cyberspace
Technical User
I'm currently configuring a 3Com 5012 which will be the new default gateway for office PCs.
I have been setting up access control lists to secure the network.
the setup is as follows:
interface Ethernet0/0
ip address 192.168.1.254 255.255.255.0
#
interface Ethernet2/0
ip address 10.0.0.2 255.255.255.252
Eth0/0 is the LAN, eth2/0 is for the connection to an ADSL router to get online.
I'm getting a little confused about ACL directions.
I want to allow only http, https, telnet, ftp and echo services to be able to go out on to the internet, and obviously I want these services to be able to return to the user. However I don't just want anybody telnetting in!
So i thought that this ACL:
acl number 3000
rule 1 permit tcp source 192.168.1.0 0.0.0.255 source-port eq www
rule 2 permit tcp source 192.168.1.0 0.0.0.255 source-port eq ftp
rule 3 permit tcp source 192.168.1.0 0.0.0.255 source-port eq echo
rule 4 permit tcp source 192.168.1.0 0.0.0.255 source-port eq 443
rule 5 permit tcp source 192.168.1.0 0.0.0.255 source-port eq ftp-data
rule 6 permit tcp source 192.168.1.0 0.0.0.255 source-port eq telnet
applied to the eth2/0 interface OUTBOUND would be ok. However with this applied, ping's dont respond from internal PCs even to the eth0/0 address
similarly when i was logged in i applied this acl to the eth0/0 interface INBOUND:
rule 2 permit tcp destination 192.168.1.0 0.0.0.255 destination-port eq echo
I forgot to add telnet so I lost the connection to the router...no big deal
So basically i'm left a little confused as to the direction of ACLs, and how I need to set it up for my requirements. Any advice you can give would be appreciated - basically I just want to know i'm on the right lines and that what i'm doing won't pose a security risk when it goes live. Thanks.
'When all else fails.......read the manual'
I have been setting up access control lists to secure the network.
the setup is as follows:
interface Ethernet0/0
ip address 192.168.1.254 255.255.255.0
#
interface Ethernet2/0
ip address 10.0.0.2 255.255.255.252
Eth0/0 is the LAN, eth2/0 is for the connection to an ADSL router to get online.
I'm getting a little confused about ACL directions.
I want to allow only http, https, telnet, ftp and echo services to be able to go out on to the internet, and obviously I want these services to be able to return to the user. However I don't just want anybody telnetting in!
So i thought that this ACL:
acl number 3000
rule 1 permit tcp source 192.168.1.0 0.0.0.255 source-port eq www
rule 2 permit tcp source 192.168.1.0 0.0.0.255 source-port eq ftp
rule 3 permit tcp source 192.168.1.0 0.0.0.255 source-port eq echo
rule 4 permit tcp source 192.168.1.0 0.0.0.255 source-port eq 443
rule 5 permit tcp source 192.168.1.0 0.0.0.255 source-port eq ftp-data
rule 6 permit tcp source 192.168.1.0 0.0.0.255 source-port eq telnet
applied to the eth2/0 interface OUTBOUND would be ok. However with this applied, ping's dont respond from internal PCs even to the eth0/0 address
similarly when i was logged in i applied this acl to the eth0/0 interface INBOUND:
rule 2 permit tcp destination 192.168.1.0 0.0.0.255 destination-port eq echo
I forgot to add telnet so I lost the connection to the router...no big deal
So basically i'm left a little confused as to the direction of ACLs, and how I need to set it up for my requirements. Any advice you can give would be appreciated - basically I just want to know i'm on the right lines and that what i'm doing won't pose a security risk when it goes live. Thanks.
'When all else fails.......read the manual'