 20:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/2182958#M361496</guid>
      <dc:creator>ramon</dc:creator>
      <dc:date>2013-02-27T20:07:27Z</dc:date>
    </item>
  </channel>
</rss>

