Compare cert salaries and plan your next career move
stevi3 wrote: Hi there, Sorry to be such a burden, but i was given a small task to come up with an Extend ACL (just started studying it) that will block all TCP from one source PC to 2 Destination PC's. I did come up with this, but I dunno if its correct, so i was wondering if someone could tell me if im going along the right lines. access-list 101 deny tcp host 204.204.10.18 host 204.204.10.51 access-list 101 deny tcp host 204.204.10.18 host 204.204.10.83 access-list 101 permit ip any any Thanks
networker050184 wrote: For ping deny icmp.
networker050184 wrote: According to Cisco place standard access lists destination to the source and place extended access lists close to the source. You want the packets dropped as soon as possible rather them traversing the whole network just to be dropped at the destination. Standard access lists can block traffic that is not intended to be blocked which is why it is reccomended to place them close to the destination.
stevi3 wrote: Thanks Although when i tried sticking on the interace of a router, closer to the source. It would still let ping through, even when i chose the echo port(7).
sprkymrk wrote: stevi3 wrote: Thanks Although when i tried sticking on the interace of a router, closer to the source. It would still let ping through, even when i chose the echo port(7). Remember, echo is an ICMP type, not a port. Although I thought echo was ICMP type 8, not 7. See:http://www.iana.org/assignments/icmp-parameters ICMP itself is protocol type 1, tcp is protocol type 6, ipsec is protocol type 50, etc. These are often confused with TCP and UDP port number assignments. It's a common misconception. I forget myself often times, I am so ingrained to think of port numbers all the time it's easy to get mixed up.
Pash wrote: Funny you should post that table mark, i had to block 13 and 14 on the ACL icmp types timestamp-request timestamp-reply today for a customer....it's part of that security audit that is still on-going So a lot like this:- access-list 110 deny icmp any any timestamp-request access-list 110 deny icmp any any timestamp-reply access-list 110 permit icmp any any Remember Stevie access lists are always checked sequentially as well, so when planning them always think about your traffic, if that permit is above the denies, all icmp traffic will pass and my statements won't get put into practice. Cheers,
Compare salaries for top cybersecurity certifications. Free download for TechExams community.