<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access control List in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378668#M959480</link>
    <description>If you are running this in packet tracer then is there any device with an IP address of 8.8.8.8?</description>
    <pubDate>Sat, 05 May 2018 15:59:31 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-05-05T15:59:31Z</dc:date>
    <item>
      <title>Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378597#M959463</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to create an access control list on a router that does the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1)&amp;nbsp;access control list to deny all inbound traffic with network addresses matching internal-registered IP address&lt;/P&gt;
&lt;P&gt;2) Deny all ICMP echo request traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3) Deny all inbound Microsoft Active Directory&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) Deny all inbound&amp;nbsp;&lt;SPAN&gt; Microsoft&lt;/SPAN&gt; SQL Server Ports&lt;/P&gt;
&lt;P&gt;5) Deny all Microsoft Domain Local Broadcast&lt;/P&gt;
&lt;P&gt;6) Allow traffic to SMTP server&lt;/P&gt;
&lt;P&gt;7) Allow traffic to internal IMAP Server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have to also remove this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ip nat inside source list 100 interface Serial1/0 overload&lt;/SPAN&gt; from my start-up configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My Router0 configuration is as under:&lt;/P&gt;
&lt;P&gt;Router#show run&lt;BR /&gt;Router#show running-config &lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 1344 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;no service timestamps log datetime msec&lt;BR /&gt;no service timestamps debug datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Router&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt;&amp;nbsp;ip address 10.1.11.10 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;standby 1 ip 10.1.11.12&lt;BR /&gt;&amp;nbsp;standby 1 priority 110&lt;BR /&gt;&amp;nbsp;standby 1 preempt&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/0&lt;BR /&gt;&amp;nbsp;ip address 203.1.1.2 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/5&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial1/7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;clock rate 2000000&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 100 interface Serial1/0 overload&lt;BR /&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 203.1.1.1 &lt;BR /&gt;ip route 10.1.20.0 255.255.255.0 10.1.11.1 &lt;BR /&gt;!&lt;BR /&gt;ip flow-export version 9&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;!&lt;BR /&gt;line aux 0&lt;BR /&gt;!&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378597#M959463</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2020-02-21T15:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378604#M959464</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example ACL below. Please note all traffic that isn't explicitly permitted (such as smtp/imap) would match the last rule deny any - which is your requirements 2,3,4 and 5. The last rule deny any is actually required, as there is a default implied deny, it's here for your reference.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;ip access-list extended WAN_ACL&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description DENY RFC 1918&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 10.0.0.0 0.255.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 192.168.0.0 0.0.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 172.16.0.0 0.0.15.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description PERMIT SMTP&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.x.x.x eq 25&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description PERMIT IMAP and IMAPS&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.x.x.x eq 143&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.x.x.x eq 993&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description DENY ALL REMAINING TRAFFIC&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip any any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;interface serial 1/0&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;ip access-group WAN_ACL in&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would need static NAT entries for the SMTP/IMAP server, modify the ACL above with the correct IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To disable the NAT override rule, do this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;no ip nat inside source list 100 interface Serial1/0 overload&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 11:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378604#M959464</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T11:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378607#M959465</link>
      <description>Thanks RJI.</description>
      <pubDate>Sat, 05 May 2018 11:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378607#M959465</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T11:49:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378608#M959466</link>
      <description>Hello RJI,&lt;BR /&gt;&lt;BR /&gt;Why in the end you have kept  deny ip any any, why not  permit ip any any&lt;BR /&gt;</description>
      <pubDate>Sat, 05 May 2018 12:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378608#M959466</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T12:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378610#M959468</link>
      <description>Hi, because you asked only to permit smtp and imap, anything else you've not specifically permitted will therefore be denied. That's generally what you do in an ACL.&lt;BR /&gt;&lt;BR /&gt;If you want to permit the remaining traffic the ACL would need changing, to deny on your requirements 2,3,4 and 5 and then the last rule could be permit...but that isn't as secure as having the "deny ip any any" rule that has been defined currently.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 05 May 2018 12:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378610#M959468</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T12:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378616#M959470</link>
      <description>Hello RJI,&lt;BR /&gt;Once again thanks for your reply should I exactly use this ACL configuration in my router as my Router0 external interface Se1/0 has IP address 203.1.1.2 which is connected to ISP router. Please advice</description>
      <pubDate>Sat, 05 May 2018 12:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378616#M959470</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T12:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378620#M959472</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Do you have any static NAT entries for the SMTP/IMAP server(s)? If not what is the private IP address of these server(s)? Are you planning on using 203.1.1.2 as the public ip address for this servers or do you have another IP address to dedicate for this use?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which ACL do you want to use? The original with the deny ip any any at the end or ?&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 13:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378620#M959472</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T13:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378621#M959473</link>
