08-21-2015 08:45 AM - edited 03-05-2019 02:07 AM
Is there a security risk if we put an IP address in the access list which is not a part of the network, in a cisco router?
08-21-2015 08:51 AM
The question is too general ie. it depends on where the acl is, whether is it inbound or outbound etc.
People often use "any" with internal acls but obviously with internet facing devices you need to be a lot more careful.
Difficult to answer with more details.
Jon
08-21-2015 08:57 AM
I will explain more I found the following access list, in a cisco router 2811
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 23 permit 192.168.140.0 0.0.0.255
access-list 23 permit 192.168.141.0 0.0.0.255
access-list 23 permit 192.168.142.0 0.0.0.255
access-list 23 permit 192.168.143.0 0.0.0.255
access-list 23 permit 192.168.144.0 0.0.0.255
access-list 23 permit 192.168.145.0 0.0.0.255
access-list 23 permit 138.222.0.0 0.0.255.255
access-list 23 permit 10.49.0.0 0.0.255.255
Ip address marked in bold in the command bellow are not part of our network? what is the risk ? is there a security risk?
08-23-2015 04:25 PM
Hi,
Actually it depends on the use case of the ACL. Maybe it's just a list of IPs referenced in a route-map, or SNMP access, or vty access, or applied to interfaces, etc.
In the last case for example, if someone unauthorized, gets a device connected to your network where these subnets are routed, and assigns an IP to the device in these ranges, then he could gain access to something...
Regards,
Mohammad
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide