[c-nsp] ACL does not work??
Bruce Pinsky
bep at whack.org
Thu Jul 13 13:46:09 EDT 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sergey Velikanov [Intelsoft] wrote:
> Hi.
>
> We protect customers from typical virus attacs with ACL, config looks like
>
> interface Vlan136
> ip address 192.168.26.209 255.255.255.240
> ip access-group ipprotocols in
> end
>
> interface FastEthernet0/36
> description vlan 136
> switchport access vlan 136
> switchport mode access
> switchport port-security maximum 32
> switchport port-security
> switchport port-security aging time 30
> switchport port-security violation protect
> switchport port-security aging type inactivity
> speed 10
> storm-control broadcast level pps 4k
> storm-control multicast level pps 6k
> storm-control unicast level pps 6k
> storm-control action shutdown
> no cdp enable
> spanning-tree portfast
> spanning-tree bpduguard enable
> ip igmp filter 10
> ip verify source port-security
> end
>
> ip access-list extended ipprotocols
> remark --= Deny windows RPC ports =--
> deny tcp any any eq 139
> deny tcp any any eq 135
> deny tcp any any eq 445
> deny udp any any eq 135
> deny udp any any eq 445
> .....
> permit ip any any
>
> In my logic any outgoing packet from client with dst port 445 should be dropped by cisco, but it doesn't happen.
>
> 16:58:16.342289 IP 192.168.26.219.2227 > 192.168.10.83.445: P 1:5(4) ack 1 win 17520
> 16:58:16.342318 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 5 win 65535
> 16:58:16.343113 IP 192.168.26.219.2227 > 192.168.10.83.445: P 5:138(133) ack 1 win 17520
> 16:58:16.343167 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 138 win 65535
> 16:58:16.837354 IP 192.168.10.83.445 > 192.168.26.219.2227: P 1:132(131) ack 138 win 65535
> 16:58:16.838213 IP 192.168.26.219.2227 > 192.168.10.83.445: P 138:142(4) ack 132 win 17389
> 16:58:16.838267 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 142 win 65531
> 16:58:16.841071 IP 192.168.26.219.2227 > 192.168.10.83.445: . 142:1602(1460) ack 132 win 17389
> 16:58:16.842409 IP 192.168.26.219.2227 > 192.168.10.83.445: . 1602:3062(1460) ack 132 win 17389
>
>
> #sh access-lists ipprotocols
> Extended IP access list ipprotocols
> 10 deny tcp any any eq 139 (2266 matches)
> 20 deny tcp any any eq 135 (955 matches)
> 30 deny tcp any any eq 445 (2159 matches)
> 40 deny udp any any eq 135
> 50 deny udp any any eq 445
> ....
>
>
What platform, what version? Is the tcpdump above taken from the client or
the destination (presumably 192.168.10.83)?
- --
=========
bep
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFEtobhE1XcgMgrtyYRAhZcAKCKxz1aqZrkUOT7dzP9Oscd6/1i0wCfUCcU
gDqCQclducCklK7oEl01vF4=
=76xu
-----END PGP SIGNATURE-----
More information about the cisco-nsp
mailing list