[c-nsp] ACL does not work??

Sergey Velikanov [Intelsoft] sv at intelsoft.com
Thu Jul 13 22:35:33 EDT 2006


Bruce Pinsky wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Sergey Velikanov [Intelsoft] wrote:
> 
>>Hi.
>>
>>We protect customers from typical virus attacs with ACL, config looks like
>>
>>interface Vlan136
>>  ip address 192.168.26.209 255.255.255.240
>>  ip access-group ipprotocols in
>>end
>>
>>interface FastEthernet0/36
>>  description vlan 136
>>  switchport access vlan 136
>>  switchport mode access
>>  switchport port-security maximum 32
>>  switchport port-security
>>  switchport port-security aging time 30
>>  switchport port-security violation protect
>>  switchport port-security aging type inactivity
>>  speed 10
>>  storm-control broadcast level pps 4k
>>  storm-control multicast level pps 6k
>>  storm-control unicast level pps 6k
>>  storm-control action shutdown
>>  no cdp enable
>>  spanning-tree portfast
>>  spanning-tree bpduguard enable
>>  ip igmp filter 10
>>  ip verify source port-security
>>end
>>
>>ip access-list extended ipprotocols
>>  remark --= Deny windows RPC ports =--
>>  deny   tcp any any eq 139
>>  deny   tcp any any eq 135
>>  deny   tcp any any eq 445
>>  deny   udp any any eq 135
>>  deny   udp any any eq 445
>>   .....
>>  permit ip any any
>>
>>In my logic any outgoing packet from client with dst port 445 should be dropped by cisco, but it doesn't happen.
>>
>>16:58:16.342289 IP 192.168.26.219.2227 > 192.168.10.83.445: P 1:5(4) ack 1 win 17520
>>16:58:16.342318 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 5 win 65535
>>16:58:16.343113 IP 192.168.26.219.2227 > 192.168.10.83.445: P 5:138(133) ack 1 win 17520
>>16:58:16.343167 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 138 win 65535
>>16:58:16.837354 IP 192.168.10.83.445 > 192.168.26.219.2227: P 1:132(131) ack 138 win 65535
>>16:58:16.838213 IP 192.168.26.219.2227 > 192.168.10.83.445: P 138:142(4) ack 132 win 17389
>>16:58:16.838267 IP 192.168.10.83.445 > 192.168.26.219.2227: . ack 142 win 65531
>>16:58:16.841071 IP 192.168.26.219.2227 > 192.168.10.83.445: . 142:1602(1460) ack 132 win 17389
>>16:58:16.842409 IP 192.168.26.219.2227 > 192.168.10.83.445: . 1602:3062(1460) ack 132 win 17389
>>
>>
>>#sh access-lists ipprotocols
>>Extended IP access list ipprotocols
>>     10 deny tcp any any eq 139 (2266 matches)
>>     20 deny tcp any any eq 135 (955 matches)
>>     30 deny tcp any any eq 445 (2159 matches)
>>     40 deny udp any any eq 135
>>     50 deny udp any any eq 445
>>....
>>
>>
> 
> 
> What platform, what version?  
Cisco IOS Software, C3560 Software (C3560-ADVIPSERVICESK9-M), Version 12.2(25)SED1, RELEASE SOFTWARE (fc1)

Is the tcpdump above taken from the client or
> the destination (presumably 192.168.10.83)?

from destination, 192.168.10.83 is my computer.



More information about the cisco-nsp mailing list