Hey Dan,
I saw some stuff about CBAC this morning when I was researching the ACL stuff. I will look more @ CBAC
**************************************************
Memory - cisco 2621 (MPC860) processor (revision 0x102) with 36864K/4096K bytes of memor
Code - System image file is "flash:c2600-io3-mz.123-19.bin"
***********************************************************
sho flash - [8072264 bytes used, 8704948 available, 16777212 total]
***********************************************************
I am open for suggestions on code that will fit on the 2600
***********************************************************
Here is what I have so far for the 2600
Let me know what ya think

Thanks,
Joe
********************************************
access-list 102 deny tcp any any eq ftp
access-list 102 deny tcp any any eq ftp-data
access-list 102 deny tcp any any eq 23
access-list 102 deny icmp any any
access-list 102 deny tcp any any eq 25
access-list 102 deny tcp any any eq 22
access-list 102 deny tcp any any eq 110
access-list 102 deny tcp any any eq 143
access-list 102 permit ip any any
#############################################
DENIES IMAP TRAFFIC FROM THE INTERNET
*************************************
access-list 102 deny tcp any any eq 143
#############################################
DENIES POP3 TRAFFIC FROM THE INTERNET
*************************************
access-list 102 deny tcp any any eq 110
#############################################
DENIES SSH TRAFFIC FROM THE INTERNET
************************************
access-list 102 deny tcp any any eq 22
#############################################
DENIES FTP TRAFFIC FROM THE INTERNET
************************************
access-list 102 deny tcp any any eq ftp
access-list 102 deny tcp any any eq ftp-data
#############################################
DENIES TELNET TRAFFIC FROM THE INTERNET
**************************************
access-list 102 deny tcp any any eq 23
access-list 102 permit ip any any
#############################################
DENIES ICMP TRAFFIC FROM THE INTERNET
*************************************
access-list 102 deny icmp any any
#############################################
Denies SMTP TRAFFIC FROM THE INTERNET
*************************************
access-list 102 deny tcp any any eq 25
##############################################
IP-Directed Broadcast
*********************
The IP-directed broadcast is another service that is commonly used in Smurf attacks.
Smurf attacks send ICMP echo requests from a spoofed source address to a directed broadcast
that cause all hosts to respond to the ping echo request, creating a lot of traffic on the network.
By default on IOS version 12.0 and higher, ip directed broadcast is disabled, and if you are running
any version lower than 12.0, it is imperative that you disable IP directed broadcasts on the router by
issuing the following command in interface configuration mode:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config-if)#no ip directed-broadcast
###########################################################
bootp
*****
bootp is enabled by default, and if you are not using it, you should definitely disable it. You can use the
no ip bootp server command in global configuration mode to disable bootp on your routers:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config)# no ip bootp server
##########################################################
ip classless
************
The ip classless command is enabled on the Cisco routers by default in version 12.0 and higher.
Disable ip classless if your network does not have a subnetted range of IP addresses.
If you are subnetting a block of IP address allocated to you by the American Registry for Internet Numbers (ARIN),
you should ensure that ip classless is enabled. You can learn more about ARIN by going to
It allows the router to advertise the subnetted addresses to its neighbors:
~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config)#no ip classless
###########################################################
ip mask-reply
*************
By default, the ip mask-reply command is disabled on all Cisco routers. The mask replies respond to Internet Control
Message Protocol (ICMP) mask requests by sending out ICMP mask replies, and these mask replies contain important network
information.If mask replies are enabled, make sure you disable them on the router by using the no ip mask-reply command
in interface configuration mode:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config-if)#no ip mask-reply
###########################################################
IP Source Routing
*****************
IP source routing allows the sender of an IP packet to control the route that packet will take to reach the
destination endpoint. By default, IP source routing is disabled on the routers and should only be enabled
if your network needs call for it. The following command disables IP source routing on the router globally:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config)#no ip source-route
###########################################################
IP Unreachable
**************
IP unreachable messages can be used to map out the network topology, and they should be disabled on all interfaces.
You can disable IP unreachables on all interfaces by issuing the following command in interface configuration mode:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
R1(config-if)#no ip unreachables
###########################################################