      <description>Hello RJI,&lt;BR /&gt;Thanks for your reply&lt;BR /&gt;No I do not have any static entries for SMTP/IMAP server. There are four servers having IP address:&lt;BR /&gt;&lt;BR /&gt;Email server : 10.1.11.20/24&lt;BR /&gt;Webserver: 10.1.11.21/24&lt;BR /&gt;Fileserver for HR: 10.1.11.23/24&lt;BR /&gt;Domain controller of Windows 2016: 10.1.11.24/24&lt;BR /&gt;My other IP addresses are 10.1.20.0/24, 10.1.10.0/24&lt;BR /&gt;&lt;BR /&gt;See what I want to acheive technically this:&lt;BR /&gt;Deny all IP packets containing the following IP addresses in their source field:&lt;BR /&gt;Any local host addresses (127.0.0.0/8)&lt;BR /&gt;Any reserved private addresses (RFC 1918)&lt;BR /&gt;Any addresses in the IP multicast address range (224.0.0.0/4)&lt;BR /&gt;&lt;BR /&gt;Allow, DNS, SMTP, and FTP must be allowed through a firewall.&lt;BR /&gt;and id there is any way to mitigate ICMP Abuse that for example hackers from external source ICMP packets for pings sweeps and DoS flood attacks, and use ICMP redirect messages to alter host routing tables&lt;BR /&gt;&lt;BR /&gt;So please help&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 05 May 2018 13:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378621#M959473</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T13:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378631#M959474</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;This ACL below should meet your requirements. Traffic from source of Loopback, mutlicast and private addresses are explicitly denied. &lt;U&gt;Inbound&lt;/U&gt; SMTP and IMAP is permitted, any other traffic (which includes ICMP as per your requirement) is blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You mention allowing DNS, SMTP and FTP should be allowed through the firewall, I assume you mean OUTBOUND? This ACL below is applied on the Serial interface INBOUND, so no OUTBOUND traffic will be denied, in fact all OUTBOUND traffic will be allowed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;ip access-list extended WAN_ACL&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description DENY SPECIAL USE ADDRESSES&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 127.0.0.0 0.255.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 192.0.2.0 0.0.0.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 224.0.0.0 31.255.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description DENY RFC 1918&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 10.0.0.0 0.255.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 192.168.0.0 0.0.255.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip 172.16.0.0 0.0.15.255 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description PERMIT SMTP&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.1.1.2 eq 25&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description PERMIT IMAP and IMAPS&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.1.1.2 eq 143&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;permit tcp any host 203.1.1.2 eq 993&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;description DENY ALL REMAINING TRAFFIC&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;deny ip any any&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;interface serial 1/0&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;ip access-group WAN_ACL in&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;Define static NAT entries for the Mail Server on the SMTP and IMAP ports. No other static NAT mappings need to be applied as you are only allowing inbound SMTP/IMAP.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 25 interface Serial 1/0 25&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 143 interface Serial 1/0 143&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 993 interface Serial 1/0 993&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably want to leave the original NAT overload command in place, that is the NAT for all servers/pcs on the network, allowing them internet access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 14:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378631#M959474</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T14:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378648#M959475</link>
      <description>Hello RJI&lt;BR /&gt;&lt;BR /&gt;Thanks for your help once again&lt;BR /&gt;I tried to run the following command in global configuration mode but it gave me error&lt;BR /&gt;&lt;BR /&gt;ip nat inside source static tcp 10.1.11.20 25 interface Serial 1/0 25&lt;BR /&gt;ip nat inside source static tcp 10.1.11.20 143 interface Serial 1/0 143&lt;BR /&gt;ip nat inside source static tcp 10.1.11.20 993 interface Serial 1/0 993&lt;BR /&gt;</description>
      <pubDate>Sat, 05 May 2018 14:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378648#M959475</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T14:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378651#M959476</link>
      <description>Can you post the error message here please?</description>
      <pubDate>Sat, 05 May 2018 14:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378651#M959476</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T14:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378662#M959477</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="errornat.jpg" style="width: 516px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/11512iC75556036C4CD1B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="errornat.jpg" alt="errornat.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 15:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378662#M959477</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T15:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378663#M959478</link>
      <description>&lt;P&gt;I don't have packet tracer, I assume the command (possible the serial interface) is not accepted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 25 203.1.1.2 25&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 143 203.1.1.2 143&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.1.11.20 993 203.1.1.2 993&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 15:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378663#M959478</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T15:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378665#M959479</link>
      <description>Thanks RJI for your help onething when I open any PC in packet tracer and in webbrowser enter external webserver IP address 8.8.8.8 it says Request time out</description>
      <pubDate>Sat, 05 May 2018 15:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378665#M959479</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T15:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378668#M959480</link>
      <description>If you are running this in packet tracer then is there any device with an IP address of 8.8.8.8?</description>
      <pubDate>Sat, 05 May 2018 15:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378668#M959480</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T15:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378671#M959481</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8888.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/11513iC2B64DF4E3ACBD60/image-size/large?v=v2&amp;amp;px=999" role="button" title="8888.jpg" alt="8888.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 16:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378671#M959481</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T16:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378674#M959482</link>
      <description>Is the default gateway of the 8.8.8.8 server 8.8.8.1? &lt;BR /&gt;Can 8.8.8.8 ping 203.1.1.1?&lt;BR /&gt;&lt;BR /&gt;Which router your traffic is routed out of can you see if traffic is being natted? Ping from one of the PCs and run "show ip nat translations" on the router that traffic is routed through</description>
      <pubDate>Sat, 05 May 2018 16:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378674#M959482</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T16:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378676#M959483</link>
      <description>Yes it can ping 203.1.1.1 and the default gateway is 8.8.8.1&lt;BR /&gt;</description>
      <pubDate>Sat, 05 May 2018 16:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378676#M959483</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T16:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378678#M959484</link>
      <description>Which router your traffic is routed out of can you see if traffic is being natted? Ping from one of the PCs and run "show ip nat translations" on the router that traffic is routed through &lt;BR /&gt;&lt;BR /&gt;What is the output??</description>
      <pubDate>Sat, 05 May 2018 16:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378678#M959484</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-05-05T16:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Access control List</title>
      <link>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378682#M959486</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nattranslation.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/11514iABEF5613E2F1348F/image-size/large?v=v2&amp;amp;px=999" role="button" title="nattranslation.jpg" alt="nattranslation.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 May 2018 16:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-control-list/m-p/3378682#M959486</guid>
      <dc:creator>osamafaheem1974</dc:creator>
      <dc:date>2018-05-05T16:23:14Z</dc:date>
    </item>
  </channel>
</rss>

