<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access list problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763266#M970420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;0.0.94.255 is not a valid wildcard mask. The only valid numbers are 0, 1, 3, 7, 15, 31, 63, 127, and 255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To turn a netmask into a wildcard mask, simply subtract each octet from 255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;255.255.240.0 becomes 0.0.15.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Aug 2007 15:02:51 GMT</pubDate>
    <dc:creator>jeremyault</dc:creator>
    <dc:date>2007-08-30T15:02:51Z</dc:date>
    <item>
      <title>Access list problem</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763263#M970417</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   I'm new and trying to work out an access-list for my home Internet connection.  I've replaced my Linksys with a 2514 router and want to implement access lists to keep my home PCs safe.  I've read similar posts and am using the statements that I've seen however I'm unable to connect to any web sites when I apply the list.  Any help would be appreciated.  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ersion 12.3&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service udp-small-servers&lt;/P&gt;&lt;P&gt;service tcp-small-servers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname 2514B&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 xxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;enable password 7 xxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.126.1&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.126.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool DHCPPool&lt;/P&gt;&lt;P&gt;   import all&lt;/P&gt;&lt;P&gt;   network 192.168.126.0 255.255.255.240&lt;/P&gt;&lt;P&gt;   default-router 192.168.126.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description Outside interface&lt;/P&gt;&lt;P&gt; ip address dhcp&lt;/P&gt;&lt;P&gt; ip access-group Incoming in&lt;/P&gt;&lt;P&gt; ip access-group Outgoing out&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; ntp disable&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; hold-queue 32 in&lt;/P&gt;&lt;P&gt; hold-queue 100 out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; description Inside interface&lt;/P&gt;&lt;P&gt; ip address 192.168.126.1 255.255.255.240&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface Ethernet0 overload&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended Incoming&lt;/P&gt;&lt;P&gt; remark Deny NetBIOS Name, Datagram and Session service&lt;/P&gt;&lt;P&gt; deny   udp any range netbios-ns netbios-ss any&lt;/P&gt;&lt;P&gt; deny   tcp any range 137 139 any&lt;/P&gt;&lt;P&gt; remark Only allow ACKed tcp packets to our network&lt;/P&gt;&lt;P&gt; permit tcp any 192.168.126.0 0.0.0.255 gt 1023 established&lt;/P&gt;&lt;P&gt; remark Allow DHCP replies to reach the e0 interface&lt;/P&gt;&lt;P&gt; permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt; remark Allow DNS queries&lt;/P&gt;&lt;P&gt; permit tcp any eq domain any&lt;/P&gt;&lt;P&gt; permit udp any eq domain any&lt;/P&gt;&lt;P&gt; remark Only allow specific ICMP message type &amp;amp; code&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 net-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 host-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 port-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 packet-too-big&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 administratively-prohibited&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 source-quench&lt;/P&gt;&lt;P&gt; permit icmp any 192.168.126.0 0.0.0.255 ttl-exceeded&lt;/P&gt;&lt;P&gt;ip access-list extended Outgoing&lt;/P&gt;&lt;P&gt; remark Don't allow internal hosts to send icmp&lt;/P&gt;&lt;P&gt; deny   icmp any any&lt;/P&gt;&lt;P&gt; remark Only allow packets from the internal network&lt;/P&gt;&lt;P&gt; permit ip 192.168.126.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.126.0 0.0.0.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 20 0&lt;/P&gt;&lt;P&gt; password 7 xxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; password 7 xxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 1 in&lt;/P&gt;&lt;P&gt; exec-timeout 20 0&lt;/P&gt;&lt;P&gt; password 7 xxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt; login&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763263#M970417</guid>
      <dc:creator>rileymartin</dc:creator>
      <dc:date>2019-03-11T11:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access list problem</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763264#M970418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..  remember that you are using NAT and so any reference to 192.168.126.0 network on the Incoming access-list needs to be replaced by the  IP address allocated to your e0 interface as 192.168.126.0 is not reachable from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same thing with the outgoing access list,  you might want to try replacing the last entry by permit ip host &lt;IP address="" of="" your="" e0="" interface=""&gt; any&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps   ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2007 22:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763264#M970418</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-08-29T22:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access list problem</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763265#M970419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I replaced the references to the 192.168.126.0 network with the address of my external interface and it now works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't want to have to update my ACL every time the DHCP address of my cablemodem changes so I thought I could specify the network and a wildcard mask however I must not be calculating it correctly because I tried that and I couldn't get out again.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I tried:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The address on the outside interface provided by my cablemodem is 24.46.171.29/20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I calculated that the subnet mask is 255.255.240.0 and the network address is 24.46.160.0.  Next I figured the wildcard mask should be the network number plus all the addresses on that network which I calculated as 24.46.160.0 0.0.94.255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My inbound ACL on my outside interface is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Incoming&lt;/P&gt;&lt;P&gt; remark Deny NetBIOS Name, Datagram and Session service&lt;/P&gt;&lt;P&gt; deny   udp any range netbios-ns netbios-ss any&lt;/P&gt;&lt;P&gt; deny   tcp any range 137 139 any&lt;/P&gt;&lt;P&gt; remark Only allow ACKed tcp packets to our network&lt;/P&gt;&lt;P&gt; permit tcp any 24.46.160.0 0.0.94.255 gt 1023 established&lt;/P&gt;&lt;P&gt; remark Allow DHCP replies to reach the e0 interface&lt;/P&gt;&lt;P&gt; permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt; remark Allow DNS queries&lt;/P&gt;&lt;P&gt; permit tcp any eq domain any&lt;/P&gt;&lt;P&gt; permit udp any eq domain any&lt;/P&gt;&lt;P&gt; remark Only allow specific ICMP message type &amp;amp; code&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 net-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 host-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 port-unreachable&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 packet-too-big&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 administratively-prohibited&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 source-quench&lt;/P&gt;&lt;P&gt; permit icmp any 24.46.160.0 0.0.94.255 ttl-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2007 14:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763265#M970419</guid>
      <dc:creator>rileymartin</dc:creator>
      <dc:date>2007-08-30T14:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access list problem</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763266#M970420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;0.0.94.255 is not a valid wildcard mask. The only valid numbers are 0, 1, 3, 7, 15, 31, 63, 127, and 255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To turn a netmask into a wildcard mask, simply subtract each octet from 255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;255.255.240.0 becomes 0.0.15.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2007 15:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763266#M970420</guid>
      <dc:creator>jeremyault</dc:creator>
      <dc:date>2007-08-30T15:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access list problem</title>
      <link>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763267#M970421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you jeremyault and fernando_meza.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I updated my ACL with the network and wildcard mask of my outside interface and so far everything's working fine.  With the subnet and wildcard mask I won't have to change my ACL whenever I get a new DHCP address from my cablemodem.  If I do, I'll just add that network as well.  Thanks again to both of you for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Aug 2007 01:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-problem/m-p/763267#M970421</guid>
      <dc:creator>rileymartin</dc:creator>
      <dc:date>2007-08-31T01:48:15Z</dc:date>
    </item>
  </channel>
</rss>

