<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Perimeter interface ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873788#M491266</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem. I think I removed everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;core_router#show run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 7804 bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Last configuration change at 12:21:34 Arizona Thu Dec 15 2011 by craigrobert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 12:21:22 Arizona Thu Dec 15 2011 by craigrobert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname core_router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable secret 5 XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clock timezone Arizona -7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server radius RadiusServers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server 192.168.1.252 auth-port 1812 acct-port 1813&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group RadiusServers local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login vty_ssh group RadiusServers local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization network default group RadiusServers local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group RadiusServers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip domain name craig.net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip name-server 8.8.4.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip multicast-routing &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip audit po max-events 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;voice service voip &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; fax protocol pass-through g711ulaw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;h323&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username craigrobertlee privilege 15 password 7 XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip ssh source-interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip ssh rsa keypair-name craigkey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any VOIP_TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  match access-group 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map VOIP_POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  class VOIP_TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   bandwidth 1000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  class class-default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   fair-queue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hash md5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lifetime 28800&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key XXX address 174.79.107.62 no-xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp key XXX address 184.179.97.121 no-xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group vpnclient&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;key XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dns 192.168.1.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain atw.local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pool VPN_Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 177&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set SET1 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set SET2 esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set transform-set SET2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; qos pre-classify&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps client authentication list default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps isakmp authorization list default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps client configuration address respond&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; set peer 174.79.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set security-association idle-time 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set transform-set SET2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match address 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;qos pre-classify&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps 20 ipsec-isakmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; set peer 184.179.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set security-association idle-time 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set transform-set SET1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; match address 103&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;qos pre-classify&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps 30 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 192.168.0.5 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Null0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bandwidth 5000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address dhcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-group 150 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;full-duplex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ipsec-maps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy output VOIP_POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;full-duplex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPN_Client 192.168.0.129 192.168.0.140&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source route-map nonat interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.1.0 255.255.255.0 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.2.0 255.255.255.0 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.3.0 255.255.255.0 192.168.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip radius source-interface FastEthernet0/1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 10 permit 192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 11 permit 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 12 permit 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 12 remark SSH_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any eq 5060 any eq 5060&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 remark VOIP_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any precedence critical&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any dscp ef&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.0.0 0.0.3.255 192.168.15.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 remark ROGERS_IP_NETWORK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 192.168.0.0 0.0.3.255 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 103 remark TTOWN_VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 remark NO_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 192.168.0.0 0.0.3.255 192.168.15.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 192.168.0.0 0.0.3.255 192.168.16.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip 192.168.0.0 0.0.255.255 192.168.0.128 0.0.0.127&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 192.168.0.0 0.0.3.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 68.0.184.178 eq isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 68.0.184.178 eq non500-isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit esp any host 68.0.184.178&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any packet-too-big&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp host 208.110.65.18 host 68.0.184.178&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   icmp any any redirect log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   icmp any any mask-request log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny   ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 177 permit ip 192.168.0.0 0.0.255.255 192.168.0.128 0.0.0.127&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 177 remark VPN_CLIENT_SPLIT_TUNNEL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map nonat permit 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;match ip address 110&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community XXX RO 11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server trap-source Loopback0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server source-interface informs Loopback0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server location Gear Closet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps tty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps xgcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isdn call-information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isdn layer2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isdn chan-not-avail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isdn ietf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps hsrp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps config-copy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps envmon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps bgp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipmulticast&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps msdp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps rsvp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps frame-relay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps frame-relay subif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps