<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This could be the ACL to only in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830711#M44257</link>
    <description>&lt;P&gt;This could be the ACL to only block these two networks and allow the rest. You probably want to google the term "wildcard-mask" which is an inverse netmask:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip access-list extended OUTSIDE-IN&lt;BR /&gt; &amp;nbsp;deny ip 23.32.0.0 0.31.255.255 any&lt;BR /&gt; &amp;nbsp;deny ip 23.64.0.0 0.3.255.255 any&lt;BR /&gt; &amp;nbsp;permit ip any any&lt;/PRE&gt;
&lt;P&gt;The ACL has to be applied to the outside interface in incoming direction:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;interface gig 0/0&lt;BR /&gt; &amp;nbsp;description Your public interface&lt;BR /&gt; &amp;nbsp;ip access-group OUTSIDE-IN in&lt;/PRE&gt;</description>
    <pubDate>Wed, 13 Jan 2016 11:07:39 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-01-13T11:07:39Z</dc:date>
    <item>
      <title>Block an Outside Network with ACL</title>
      <link>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830710#M44256</link>
      <description>&lt;P&gt;So, my router has been submitting Syslog entries regarding IDS Evasion attempts.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I write an ACL that blocks ALL traffic to and/or from this Network:&lt;/P&gt;
&lt;P&gt;NetRange: 23.32.0.0 - 23.67.255.255&lt;BR /&gt;CIDR: 23.64.0.0/14, 23.32.0.0/11&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am new to ACLs and am still in school for Cisco. So bare with me. We haven't covered much about ACLs yet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks a ton!&lt;/P&gt;
&lt;P&gt;chris&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830710#M44256</guid>
      <dc:creator>c.shinneman1</dc:creator>
      <dc:date>2019-03-10T13:32:33Z</dc:date>
    </item>
    <item>
      <title>This could be the ACL to only</title>
      <link>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830711#M44257</link>
      <description>&lt;P&gt;This could be the ACL to only block these two networks and allow the rest. You probably want to google the term "wildcard-mask" which is an inverse netmask:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ip access-list extended OUTSIDE-IN&lt;BR /&gt; &amp;nbsp;deny ip 23.32.0.0 0.31.255.255 any&lt;BR /&gt; &amp;nbsp;deny ip 23.64.0.0 0.3.255.255 any&lt;BR /&gt; &amp;nbsp;permit ip any any&lt;/PRE&gt;
&lt;P&gt;The ACL has to be applied to the outside interface in incoming direction:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;interface gig 0/0&lt;BR /&gt; &amp;nbsp;description Your public interface&lt;BR /&gt; &amp;nbsp;ip access-group OUTSIDE-IN in&lt;/PRE&gt;</description>
      <pubDate>Wed, 13 Jan 2016 11:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830711#M44257</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-13T11:07:39Z</dc:date>
    </item>
    <item>
      <title>Awesome!  Thanks!   I know</title>
      <link>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830712#M44258</link>
      <description>&lt;P&gt;Awesome!&amp;nbsp; Thanks!&amp;nbsp;&amp;nbsp; I know about the Wildcard-mask.&amp;nbsp; I just couldn't get the ACL to work with the way I was writing it. It would end up blocking ALL traffic in or out and I would lose internet access all together.&amp;nbsp; Not sure what I was doing wrong.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was writing something along the lines of this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;deny ip any host 23.32.0.00.31.255.255 &lt;/PRE&gt;
&lt;P&gt;And then I was applying that to G0/0 in&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2016 15:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830712#M44258</guid>
      <dc:creator>c.shinneman1</dc:creator>
      <dc:date>2016-01-15T15:13:43Z</dc:date>
    </item>
    <item>
      <title>Always be aware of the</title>
      <link>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830713#M44259</link>
      <description>&lt;P&gt;Always be aware of the implicit "deny ip any any" ACE. If you only have deny lines in your ACL, then every traffic is denied.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2016 16:41:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-an-outside-network-with-acl/m-p/2830713#M44259</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-15T16:41:09Z</dc:date>
    </item>
  </channel>
</rss>

