<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL help: Reducing an IPs access to nothing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-help-reducing-an-ips-access-to-nothing/m-p/878888#M957688</link>
    <description>&lt;P&gt;We have someone at a remote facility who keeps attaching his Mac to the network and it spews out several gigs of data some mornings to Mac.com.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wanted to review if what I was doing would more or less work, though it may not be very elegant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I assign him a static DHCP lease and then I do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On our ASA5520 that firewalls all internet traffic I made the following entry:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acl extended deny ip host 192.168.133.44 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, for kicks I did the following on their MPLS router's fast ethernet interface that connects to the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended blockmac&lt;/P&gt;&lt;P&gt; deny   ip host 192.168.133.44 any&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt;  ip access-group blockmac out&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;I don't see any hits when I do a "show access-list" for that ACL though so it makes me wonder.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2019 00:56:45 GMT</pubDate>
    <dc:creator>jimgrumbles</dc:creator>
    <dc:date>2019-03-13T00:56:45Z</dc:date>
    <item>
      <title>ACL help: Reducing an IPs access to nothing</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-reducing-an-ips-access-to-nothing/m-p/878888#M957688</link>
      <description>&lt;P&gt;We have someone at a remote facility who keeps attaching his Mac to the network and it spews out several gigs of data some mornings to Mac.com.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wanted to review if what I was doing would more or less work, though it may not be very elegant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I assign him a static DHCP lease and then I do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On our ASA5520 that firewalls all internet traffic I made the following entry:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_acl extended deny ip host 192.168.133.44 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, for kicks I did the following on their MPLS router's fast ethernet interface that connects to the switch:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended blockmac&lt;/P&gt;&lt;P&gt; deny   ip host 192.168.133.44 any&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt;  ip access-group blockmac out&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;I don't see any hits when I do a "show access-list" for that ACL though so it makes me wonder.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-reducing-an-ips-access-to-nothing/m-p/878888#M957688</guid>
      <dc:creator>jimgrumbles</dc:creator>
      <dc:date>2019-03-13T00:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL help: Reducing an IPs access to nothing</title>
      <link>https://community.cisco.com/t5/network-security/acl-help-reducing-an-ips-access-to-nothing/m-p/878889#M957689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming that the ASA does NAT so your internet router should never see the private address. The ACL looks OK for the ASA, you just have to make sure it's high enough to actually take effect. Remember that ACLs are read from the top down so if you allow HTTP above that deny rule, he will still be able to do HTTP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH and please rate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2008 14:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-help-reducing-an-ips-access-to-nothing/m-p/878889#M957689</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-01-04T14:27:24Z</dc:date>
    </item>
  </channel>
</rss>