rtr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps stun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps dlsw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps bstun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps dial&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps dsp card-status&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps atm subif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps pppoe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipmobile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isakmp policy add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isakmp policy delete&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isakmp tunnel start&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps isakmp tunnel stop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec cryptomap add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec cryptomap delete&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec cryptomap attach&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec cryptomap detach&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec tunnel start&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec tunnel stop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec too-many-sas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps voice poor-qov&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps dnis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server host 192.168.1.10 version 2c XXX &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host 192.168.1.252 auth-port 1812 acct-port 1813 key 7 XXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no exec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-class 12 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login authentication vty_ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;transport output none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exec-timeout 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no exec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;transport output none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ntp clock-period 17180387&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ntp server 192.43.244.18&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;core_router#exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Dec 2011 19:27:41 GMT</pubDate>
    <dc:creator>Robert Craig</dc:creator>
    <dc:date>2011-12-15T19:27:41Z</dc:date>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873754#M491230</link>
      <description>&lt;P&gt;I want to lock down my router that connects to the cable modem. Now, I thought it would be simple to just block everything incoming via an ACL, but as soon as I applied the below ACL, even the clients that are being NAT'd couldn't get to the internet. This router is performing NAT for the internal network, as well as terminating client/network IPSEC tunnels. Any ideas on how to approach this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;! Prevent LAND Attack&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any echo log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;access-list 150 deny tcp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny udp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873754#M491230</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2019-03-11T22:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873755#M491233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The situation with the routers is that they cannot perform stateful inspection by default ( like an ASA firewall) so you need to create an access-control entry for all the connections you want to allow from the outside to the inside, even if they are a reply from a connection initiated on the inside of your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see my point here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for example there is one workaround on this, you can create a reflexive access-list&amp;nbsp; on the inside interface of your router so the replies for request or packets being sent from the inside to the outside are allowed by default no matter what access-list is applied on the oustide interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reflexives access-list work with the tcp protocol, so for example if you want to allow internet access and you are using a public dns ( UDP/53) the reflexive access-list will not work for that protocol&amp;nbsp; (UDP) so you will need to permit that traffic on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link if you want to go deeper with this particular feature &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/ios/11_3/security/configuration/guide/screflex.html#wp3627"&gt;http://www.cisco.com/en/US/docs/ios/11_3/security/configuration/guide/screflex.html#wp3627&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873755#M491233</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-14T04:00:20Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873756#M491234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememeber that this is not stateful firewall. Hence, you will need to permit the return traffic from the internet on port 80 to your clients. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something to continue using this ACL but still permit anything from inside network to outside, you can apply CBAC (some sort of reflective acl) which will allow packets to return if the sessions were created on a trusted interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do the following (assuming the acl is applied on the interface that connects to the internet) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp &lt;/P&gt;&lt;P&gt;ip inspect name FW udp &lt;/P&gt;&lt;P&gt;ip inspect name FW icmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get into the interface and put the following command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW out &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then apply the ACL and let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873756#M491234</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873757#M491235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I think I'm following you. Apply the ACL on the exterior int.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int f0/0 &amp;lt;&amp;lt;&amp;lt;----one going to cable modem&lt;/P&gt;&lt;P&gt;ip access-group 151 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create the inspect rules (this is how I came across the ACL in the first place is trying to implement the inspect rules)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW tcp&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW udp&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;ip inspect name FW icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then go back to int f0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect FW out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About right? This would allow any traffic sourcing from inside the network (either from the routers crypto map sessions or a client on the LAN) to go out and come back in because it came from inside first.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873757#M491235</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:06:28Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873758#M491236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not quite right for router traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic initiating from the inside subnet, the return traffic would be allowed without the need to explicitly permit it on the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; You may need to allow IPsec and tunnel protocols on the ACL itself&amp;nbsp; for the router to build the tunnels correctly (I dont think it much as a security problem since Phase 1 and two needs to be completed for the VPN to work) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rest is fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have doubts. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873758#M491236</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873759#M491237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, it worked. Nothing internally died (knock on wood). Now, I can't test it right now, but I am assuming remote VPN clients will not be able to connect now. This router serves them as well. How do I allow them in? Would it be something like the below at the top of the ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp any eq 500 any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873759#M491237</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:20:23Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873760#M491238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not quite, it would be more like allowing them to connect to the router, so it would be like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 151 permit udp any &lt;ROUTER_IP&gt; eq 500. &lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit udp any &lt;ROUTER_IP&gt; eq 4500 (in case the devices are behind nat)&lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;access-list 151 permit esp any &lt;ROUTER_IP&gt; (for encrypted traffic)&lt;/ROUTER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list you are applying is inbound, nothing outbound, so the reply of the from the router wont be dropped by this ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know your inputs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873760#M491238</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:24:57Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873761#M491239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is, my ip is dynamic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873761#M491239</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:31:51Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873762#M491240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats an issue, do you have DDNS configured? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873762#M491240</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873763#M491241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ironically, I do. I'm running the windows client on a junk desktop on the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873763#M491241</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:35:42Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873764#M491242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mmmm &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the top of my head, you can put the fqdn thereon the acl and configure a dns server on the router so it can query the dns server everytime the name changes... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That can work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873764#M491242</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:48:07Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873765#M491243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, that might just work. I will give it a shot tomorrow and see what happens. I'll let you know. Thanks Mike!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873765#M491243</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-14T04:50:53Z</dc:date>
    </item>
    <item>
      <title>Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873766#M491244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure... let me know if you need any help tomorrow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 04:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873766#M491244</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-14T04:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873767#M491245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I added the modified ACL and it killed my IPSEC tunnels. I didn't try the client tunnels, but the network ones died and didn't come back up. Below is what I used. Don't really see why it didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 500&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 4500&lt;/P&gt;&lt;P&gt;access-list 150 permit esp any host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;! Prevent LAND Attach&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any echo log&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;access-list 150 deny tcp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny udp any range 0 65535 any range 0 65535 log&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 04:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873767#M491245</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T04:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873768#M491246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, caviot to the previous message. I added the below to the list and the tunnels (for the most part came back up).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I lost the ability to ping the other sides router, even though I can browse to it's web gui and anything on that network (weird?). Also, the below command shows me nothing so I have no way of monitoring the tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show crypto isakmp sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand why I lost ping to one interface on the other side (Its an RVS4000 so the VLAN 1 interface) and my crypto status is blank. All because of an ACL? For giggles, I rebooted the router. To make things even more complicated, the interface wouldn't pull an IP from the modem until I removed the ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 05:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873768#M491246</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T05:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873769#M491247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP is not permitted to come back. Remember that traffic generated from the router is not subject to inspection (unless the keyword router-traffic is included). For that you will need to add one more acl that allow icmp to that specific domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Permit icmp any host 10.dyndns-at-home.com echo-reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way it will be permitted. Remember to put it on the first lines to avoid the final deny ip any any. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 16:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873769#M491247</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T16:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873770#M491248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, I ended up editing it more than that. Below is what I have so far. It seemed that it was just too locked down for anything to get through. Do you recommend adding or changing anything? Everything works right now, knock on wood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 remark OUTSIDE_TO_INSIDE_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any any eq bootps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq 4500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp any host 10.dyndns-at-home.com eq isakmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit esp any host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit icmp any any packet-too-big&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.16.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.15.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit udp host proxy.sip-ua.com host 10.dyndns-at-home.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Prevent LAND Attach&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 139.130.130.34 host 139.130.130.34 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! IP address spoof protection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip host 0.0.0.0 any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! ICMP filters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any redirect log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny icmp any any mask-request log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Deny all and log port numbers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 16:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873770#M491248</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T16:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873771#M491249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I like it, however, I dont know what is the reason for this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 150 permit ip 192.168.16.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; access-list 150 permit ip 192.168.15.0 0.0.0.255 192.168.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing on the internet should come with those private IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873771#M491249</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T17:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873772#M491250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right. Here is the weird part. Those two LANs reside on a distant site that come across an IPSEC Tunnels (two tunnels). When I blocked those private addresses, I started noticing traffic from those IP’s were being blocked via the ACL. I just did a terminal monitor in a SSH at the router and the page was going nuts with blocks. The IP’s were legit and were trying to get to resources on my LAN. What is confusing is how would the interface even sees those ips if they are inside an encrypted tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert Craig&lt;/P&gt;&lt;P&gt;Fort Huachuca, AZ  85613&lt;/P&gt;&lt;P&gt;520-226-9505 (Home)&lt;/P&gt;&lt;P&gt;760-583-8270 (Cell)&lt;/P&gt;&lt;P&gt;520-843-0759 (Fax)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873772#M491250</guid>
      <dc:creator>Robert Craig</dc:creator>
      <dc:date>2011-12-15T17:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Perimeter interface ACL</title>
      <link>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873773#M491251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agree. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were seeing drops for all that subnet or for certain hosts? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 17:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/perimeter-interface-acl/m-p/1873773#M491251</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-12-15T17:51:26Z</dc:date>
    </item>
  </channel>
</rss>

