ACL to block all inbound traffic to a single host
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 09:44 AM
I have been trying for the last three hours to create an ACL to block all incoming traffic to a single host with no success.
I created
ip access-list extended NOC
deny icmp any host 192.40.120.4 log
deny tcp any host 192.40.120.4 log
deny udp any host 192.40.120.4 log
and it was accepted by the ASR but wasn't stopping anything. I really need this to work.
- Labels:
-
ASR 1000 Series
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 09:47 AM
HI there,
Is the ACL applied outbound on the Layer3 interface which is the gateway for the single host?
cheers,
Seb.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 10:16 AM
I didn't apply directly to any interface. Im sorry I am noob stupid on ACLs. I just went into the configuration terminal and added the extended acl then started adding the acl rules.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 10:24 AM
Hello,
the access list looks good. As suggested, you need to apply it outbound to the interface behind which your host is sitting, e.g.:
interface GigabitEthernet0/0/0
ip access-group NOC out
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 10:35 AM
You said access-group. I only have an access-list. What am I missing?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 10:36 AM
"ip access-group" is how you apply an acl to an interface.
Jon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 10:35 AM
Just to add to Georg's post.
That acl would block all traffic not just to that host.
If you don't want that then add a "permit ip any any" to the end of it .
Jon
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 11:57 AM - edited 09-17-2020 11:58 AM
Just to add to what the other posters have noted. You can block all IP traffic (not just ICMP, TCP and UDP), to that host, with one ACE i.e.:
ip access-list extended NOC
deny ip any host 192.40.120.4 log
permit ip any any !this is needed because Cisco ACLs all have an implicit deny any any at the end of the ACL. (This is why Jon posted what he did.)
Also ACL might be applied either in or out, but which to use depends on the flow of traffic to the host.
If you had host <> e1 router e2, you could do either:
interface e1
ip access-group NOC out
!or
interface e2
ip access-group NOC in
An "in" ACL is more efficient than an "out" ACL, so from that aspect, you would use the second choice, above. However, if the router had multiple interfaces, that traffic to your host might ingress, you would need an "in" ACL on each. So, from a configuration standpoint, just using the first choice, above, would be simpler.
Lastly, use the "log" option with care, as it slows ACL processing.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-17-2020 12:09 PM
I got it now. I changed the ACL to access-list 102 permit tcp any any established
access-list 102 deny tcp any host 192.40.120.4 eq 22 log
access-list 102 deny icmp any host 192.40.120.4 log
access-list 102 permit ip any any
and added ip access-group 102 in to my WAN and the acl is working. Thank you!
