Our firewall has an IDS solution that does blacklisting of IPs. We haven't been able to use this feature because of our internal IPs (10.0.0.x) being spoofed from the outside coming in, and therefore blacklisting internal users. To clear thos IPs off of the blacklist I have to reboote the FW appliance.
I have not worked on routers that much, but have been trying to learn as much as possible. I set up an ACL to hopefully prevent LAN IPs from being spoofed.
Router is a Cisco 1601, w/ IOS 11.1
Here is my ACL:
! Deny LAN IPs from being spoofed
access-list 1 deny 10.0.0.0 0.255.255.255
access-list 1 deny 192.168.0.0 0.0.255.255
access-list 1 permit 0.0.0.0 255.255.255.255
Everything else is allowed in because our firewall appliance controls all of the security.
I applied this to our external interface, Serial0 by the following:
Config t
int s0
ip access-group 1 in
The end of our config is as such:
interface Serial0
ip address x.x.x.x x.x.x.x
ip access-group 1 in
bandwidth 512
!
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0
logging buffered
access-list 1 deny 10.0.0.0 0.255.255.255
access-list 1 deny 192.168.0.0 0.0.255.255
access-list 1 permit any
snmp-server community public RO
!
line con 0
line vty 0 4
password
login
Does this look correct? Also, I wanted to turn on logging for the first two lines like this:
access-list 1 deny 10.0.0.0 0.255.255.255 log
....but it does not work. Anyone know how to enable logging on this access list? Thanks.
I have not worked on routers that much, but have been trying to learn as much as possible. I set up an ACL to hopefully prevent LAN IPs from being spoofed.
Router is a Cisco 1601, w/ IOS 11.1
Here is my ACL:
! Deny LAN IPs from being spoofed
access-list 1 deny 10.0.0.0 0.255.255.255
access-list 1 deny 192.168.0.0 0.0.255.255
access-list 1 permit 0.0.0.0 255.255.255.255
Everything else is allowed in because our firewall appliance controls all of the security.
I applied this to our external interface, Serial0 by the following:
Config t
int s0
ip access-group 1 in
The end of our config is as such:
interface Serial0
ip address x.x.x.x x.x.x.x
ip access-group 1 in
bandwidth 512
!
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0
logging buffered
access-list 1 deny 10.0.0.0 0.255.255.255
access-list 1 deny 192.168.0.0 0.0.255.255
access-list 1 permit any
snmp-server community public RO
!
line con 0
line vty 0 4
password
login
Does this look correct? Also, I wanted to turn on logging for the first two lines like this:
access-list 1 deny 10.0.0.0 0.255.255.255 log
....but it does not work. Anyone know how to enable logging on this access list? Thanks.