<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is this ACL secure on the outside interface? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977205#M409532</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;From the answers that I received, I concluded that the ACL config is secure. Is this correct?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't say it that way. The ACL is highly insecure as it allowes any traffic entering to your router. You just move the security to NAT which helps you in this case but still it's not a secure practice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Aug 2012 13:29:17 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-08-14T13:29:17Z</dc:date>
    <item>
      <title>Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977200#M409527</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my first time on Cisco support. We have a number of customers that use Cisco 800 series routers as internet gateways/firewall. I had to work on a few of them and found an ACL config that I believe to be insecure (see below). Just to be sure I would like to ask an expert if it is secure or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ACL is applied to the outside interface facing the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list 103&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any host 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside interface&lt;/P&gt;&lt;P&gt; Ip access-group 103 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My concern is the second ACL statement, &lt;EM&gt;permit ip any any. &lt;/EM&gt;I believe this was created to allow all the static nat statements, but will this not make the router vulnerable to attacks? Would it be more secure to individually allow the necessary traffic through instead of allowing all traffic? See the more detailed config below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface ATM0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache cef&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; no atm ilmi-keepalive&lt;/P&gt;&lt;P&gt; pvc 0/33 &lt;/P&gt;&lt;P&gt;&amp;nbsp; encapsulation aal5mux ppp dialer&lt;/P&gt;&lt;P&gt;&amp;nbsp; dialer pool-member 1&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; dsl operating-mode auto &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt; load-interval 30&lt;/P&gt;&lt;P&gt; hold-queue 100 out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description WLAN-GASTEN&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 103 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; dialer pool 1&lt;/P&gt;&lt;P&gt; dialer-group 1&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; ppp authentication pap callin&lt;/P&gt;&lt;P&gt; ppp pap sent-username xxxx password xxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip nat inside source list 101 interface Dialer0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.23 1062 1.1.1.1 1062 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 25 1.1.1.2 25 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 110 1.1.1.2 110 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.2 442 1.1.1.2 442 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 443 1.1.1.2 443 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.6 444 1.1.1.2 444 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 987 1.1.1.2 987 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 1723 1.1.1.2 1723 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.5 3389 1.1.1.2 3389 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.14 80 1.1.1.3 80 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.14 443 1.1.1.3 443 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.14 3389 1.1.1.3 3389 extendable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 1 permit any&lt;/P&gt;&lt;P&gt;access-list 23 permit 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 23 permit 3.3.3.3 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 23 permit 4.4.4.4 0.0.0.31&lt;/P&gt;&lt;P&gt;access-list 23 permit 85.5.5.5 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 103 remark Traffic allowed to enter the router from Internet&lt;/P&gt;&lt;P&gt;access-list 103 deny&amp;nbsp;&amp;nbsp; ip any host 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list 103 permit ip any any&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; no modem enable&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 23 in&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; password xxxxx&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977200#M409527</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2019-03-11T23:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977201#M409528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;I understand what you're trying to say but it's OK to have the permit ip any any on the last line. After all, you can't be expected to have a list of 1000 lines of deny end of the day, am I right? If you ask me, this is not practical.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco do have couple of technologies that you could dwell into e.g. ZFW, IOS IPS, Control Plane Policing etc. However, what you could do right now is to ensure your Cisco Router is properly harden based on Cisco's best practises &lt;A href="http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml" rel="nofollow"&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml&lt;/A&gt;, and you should be alright.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 14:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977201#M409528</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-13T14:14:17Z</dc:date>
    </item>
    <item>
      <title>Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977202#M409529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your answer. I will check the link you sent. Could you explain the following statement, &lt;/P&gt;&lt;P&gt;&lt;EM&gt;deny ip any host 255.255.255.255&lt;/EM&gt;. &lt;/P&gt;&lt;P&gt;I'm not quite sure what it actually does. Is it blocking all hosts? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you really need this statment? Would it be OK if it didn't have any ACL on the outside interface comming in? I know that NAT does not allow incomming connections unless it is initiated from the inside. Is using NAT and static NAT statements enough?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 14:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977202#M409529</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2012-08-13T14:24:05Z</dc:date>
    </item>
    <item>
      <title>Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977203#M409530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This particular ACE is blocking broadcast traffic, that is, traffic sent to the all-ones address 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 23:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977203#M409530</guid>
      <dc:creator>jp.senior</dc:creator>
      <dc:date>2012-08-13T23:01:30Z</dc:date>
    </item>
    <item>
      <title>Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977204#M409531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;From the answers that I received, I concluded that the ACL config is secure. Is this correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 10:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977204#M409531</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2012-08-14T10:50:38Z</dc:date>
    </item>
    <item>
      <title>Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977205#M409532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;From the answers that I received, I concluded that the ACL config is secure. Is this correct?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't say it that way. The ACL is highly insecure as it allowes any traffic entering to your router. You just move the security to NAT which helps you in this case but still it's not a secure practice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 13:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977205#M409532</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-14T13:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977206#M409533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand that, but I just wanted to make sure it isn't completely insecure. Thank you all for your help. I really appreciate it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 13:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977206#M409533</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2012-08-14T13:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977207#M409534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But keep in mind that there are some dependencies. Your router for example is open to the internet for incoming HTTP. And then just remember the IOS-bug where an unauthenticated user was able to configure the router through HTTP. If a similar bug will be discovered in the future you are vulnerable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats not at all the needed form of due diligance. Nevertheless it's very often to observe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 13:46:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977207#M409534</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-14T13:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977208#M409535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Will keep that in mind Karsten, thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2012 13:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977208#M409535</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2012-08-14T13:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977209#M409540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;Just to share with you, this is how I would normally harden my Cisco Router's WAN Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt;description ### Link to Internet ###&lt;/P&gt;&lt;P&gt;ip address 202.188.139.228 255.255.255.248&lt;/P&gt;&lt;P&gt;ip access-group NETWORK-ATTACKS in&lt;/P&gt;&lt;P&gt;ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;no ip mroute-cache&lt;/P&gt;&lt;P&gt;load-interval 30&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;hold-queue 50 in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended NETWORK-ATTACKS&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any fragments&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any option any-options&lt;/P&gt;&lt;P&gt;remark --- Smurf Attack ACL ----&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; icmp any host 8.67.0.255 echo log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; icmp any host 255.255.255.255 echo log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; udp any host 8.67.0.255 eq echo log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; udp any host 255.255.255.255 eq echo log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; icmp any any redirect log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;remark --- RFC 3330 ACL ----&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 14.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 24.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 39.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 128.0.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 191.255.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 192.0.0.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 198.18.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 223.255.255.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip 240.0.0.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;remark --- Permit All ----&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely and select the option THIS QUESTION IS ANSWERED, so that the others could learn from you too...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 00:20:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977209#M409540</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-15T00:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977210#M409541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. This information is very helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 00:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977210#M409541</guid>
      <dc:creator>Suresh1986</dc:creator>
      <dc:date>2012-08-15T00:49:08Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977211#M409542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your baseline-ACL has some flaws and should be changed (some wrong masks, RFC3330 obsolet, removed bogons etc.). A cleaned up version could look like the following. I also removed smurf-stuff as it is not relevant in IOS anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended PERIMETER-IN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 0.0.0.0 0.255.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 100.64.0.0 0.63.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 192.0.0.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 192.0.2.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 198.18.0.0 0.1.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 198.51.100.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 203.0.113.0 0.0.0.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny&amp;nbsp;&amp;nbsp; ip YOUR-OWN-NETWORK any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; permit ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you don't need the "log" parameter as the source is spoofed anyway when you get a match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 05:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977211#M409542</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-15T05:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977212#M409543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you bro &lt;A _jive_internal="true" href="https://community.cisco.com/people/karsten.iwen" id="jive-2292343659257710809101" rel="nofollow"&gt;karsten.iwen&lt;/A&gt; for the advice. I'm learning new things every day. Much appreciated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I guess that's why you have a silver star, and I only have only a brown star &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 08:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977212#M409543</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-15T08:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977213#M409544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Come on, your star is not brown, it's bronze ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; And I assume it will be silver soon!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2012 09:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/1977213#M409544</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-15T09:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Is this ACL secure on the outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/3304953#M409545</link>
      <description>&lt;P&gt;I am not sure why this would be blocked since the router will not forward it anyway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The broadcast will reach the router and the router will drop the traffic, but this ACL entry&amp;nbsp;&lt;/P&gt;
&lt;P&gt;only causes the router to drop it anyway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a reason that it should be used????&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2018 20:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-acl-secure-on-the-outside-interface/m-p/3304953#M409545</guid>
      <dc:creator>pduffany</dc:creator>
      <dc:date>2018-01-02T20:43:42Z</dc:date>
    </item>
  </channel>
</rss>

