<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Based Access List in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998853#M954307</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok Thanks well so the config will be like this &lt;/P&gt;&lt;P&gt;object group service XYZ&lt;/P&gt;&lt;P&gt;Description XYZ Ports&lt;/P&gt;&lt;P&gt;object-port eq 10111 &lt;/P&gt;&lt;P&gt;object-port eq 10112&lt;/P&gt;&lt;P&gt;object-port eq 10113&lt;/P&gt;&lt;P&gt;object-port eq 10311&lt;/P&gt;&lt;P&gt;object-port eq 10313&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.14 object-group service XYZ &lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp host 173.0.0.1 host xxx.xxx.xxx.14 object-group service XYZ&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service XYZ&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group service WEB&lt;/P&gt;&lt;P&gt;Description WEB &lt;/P&gt;&lt;P&gt;object-port eq 443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.21 object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended permit udp host 173.0.0.1 host xxx.xxx.xxx.21 object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group service Test&lt;/P&gt;&lt;P&gt;Description TEST Server Ports&lt;/P&gt;&lt;P&gt;object-port eq 12700 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.22  object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended permit UDP host 173.0.0.1 host xxx.xxx.xxx.22  object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now let me know 2 things are these configs going to work on Cisco 3550 and how can i apply all these on a single physical port &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 Apr 2008 11:24:13 GMT</pubDate>
    <dc:creator>imranraheel</dc:creator>
    <dc:date>2008-04-06T11:24:13Z</dc:date>
    <item>
      <title>Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998849#M954303</link>
      <description>&lt;P&gt;I want to apply an access list on a port to allow a single ip to access internal computers on specific ports &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal Host IP 192.168.1.5.2&lt;/P&gt;&lt;P&gt;External Host attached to specific Router port :173.0.0.1&lt;/P&gt;&lt;P&gt;Permissioned Ports 10111&lt;/P&gt;&lt;P&gt;Let me know how to achieve this &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998849#M954303</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2019-03-11T12:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998850#M954304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list inbound extended permit tcp host 173.0.0.1 host 192.168.1.52 eq 10111&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp host 173.0.0.1 host 192.168.1.52 eq 10111&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is to apply the access control on the specific interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Inbound" is the ACL you're working on for inbound traffic. Interface "outside" is the actual interface name assigned for the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Apr 2008 20:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998850#M954304</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-04T20:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998851#M954305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Chickman&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what if i want to allow a list of ports do i have to make seperate access lists and what the command to allow that access list on port 37&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Apr 2008 22:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998851#M954305</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2008-04-05T22:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998852#M954306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very easy solution, create an "object-group service".  It will look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service Sample "Whatever you want to name it really"&lt;/P&gt;&lt;P&gt;Description "Whatever you want"&lt;/P&gt;&lt;P&gt;object-port eq 37&lt;/P&gt;&lt;P&gt;object-port eq 10111&lt;/P&gt;&lt;P&gt;object-port eq "What other port you want"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list will look something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound remark "Whatever this is for"&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 173.0.0.1 host 192.168.1.52 object-group service Sample&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp host 173.0.0.1 host 192.168.1.52 object-group service Sample&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I would suggest adding a remark statement.  This would allow you to add a description to the ACL as well. You can place the remarks pretty much anywhere in your access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this is more along the lines of what you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Apr 2008 00:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998852#M954306</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-06T00:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998853#M954307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok Thanks well so the config will be like this &lt;/P&gt;&lt;P&gt;object group service XYZ&lt;/P&gt;&lt;P&gt;Description XYZ Ports&lt;/P&gt;&lt;P&gt;object-port eq 10111 &lt;/P&gt;&lt;P&gt;object-port eq 10112&lt;/P&gt;&lt;P&gt;object-port eq 10113&lt;/P&gt;&lt;P&gt;object-port eq 10311&lt;/P&gt;&lt;P&gt;object-port eq 10313&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.14 object-group service XYZ &lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp host 173.0.0.1 host xxx.xxx.xxx.14 object-group service XYZ&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service XYZ&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group service WEB&lt;/P&gt;&lt;P&gt;Description WEB &lt;/P&gt;&lt;P&gt;object-port eq 443 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.21 object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended permit udp host 173.0.0.1 host xxx.xxx.xxx.21 