<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL on ROUTER for Active Directory in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368411#M975081</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;It's in a private network without any internet connectivity and NAT, LDAP/SSL, GC/SSL are not applicable.&lt;/P&gt;</description>
    <pubDate>Wed, 18 Apr 2018 18:24:58 GMT</pubDate>
    <dc:creator>avilt</dc:creator>
    <dc:date>2018-04-18T18:24:58Z</dc:date>
    <item>
      <title>ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368100#M975079</link>
      <description>&lt;P&gt;I have a router with two segments. Outside segment is the client and inside is the domain controller.&lt;/P&gt;
&lt;P&gt;I need to define ACL on Outside interface to allow communication for active directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Router will use packet filter ACL (no state full inspection).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Asuming the firewall port requirements listed in the below URL what should be my ACL for Outside interface for both Ingress and Egress?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/832017/service-overview-and-network-port-requirements-for-windows" target="_blank"&gt;https://support.microsoft.com/en-us/help/832017/service-overview-and-network-port-requirements-for-windows&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;RPC endpoint mapper: port 135 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;NetBIOS name service: port 137 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;NetBIOS datagram service: port 138 UDP&lt;/LI&gt;
&lt;LI&gt;NetBIOS session service: port 139 TCP&lt;/LI&gt;
&lt;LI&gt;SMB over IP (Microsoft-DS): port 445 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;LDAP: port 389 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;Global catalog LDAP: port 3268 TCP&lt;/LI&gt;
&lt;LI&gt;Kerberos: port 88 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;DNS: port 53 TCP, UDP&lt;/LI&gt;
&lt;LI&gt;RPC: Dynamically-assigned ports TCP, &lt;SPAN&gt;Random port number between 49152 and 65535&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368100#M975079</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2020-02-21T15:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368151#M975080</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you clarify something please. Is the outside the internet? In which case opening these ports is a really bad idea, not secure. Or is this a private LAN/WAN?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What other traffic is likely to ingress/egress this router? If an ACL is applied for just this DC traffic, it's likely to break something else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you require NAT? If you do that, DNS won't work, it would return the private IP address of the DC and not the NATTED address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The list you've provided looks pretty accurate, do you use LDAPS in your environment?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Apr 2018 13:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368151#M975080</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-04-18T13:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368411#M975081</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;It's in a private network without any internet connectivity and NAT, LDAP/SSL, GC/SSL are not applicable.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Apr 2018 18:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368411#M975081</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2018-04-18T18:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368439#M975082</link>
      <description>&lt;P&gt;Assuming there is no other traffic coming over the outside interface, try this:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ip access-list extended DC&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 135&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 135&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 137&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 137&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 138&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 139&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 445&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 445&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 389&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 389&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 3268&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 88&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 88&lt;BR /&gt;&amp;nbsp;permit udp host CLIENT-IP host DC-IP eq 53&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP eq 53&lt;BR /&gt;&amp;nbsp;permit tcp host CLIENT-IP host DC-IP range 49152 65535&lt;BR /&gt;\\ Optional - apply log command to identify any drops. Use for testing initially to confirm everything it working, then remove.&lt;BR /&gt;&amp;nbsp;deny ip any any log&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;interface GigabitEthernet X&lt;/P&gt;
&lt;P&gt;&amp;nbsp;description OUTSIDE interface&lt;BR /&gt;&amp;nbsp;ip access-group DC in&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;You would obviously need to replace the CLIENT-IP and DC-IP value with the ip address for your network.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Apr 2018 19:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368439#M975082</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-04-18T19:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368807#M975083</link>
      <description>&lt;P&gt;This ACL will allow communication from client to DC.&lt;/P&gt;
&lt;P&gt;But how about return connections that were initiated from the DC to client?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 08:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368807#M975083</guid>
      <dc:creator>avilt</dc:creator>
      <dc:date>2018-04-19T08:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368841#M975084</link>
      <description>Try:&lt;BR /&gt;ip access-list extended DC1&lt;BR /&gt; permit udp host CLIENT-IP eq 135 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 135 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 137 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 137 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 138 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 139 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 445 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 445 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 389 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 389 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 3268 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 88 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 88 host DC-IP &lt;BR /&gt; permit udp host CLIENT-IP eq 53 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP eq 53 host DC-IP &lt;BR /&gt; permit tcp host CLIENT-IP range 49152 65535 host DC-IP</description>
      <pubDate>Thu, 19 Apr 2018 09:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3368841#M975084</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-04-19T09:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: ACL on ROUTER for Active Directory</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3937898#M975085</link>
      <description>&lt;P&gt;Outbound initiated connections are allowed back in because that port is listening for the return of the request.&amp;nbsp; The router identifies that as a valid communication as it is started from within the firewall.&amp;nbsp; It is just like the default router you have for you home internet.&amp;nbsp; Do you have to go into the router and tell it to allow a website i.e. port 443, to reply to your request?&amp;nbsp; The return of information to a request is allowed through.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-router-for-active-directory/m-p/3937898#M975085</guid>
      <dc:creator>kvnkoeppen</dc:creator>
      <dc:date>2019-10-09T13:30:52Z</dc:date>
    </item>
  </channel>
</rss>

