[c-nsp] cisco ACL filter outbound only
Keith Medcalf
kmedcalf at dessus.com
Wed Sep 16 06:41:25 EDT 2020
ooops. extablished is of course a type and should be established.
Basically that means the ACK bit is set.
--
Be decisive. Make a decision, right or wrong. The road of life is
paved with flat squirrels who could not make a decision.
>-----Original Message-----
>From: Keith Medcalf <kmedcalf at dessus.com>
>Sent: Wednesday, 16 September, 2020 04:39
>To: 'cisco-nsp at puck.nether.net' <cisco-nsp at puck.nether.net>
>Subject: RE: [c-nsp] cisco ACL filter outbound only
>
>
>Actually standard packet filtering is supported by all Cisco products,
>and most others as well. Packet filters do not do state tracking. The
>packet filters you want will only work for TCP. You need to block
>everything else.
>
>outbound on the interface to "the rest of the universe":
>permit tcp <source> any
>deny ip <source> any
>... whatever other shit you want to permit to go out ...
>
>inbound on the interface from "the rest of the universe":
>permit tcp any <source> extablished
>deny ip any <source>
>... whatever other shit you want to permit to go in ...
>
>Cisco (and others) have worked this way for about 40 years.
>
>--
>Be decisive. Make a decision, right or wrong. The road of life is
paved
>with flat squirrels who could not make a decision.
>
>>-----Original Message-----
>>From: cisco-nsp <cisco-nsp-bounces at puck.nether.net> On Behalf Of
Emille
>>Blanc
>>Sent: Tuesday, 15 September, 2020 10:20
>>To: Mike <mike+lists at yourtownonline.com>; cisco-nsp at puck.nether.net
>>Subject: Re: [c-nsp] cisco ACL filter outbound only
>>
>>> Again, the cli seems to indicate support for all the things
>>> necessary, which includes the idea of 'established', which is why I
>ask
>>> if THIS platform does in fact do what the cli suggests:
>>
>>No, the ASR920 (Unless it's hiding in a recent IOS release), does not
do
>>any kind of state tracking. You'll be better served looking at the
ISR
>>or Firewall families for that.
>>
>>What you're seeing in the CLI is pretty commonplace these days - to be
>>fair, not just with Cisco - where an un-supported feature is 'left in'
>>the command line.
>>
>>If in doubt, try it. Worst case it won't work, and then you can bounce
>>the config off TAC to get one of their "unsupported configuration"
>canned
>>responses. :]
>>________________________________________
>>From: cisco-nsp <cisco-nsp-bounces at puck.nether.net> on behalf of Mike
>><mike+lists at yourtownonline.com>
>>Sent: Tuesday, September 15, 2020 8:52 AM
>>To: cisco-nsp at puck.nether.net
>>Subject: Re: [c-nsp] cisco ACL filter outbound only
>>
>>On 9/15/20 8:08 AM, Brian Turnbow wrote:
>>>> It just seems to me that it is indeed possible using the above to
put
>>it
>>>> together. Is this all just non-working on this platform?
>>>>
>>> The difference is in connection state.
>>> An ACL does not track it so you can do
>>> Permit tcp any any established
>>> Inbound or outbound on a port , but that will only check that the ip
>>packet has ack or rst set for the tcp session .
>>> I can still send you an inbound tcp packet with ack or rst set even
>if
>>it did not originate from "inside" and pass your filter.
>>> It will also not help in any way for udp etc
>>> The ACL does not know that a first packet was sent out so it should
>>await a response
>>> This is why you need a firewall be it on the router or external.
>>>
>>Hi,
>>
>> Again, the cli seems to indicate support for all the things
>>necessary, which includes the idea of 'established', which is why I
ask
>>if THIS platform does in fact do what the cli suggests:
>>
>>rvhs-asr920(config-ext-nacl)#permit tcp 0.0.0.0 0.0.0.0 any ?
>> ack Match on the ACK bit
>> dscp Match packets with given dscp value
>> eq Match only packets on a given port number
>> established Match established connections
>> fin Match on the FIN bit
>> fragments Check non-initial fragments
>> gt Match only packets with a greater port number
>> log Log matches against this entry
>> log-input Log matches against this entry, including input
interface
>> lt Match only packets with a lower port number
>> match-all Match if all specified flags are present
>> match-any Match if any specified flag is present
>> neq Match only packets not on a given port number
>> option Match packets with given IP Options value
>> precedence Match packets with given precedence value
>> psh Match on the PSH bit
>> range Match only packets in the range of port numbers
>> rst Match on the RST bit
>> syn Match on the SYN bit
>> time-range Specify a time-range
>> tos Match packets with given TOS value
>> ttl Match packets with given TTL value
>> urg Match on the URG bit
>> <cr>
>>
>>_______________________________________________
>>cisco-nsp mailing list cisco-nsp at puck.nether.net
>>https://puck.nether.net/mailman/listinfo/cisco-nsp
>>archive at http://puck.nether.net/pipermail/cisco-nsp/
>>_______________________________________________
>>cisco-nsp mailing list cisco-nsp at puck.nether.net
>>https://puck.nether.net/mailman/listinfo/cisco-nsp
>>archive at http://puck.nether.net/pipermail/cisco-nsp/
More information about the cisco-nsp
mailing list