03-14-2018 09:39 AM - edited 03-08-2019 02:15 PM
Hi,
I have a Cisco 3550 facing the Internet in front of a FW. what type(s) of generic ACLS should be configured on it? I mean is there a set of general ACLs to make sure no spoofing and other forms of attacks takes place?
thank you,
Masood
Solved! Go to Solution.
03-14-2018 10:42 AM - edited 03-14-2018 10:44 AM
Hi,
It depends on your environment but you can start with These. In addition, you probably want to block ICMP, Telnet, SSH, NTP from outside to your public IP. If you have to allow anything to access the device, it should only be SSH.
Here is also a site that abusive IP are being reported to, so you may want to block them if these IPs don't need to reach your internal network.
deny ip 192.0.2.0 0.0.0.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 224.0.0.0 31.255.255.255 any l
deny ip 10.0.0.0 0.255.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
It is also a good practice to be selective in your alow list and allow any what you need to allow and no more (e.g https, HTTP, etc..).
HTH
03-14-2018 10:46 AM
Hello,
the below is usually used for anti spoofing. The last line, permit ip any any, should be replaced with your own internal IP range:
ip access-list extended ANTI_SPOOF
deny ip 10.0.0.0 0.255.255.255 --> RFC1918 Private Range
deny ip 172.16.0.0 0.15.255.255 any --> RFC1918 Private Range
deny ip 192.168.0.0 0.0.255.255 any --> RFC1918 Private Range
deny ip 224.0.0.0 31.255.255.255 any --> Multicast Range
deny ip 127.0.0.0 0.255.255.255 any --> RF3330 Loopback Range
deny ip 169.254.0.0 0.0.255.255 any --> MS Windows Loopback Range
permit ip any any
03-14-2018 10:56 AM
03-14-2018 10:42 AM - edited 03-14-2018 10:44 AM
Hi,
It depends on your environment but you can start with These. In addition, you probably want to block ICMP, Telnet, SSH, NTP from outside to your public IP. If you have to allow anything to access the device, it should only be SSH.
Here is also a site that abusive IP are being reported to, so you may want to block them if these IPs don't need to reach your internal network.
deny ip 192.0.2.0 0.0.0.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 224.0.0.0 31.255.255.255 any l
deny ip 10.0.0.0 0.255.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
It is also a good practice to be selective in your alow list and allow any what you need to allow and no more (e.g https, HTTP, etc..).
HTH
03-14-2018 10:46 AM
03-14-2018 10:49 AM
03-14-2018 10:47 AM
03-14-2018 10:46 AM
Hello,
the below is usually used for anti spoofing. The last line, permit ip any any, should be replaced with your own internal IP range:
ip access-list extended ANTI_SPOOF
deny ip 10.0.0.0 0.255.255.255 --> RFC1918 Private Range
deny ip 172.16.0.0 0.15.255.255 any --> RFC1918 Private Range
deny ip 192.168.0.0 0.0.255.255 any --> RFC1918 Private Range
deny ip 224.0.0.0 31.255.255.255 any --> Multicast Range
deny ip 127.0.0.0 0.255.255.255 any --> RF3330 Loopback Range
deny ip 169.254.0.0 0.0.255.255 any --> MS Windows Loopback Range
permit ip any any
03-14-2018 10:49 AM
03-14-2018 10:52 AM
03-14-2018 10:56 AM
Then you apply the ACLs to the SVI.
HTH
03-14-2018 10:57 AM
Thank you.
best Regards,
Masood
03-15-2018 03:02 AM
03-15-2018 06:27 AM
03-15-2018 06:53 AM
03-15-2018 07:19 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide