[c-nsp] acl to block traffic one way
Dan
dan at technc.com
Sat Mar 24 23:38:59 EST 2007
Roland Dobbins wrote:
> On Mar 24, 2007, at 8:10 PM, Dan wrote:
>
>
>> I was wondering if there would be a way to block traffic one way on a
>> 3560 switch. I would like to block any traffic from 192.168.1.0/24
>> from
>> seeing anything 192.168.75.0/24. But I would like to be able to have
>> the reverse possible.
>>
>
> If your platform supports ACLs, sure. ACLs are applied to interfaces
> directionally. So, you'd have the permit on the side from which
> traffic from the permitted source network is applied (or applied
> outbound on the interface facing the destination network, but the
> former's the better way to go) and that's that.
>
> Out of curiosity, what's your application? Typically, TCP/IP
> communications require some bidirectionality for any meaningful use,
> even it it's restricted.
>
>
I work for a school district and the school with subnet 192.168.1.0/24
has a curious group of people that just don't need to see any of the
devices on 192.168.75.0/24 , but the devices on 75.0/24 need to see 1.0/24.
>> Also is there a way to insert a line into an access list?
>>
>
> ACLs should be composed offline using a text-editor or script or
> provisioning system, not typed by hand directly into a device. It's
> also a good idea to keep them versioned; rcs is available on all the
> free *NIXes, I'd suggest getting started using that plus the text
> editor of your choice.
>
> One technique some folks use to update ACLs is that they've actually
> two versions of an ACL for each relevant interface, and they flip-
> flop them. So, if you have ACL 110 applied inbound on fa0/1, you'd
> also have ACL 120 in the config of the device, but not applied at the
> interface (ACL 110 would be applied and active on the interface).
> You'd check ACL 120 out of RCS, modify it, and then copy it over to
> the device, then go into the interface configuration sub-mode for the
> relevant interface and then change the ACL line to reflect ACL 120 as
> the current/applied ACL, and ACL 110 would then be the inactive/
> rollover ACL.
>
> ACLs should also be constructed in a modular fashion, with more
> static sections for rarely-updated policies, and a dynamic section
> used for reaction and other types of more dynamic changes. Pay close
> attention to the fall-through of the ACL so as to guard against
> problems such as early permit statements masking later denies, or
> vice versa. Any platform-specific ACL construction considerations
> should also be taken into account and documented in comments in the
> ACL file (I strongly recommend that you heavily comment your ACL
> files so that it's easy for folks to figure out the intended purpose
> of each section/stanza).
>
Do you have an example of an ACL constructed in a modular/static fashion?
> It's also a good idea to consider a) using DNS names for /32s in ACLs
> *where appropriate* in order to make the intent that much clearer,
> deal with hosts which end up being renumbered, etc., and b) using a
> script to *perform the DNS lookups on the ACL file and substitute the
> appropriate IP addresses just prior to copying them over to the
> router* (expecting the router do this can be a bad idea, for a number
> of reasons). An alternative to DNS names for /32s is strong
> commenting, but you'll end up with more comments; and, of course,
> sometimes there are /32s which need to go into ACLs which for one
> reason or another don't have DNS mappings. This is very
> situationally-specific, just something to think about.
>
> Note that comments ('!') are different from remarks ('rem'); the
> former don't show up in the router config, the latter do.
> Personally, I hate seeing rems in configs because it makes them
> harder to parse via sh commands, but that's something you should
> decide for yourself.
>
> It seems like a simple thing, but I've found ACL construction and
> maintenance/version control to be a big issue for lots of
> organizations. Taking the time to think through some of the issues
> denoted above and determining what's best for your network can end up
> making it a lot easier to maintain ACLs long-term, as well as making
> the update process more efficient and less prone to operator error.
>
> My $.02, FWIW.
>
> -----------------------------------------------------------------------
> Roland Dobbins <rdobbins at cisco.com> // 408.527.6376 voice
>
> Words that come from a machine have no soul.
>
> -- Duong Van Ngo
>
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
I have netflow setup on my 2801 router but I have not figured out how or
if the 3560 can export netflow stats.
Excellent tips for setting up and maintaining ACL's. I will use these
on a daily basis.
Thanks,
Dan.
More information about the cisco-nsp
mailing list