object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service WEB&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group service Test&lt;/P&gt;&lt;P&gt;Description TEST Server Ports&lt;/P&gt;&lt;P&gt;object-port eq 12700 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.22  object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended permit UDP host 173.0.0.1 host xxx.xxx.xxx.22  object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service TEST&lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now let me know 2 things are these configs going to work on Cisco 3550 and how can i apply all these on a single physical port &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Apr 2008 11:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998853#M954307</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2008-04-06T11:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998854#M954308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I would suggest object group nesting for something like this.  If you essentially need to separate these ports that is. Should look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object group service OUTSIDENAME&lt;/P&gt;&lt;P&gt;Description OUTSIDE_ACCESS_IN&lt;/P&gt;&lt;P&gt;group-object XYZ&lt;/P&gt;&lt;P&gt;group-object WEB&lt;/P&gt;&lt;P&gt;group-object Test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you'll only require 4 lines in your ACL as opposed to 12.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound extended permit tcp host 173.0.0.1 host xxx.xxx.xxx.22 object-group service OUTSIDENAME &lt;/P&gt;&lt;P&gt;access-list outbound extended permit UDP host 173.0.0.1 host xxx.xxx.xxx.22 object-group service OUTSIDENAME &lt;/P&gt;&lt;P&gt;access-list outbound extended deny any any object-group service OUTSIDENAME &lt;/P&gt;&lt;P&gt;access-list outbound extended permit any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documentation for this can be found here: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've not configured a 3550 for this myself, but know it does do layer3 routing.  As such, it is capable of doing ACL's and other features.  It will be pretty limited though.&lt;/P&gt;&lt;P&gt;You'll first need to create your ACL in the same fashion you  would on a firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch(config)# ip access-list extended outbound&lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# permit tcp any 171.69.0.0 0.0.255.255 eq telnet&lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# deny tcp any any&lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# permit icmp any any&lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# deny udp any 171.69.0.0 0.0.255.255 lt 1024&lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# deny ip any any log ** Logging this is totally up to you. &lt;/P&gt;&lt;P&gt;Switch(config-ext-nacl)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you'll need to apply it to the interface you are wanting to restrict access from.  Remember this interface will require an IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sample:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch(config)# interface gigabitethernet0/3&lt;/P&gt;&lt;P&gt;Switch(config-if)# ip access-group outbound in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find more on this at the following: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_12c_ea1/configuration/guide/swacl.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_12c_ea1/configuration/guide/swacl.html&lt;/A&gt;#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helped a little.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Apr 2008 03:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998854#M954308</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-07T03:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998855#M954309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just a quick question, is this traffic inbound or outbound to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I ask is because I'm reviewing your comments and I see you've put "outbound" on the ACL's.  Just make sure you remember what interface and what direction you're placing the ACL for effectiveness.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Apr 2008 03:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998855#M954309</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-07T03:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998856#M954310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me know about the following configs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 173.0.0.1(client IP) host xxx.xxx.xxx.14 range 10111 101113 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 173.0.0.1 host xxx.xxx.xxx.14  eq 10311&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 173.0.0.1  host xxx.xxx.xxx.14 eq 10313&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 173.0.0.1  host xxx.xxx.xxx.14 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 173.0.0.1&lt;/P&gt;&lt;P&gt;host xxx.xxx.xxx.14 eq 12700&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface F0/37&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-group 100 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Apr 2008 17:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998856#M954310</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2008-04-07T17:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based Access List</title>
      <link>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998857#M954311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config for the switch looks good.  I would drop off the "deny ip any any" as I believe its implicit.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All in all it looks good!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Apr 2008 18:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-access-list/m-p/998857#M954311</guid>
      <dc:creator>chickman</dc:creator>
      <dc:date>2008-04-07T18:58:05Z</dc:date>
    </item>
  </channel>
</rss>

