[c-nsp] cisco ACL filter outbound only

Nick Griffin nick.jon.griffin at gmail.com
Tue Sep 15 11:01:11 EDT 2020


It would probably help if you elaborated on what type of connections will be established through/from the device in question. 

Sent from my iPhone

> On Sep 15, 2020, at 9:45 AM, Mike <mike+lists at yourtownonline.com> wrote:
> 
> On 9/15/20 3:12 AM, Nick Hilliard wrote:
>> Mike wrote on 15/09/2020 02:17:
>>>      I have some gear that needs a public ip, but does not have the best
>>> security profile, and I want to put up an ACL that only permits this
>>> gear to make outbound connections while dropping all inbound. My router
>>> is an ASR920 running IOS-XE 03.17.03.S. Does anyone have a simple
>>> copy/paste acl for this type of job?
>> 
>> you're mixing up a packet filtering ACL with a firewall ACL.
>> 
>> A packet filter with this sort of ACL will block all inbound traffic,
>> i.e. the performance will be terrific but everything will break
>> because return traffic will be blocked (e.g. tcp syns/acks, etc).
>> 
>> A firewall rule will enable dynamic outbound state management, which
>> seems to be what you want, but the ASR920 doesn't support it.
>> 
>> You need a firewall for this, not a router.
>> 
>> Nick
> 
> 
> I ask because online cisco docs as well as the command line indicate
> support for matching 'established' connections, as well as combinations
> of flags:
> 
> rvhs-asr920(config-ext-nacl)#permit tcp 0.0.0.0 0.0.0.0 any ?
>   ack          Match on the ACK bit
>   dscp         Match packets with given dscp value
>   eq           Match only packets on a given port number
>   established  Match established connections
>   fin          Match on the FIN bit
>   fragments    Check non-initial fragments
>   gt           Match only packets with a greater port number
>   log          Log matches against this entry
>   log-input    Log matches against this entry, including input interface
>   lt           Match only packets with a lower port number
>   match-all    Match if all specified flags are present
>   match-any    Match if any specified flag is present
>   neq          Match only packets not on a given port number
>   option       Match packets with given IP Options value
>   precedence   Match packets with given precedence value
>   psh          Match on the PSH bit
>   range        Match only packets in the range of port numbers
>   rst          Match on the RST bit
>   syn          Match on the SYN bit
>   time-range   Specify a time-range
>   tos          Match packets with given TOS value
>   ttl          Match packets with given TTL value
>   urg          Match on the URG bit
>   <cr>
> 
> 
> It just seems to me that it is indeed possible using the above to put it
> together. Is this all just non-working on this platform?
> 
> 
> Mike-
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/


More information about the cisco-nsp mailing list