<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Perimeter interface ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873774#M491252</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Certain hosts that I know were legit in the other LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Dec 2011 17:53:41 GMT</pubDate>
    <dc:creator>Robert Craig</dc:creator>
    <dc:date>2011-12-15T17:53:41Z</dc:date>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873754#M491230</link>
      <description>&lt;P&gt;I want to lock down my router that connects to the cable modem. Now, I thought it would be simple to just block everything incoming via an ACL, but as soon as I applied the below ACL, even the clients that are being NAT'd couldn't get to the internet. This router is performing NAT for the internal network, as well as terminating client/network IPSEC tunnels. Any ideas on how to approach this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;! Prevent LAND Attack&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any echo log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;access-list 150 deny tcp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny udp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873754#M491230</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2019-03-11T22:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873755#M491233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The situation with the routers is that they cannot perform stateful inspection by default ( like an ASA firewall) so you need to create an access-control entry for all the connections you want to allow from the outside to the inside, even if they are a reply from a connection initiated on the inside of your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see my point here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for example there is one workaround on this, you can create a reflexive access-list&amp;nbsp; on the inside interface of your router so the replies for request or packets being sent from the inside to the outside are allowed by default no matter what access-list is applied on the oustide interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reflexives access-list work with the tcp protocol, so for example if you want to allow internet access and you are using a public dns ( UDP/53) the reflexive access-list will not work for that protocol&amp;nbsp; (UDP) so you will need to permit that traffic on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link if you want to go deeper with this particular feature &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios/11_3/security/configuration/guide/screflex.html#wp3627"&gt;http://www.cisco.com/en/US/docs/ios/11_3/security/configuration/guide/screflex.html#wp3627&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873755#M491233</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-14T04:00:20Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873756#M491234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememeber that this is not stateful firewall. Hence, you will need to permit the return traffic from the internet on port 80 to your clients. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something to continue using this ACL but still permit anything from inside network to outside, you can apply CBAC (some sort of reflective acl) which will allow packets to return if the sessions were created on a trusted interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do the following (assuming the acl is applied on the interface that connects to the internet) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp &lt;/P&gt;&lt;P&gt;ip inspect name FW udp &lt;/P&gt;&lt;P&gt;ip inspect name FW icmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get into the interface and put the following command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW out &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then apply the ACL and let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873756#M491234</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873757#M491235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I think I'm following you. Apply the ACL on the exterior int.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int f0/0 &amp;lt;&amp;lt;&amp;lt;----one going to cable modem&lt;/P&gt;&lt;P&gt;ip access-group 151 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create the inspect rules (this is how I came across the ACL in the first place is trying to implement the inspect rules)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW tcp&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW udp&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go back to int f0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About right? This would allow any traffic sourcing from inside the network (either from the routers crypto map sessions or a client on the LAN) to go out and come back in because it came from inside first.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873757#M491235</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:06:28Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873758#M491236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not quite right for router traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic initiating from the inside subnet, the return traffic would be allowed without the need to explicitly permit it on the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You may need to allow IPsec and tunnel protocols on the ACL itself&amp;nbsp; for the router to build the tunnels correctly (I dont think it much as a security problem since Phase 1 and two needs to be completed for the VPN to work) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rest is fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have doubts. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873758#M491236</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873759#M491237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, it worked. Nothing internally died (knock on wood). Now, I can't test it right now, but I am assuming remote VPN clients will not be able to connect now. This router serves them as well. How do I allow them in? Would it be something like the below at the top of the ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp any eq 500 any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873759#M491237</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:20:23Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873760#M491238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not quite, it would be more like allowing them to connect to the router, so it would be like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 151 permit udp any &lt;ROUTER_IP&gt; eq 500. &lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp any &lt;ROUTER_IP&gt; eq 4500 (in case the devices are behind nat)&lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit esp any &lt;ROUTER_IP&gt; (for encrypted traffic)&lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list you are applying is inbound, nothing outbound, so the reply of the from the router wont be dropped by this ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know your inputs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873760#M491238</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:24:57Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873761#M491239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is, my ip is dynamic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873761#M491239</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:31:51Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873762#M491240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats an issue, do you have DDNS configured? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873762#M491240</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873763#M491241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ironically, I do. I'm running the windows client on a junk desktop on the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873763#M491241</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:35:42Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873764#M491242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mmmm &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the top of my head, you can put the fqdn thereon the acl and configure a dns server on the router so it can query the dns server everytime the name changes... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That can work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873764#M491242</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:48:07Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873765#M491243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that might just work. I will give it a shot tomorrow and see what happens. I'll let you know. Thanks Mike!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873765#M491243</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:50:53Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873766#M491244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure... let me know if you need any help tomorrow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873766#M491244</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873767#M491245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I added the modified ACL and it killed my IPSEC tunnels. I didn't try the client tunnels, but the network ones died and didn't come back up. Below is what I used. Don't really see why it didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 500&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 4500&lt;/P&gt;&lt;P&gt;access-list 150 permit esp any host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;! Prevent LAND Attach&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any echo log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;access-list 150 deny tcp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny udp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 04:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873767#M491245</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T04:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873768#M491246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, caviot to the previous message. I added the below to the list and the tunnels (for the most part came back up).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I lost the ability to ping the other sides router, even though I can browse to it's web gui and anything on that network (weird?). Also, the below command shows me nothing so I have no way of monitoring the tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand why I lost ping to one interface on the other side (Its an RVS4000 so the VLAN 1 interface) and my crypto status is blank. All because of an ACL? For giggles, I rebooted the router. To make things even more complicated, the interface wouldn't pull an IP from the modem until I removed the ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 05:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873768#M491246</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T05:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873769#M491247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP is not permitted to come back. Remember that traffic generated from the router is not subject to inspection (unless the keyword router-traffic is included). For that you will need to add one more acl that allow icmp to that specific domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Permit icmp any host 10.dyndns-at-home.com echo-reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way it will be permitted. Remember to put it on the first lines to avoid the final deny ip any any. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 16:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873769#M491247</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T16:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873770#M491248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, I ended up editing it more than that. Below is what I have so far. It seemed that it was just too locked down for anything to get through. Do you recommend adding or changing anything? Everything works right now, knock on wood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 4500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit esp any host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any packet-too-big&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.16.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.15.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp host proxy.sip-ua.com host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Prevent LAND Attach&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 16:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873770#M491248</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T16:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873771#M491249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I like it, however, I dont know what is the reason for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.16.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; access-list 150 permit ip 192.168.15.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing on the internet should come with those private IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873771#M491249</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T17:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873772#M491250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right. Here is the weird part. Those two LANs reside on a distant site that come across an IPSEC Tunnels (two tunnels). When I blocked those private addresses, I started noticing traffic from those IP’s were being blocked via the ACL. I just did a terminal monitor in a SSH at the router and the page was going nuts with blocks. The IP’s were legit and were trying to get to resources on my LAN. What is confusing is how would the interface even sees those ips if they are inside an encrypted tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873772#M491250</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T17:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873773#M491251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agree. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were seeing drops for all that subnet or for certain hosts? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873773#M491251</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T17:51:26Z</dc:date>
    </item>
  </channel>
</rss>

