cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1432
Views
0
Helpful
3
Replies

understand access list

liorbachar
Level 1
Level 1

hello to every one,

i want to create acess list that prevent the truffic from the internet to my organization.

i do it in the packet tracer .

 

!

!

ip access-list standard no-entry

deny any

!

and i doit on port g/0.10.

and the access list block the internet from outside to inside .but when i do ping from the organization to outside access list blocked it again and i want only from outside to inside.

 

someone can help me please.

blockPublicIp.png

3 Replies 3

Muhammad Awais Khan
Cisco Employee
Cisco Employee

Hi,

 

 

In your scenario, with  ACL you configured of deny any any, your network from inside cannot access any thing to outside . The interface where you applied this ACL is going to block every thing, doesn't matter if the session is new or existing. To maintain the existing connections from inside to outside network and blocking any new session from outside to inside, you need to consider configuring Zone Base Firewall on your Router.

 

 Have a look on below steps mentioned to configure. In summary you will be creating zones like inside and outside on your Router and you will define policies to control the traffic between those interfaces zone

 

https://community.cisco.com/t5/security-documents/ios-zone-based-firewall-step-by-step-basic-configuration/ta-p/3142774

 

 

 

alicoluk
Level 1
Level 1

Because you written a ACL that denys all, you will no able to send ICMP packets from outside. But if you try to send any ICMP packet from inside, like ICMP request packet, you can do that. The firewall that you are using is a stateful firewall, so you configure the firewall to behave ICMP traffic as sessions also. 

#fixup protocol ICMP

This command above enable you to 

Because you have written an ACL that denies all, you will no able to send ICMP packets from outside. But if you try to send any ICMP packet from inside, like the ICMP request packet, you can do that. The firewall that you are using is a stateful firewall, so you configure the firewall to behave ICMP traffic as sessions also. 

#fixup protocol ICMP

This command above enables you to threaten ICMP packets as sessions and when an ICMP reply hits your firewall, it will not be denied. Finally, you also need to apply an ACL after you write this command. 

Review Cisco Networking for a $25 gift card