취소
다음에 대한 결과 표시 
다음에 대한 검색 
다음을 의미합니까? 
cancel
346
VIEWS
3
Helpful
5
답글

Ignore ACLs.

cnsa
Level 1
Level 1

We've configured ACLs to block access from the outside, so our OSPF neighbors are also down, which is a challenge.
The condition says not to use ACL Permit, only Deny, does anyone have any idea?

3 채택된 솔루션

채택된 솔루션

M02@rt37
VIP
VIP

Hello @cnsa 

You can achieve this by being selective about what you deny, ensuring that OSPF traffic is still allowed through by not explicitly denying it.

ip access-list extended OUTSIDE-IN
deny ip any any eq 80 ** Deny HTTP traffic
deny ip any any eq 443 ** Deny HTTPS traffic
deny ip any any eq 23 ** Deny Telnet traffic
deny ip any any eq 22 ** Deny SSH traffic
deny ip any any eq 3389 ** Deny RDP traffic
** Do not explicitly deny OSPF traffic (protocol 89)
** implicit deny all other traffic

--

In this configuration:

  • Specific types of traffic such as HTTP, HTTPS, Telnet, SSH, and RDP are explicitly denied.
  • OSPF traffic (protocol 89) is not mentioned and thus is not denied.
Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

원본 게시물의 솔루션 보기

The Answer to your Q is your other Q

 without permit ip any any the traffic will drop becuase ACL have implicit deny any any in end.

So you need to use permit in ACL or use CoPP which as your previous Q not work in packet tracer

MHM

원본 게시물의 솔루션 보기

this lab for you @cnsa 
the ACL end with hidden deny any any 
so what you want to achieve can t be done without using permit OR using CoPP

lab I appply ACL deny only ICMP but since we dont use permit the ospf also deny by hidden ACL

MHM

Screenshot (551).pngScreenshot (552).pngScreenshot (553).pngScreenshot (554).png

원본 게시물의 솔루션 보기

5 응답 5

M02@rt37
VIP
VIP

Hello @cnsa 

You can achieve this by being selective about what you deny, ensuring that OSPF traffic is still allowed through by not explicitly denying it.

ip access-list extended OUTSIDE-IN
deny ip any any eq 80 ** Deny HTTP traffic
deny ip any any eq 443 ** Deny HTTPS traffic
deny ip any any eq 23 ** Deny Telnet traffic
deny ip any any eq 22 ** Deny SSH traffic
deny ip any any eq 3389 ** Deny RDP traffic
** Do not explicitly deny OSPF traffic (protocol 89)
** implicit deny all other traffic

--

In this configuration:

  • Specific types of traffic such as HTTP, HTTPS, Telnet, SSH, and RDP are explicitly denied.
  • OSPF traffic (protocol 89) is not mentioned and thus is not denied.
Best regards
.ı|ı.ı|ı. If This Helps, Please Rate .ı|ı.ı|ı.

that Sure not work 
but anyway he OK with this solution 
MHM

The Answer to your Q is your other Q

 without permit ip any any the traffic will drop becuase ACL have implicit deny any any in end.

So you need to use permit in ACL or use CoPP which as your previous Q not work in packet tracer

MHM

this lab for you @cnsa 
the ACL end with hidden deny any any 
so what you want to achieve can t be done without using permit OR using CoPP

lab I appply ACL deny only ICMP but since we dont use permit the ospf also deny by hidden ACL

MHM

Screenshot (551).pngScreenshot (552).pngScreenshot (553).pngScreenshot (554).png

Thank you very much for your response.

빠른 링크