FastHackem
IS-IT--Management
Alright I will try to keep this as logical as I can. We have entered the following extended access-list on fa 0/0.100:
access-list 120 permit ip any any
access-list 120 deny ip 12.0.0.0 0.255.255.255 any log
access-list 120 deny ip 24.0.0.0 0.255.255.255 any log
access-list 120 deny ip 63.0.0.0 0.255.255.255 any log
access-list 120 deny ip 64.0.0.0 0.255.255.255 any log
access-list 120 deny ip 192.215.0.0 0.0.255.255 any log
access-list 120 deny ip 140.0.0.0 0.255.255.255 any log
access-list 120 deny ip 204.0.0.0 0.255.255.255 any log
access-list 120 deny ip 205.0.0.0 0.255.255.255 any log
access-list 120 deny ip 206.0.0.0 0.255.255.255 any log
access-list 120 deny ip 208.0.0.0 0.255.255.255 any log
access-list 120 deny ip 209.0.0.0 0.255.255.255 any log
access-list 120 deny ip 213.0.0.0 0.255.255.255 any log
access-list 120 deny ip 216.0.0.0 0.255.255.255 any log
access-list 120 deny ip 217.0.0.0 0.255.255.255 any log
Our problem is:
We are getting hit from various external IP's. We have a router on the outside of our internal school network. Somehow packets are passing thru our IP's deisgnated for NAT/PAT use something to the effect of (one example entry):
192.140.100.10 ----> 1xx.blah.blah.blah(our external network designated for NAT/PAT use) 1 packet
We are getting hit by hundreds of these, from different IP's. The above access-list seems to deny them from passing into us, but it also blocks us from getting out anywhere on the net. What is going on??? We are not blocking TCP, only IP. Help please!!
-Eric, CCNA, Net+, A+, APS, BrainBench
access-list 120 permit ip any any
access-list 120 deny ip 12.0.0.0 0.255.255.255 any log
access-list 120 deny ip 24.0.0.0 0.255.255.255 any log
access-list 120 deny ip 63.0.0.0 0.255.255.255 any log
access-list 120 deny ip 64.0.0.0 0.255.255.255 any log
access-list 120 deny ip 192.215.0.0 0.0.255.255 any log
access-list 120 deny ip 140.0.0.0 0.255.255.255 any log
access-list 120 deny ip 204.0.0.0 0.255.255.255 any log
access-list 120 deny ip 205.0.0.0 0.255.255.255 any log
access-list 120 deny ip 206.0.0.0 0.255.255.255 any log
access-list 120 deny ip 208.0.0.0 0.255.255.255 any log
access-list 120 deny ip 209.0.0.0 0.255.255.255 any log
access-list 120 deny ip 213.0.0.0 0.255.255.255 any log
access-list 120 deny ip 216.0.0.0 0.255.255.255 any log
access-list 120 deny ip 217.0.0.0 0.255.255.255 any log
Our problem is:
We are getting hit from various external IP's. We have a router on the outside of our internal school network. Somehow packets are passing thru our IP's deisgnated for NAT/PAT use something to the effect of (one example entry):
192.140.100.10 ----> 1xx.blah.blah.blah(our external network designated for NAT/PAT use) 1 packet
We are getting hit by hundreds of these, from different IP's. The above access-list seems to deny them from passing into us, but it also blocks us from getting out anywhere on the net. What is going on??? We are not blocking TCP, only IP. Help please!!
-Eric, CCNA, Net+, A+, APS, BrainBench