Try enabling the interface configuration command "ip accounting
access-violations".
This will log source/destination pairs which fail the access-list on the
interface.

""Scott Nawalaniec""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi Anil,
>
> To the best of my knowledge and without looking it up at www.cisco.com, I
> think if you put log on the end an access-list statement it will send the
> log to the syslog server. I don't know if that is true in all cases. I
like
> to keep my routers streamed lined.....ie unnecessary services and buffers
> turned off....=)
>
> OUTPUT from show log:
> Admin_3662#sh log
> Syslog logging: enabled (0 messages dropped, 0 flushes, 0 overruns)
>     Console logging: level debugging, 723 messages logged
>     Monitor logging: level debugging, 0 messages logged
>     Buffer logging: disabled
>     Trap logging: level debugging, 727 message lines logged
>         Logging to X.X.X.X, 727 message lines logged
>
> HTH,
>
> Scott
>
> -----Original Message-----
> From: anil [mailto:[EMAIL PROTECTED]]
> Sent: Friday, December 07, 2001 12:58 PM
> To: Scott Nawalaniec
> Subject: RE: ACL Gurus [7:27361]
>
>
> Scott, If I add an access list with [log] at the end, can I expect to see
> the log by typing:
> "show log"
> At the moment I see nothing.
> I am trying to catch snmp traffic, using snmpwalk.
> port 161, 162.
>
> If I do "debug snmp packets" then I can see some logs.
> Many thanks
> -Anil
>
>
>
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> Scott Nawalaniec
> Sent: Tuesday, November 27, 2001 5:41 PM
> To: [EMAIL PROTECTED]
> Subject: RE: ACL Gurus [7:27361]
>
>
> Thanx for the info and the verification.
>
> Scott
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]
> Sent: Monday, November 26, 2001 7:25 PM
> To: [EMAIL PROTECTED]
> Subject: RE: ACL Gurus [7:27361]
>
>
> "My understanding is ICMP is not a subset of IP or anything with IP
> protocol.
> ICMP and IP both work at the network layer and are separate protocols."
> Bzzt.  You are the weakest link.  Goodbye ;-)
>
> ICMP is IP protocol 1 (TCP is 6, UDP is 17).  ICMP stands for Internet
> Control Message Protocol, which is a bit of a hint that it might be
related
> to IP (although hardly strong evidence).  According to TCP/IP Illustrated
> (Stevens); "ICMP is often considered part of the IP layer", so you're
> correct there, but "ICMP messages are transmitted within IP datagrams", so
> your "permit ip any any" will permit ICMP.
> And anyway, I use "permit ip any any" to define interesting traffic on
some
> dialup links, and I can bring up the links with a well-directed ping.  So
I
> know IP includes ICMP ;-)
>
> JMcL
> ----- Forwarded by Jenny Mcleod/NSO/CSDA on 27/11/2001 02:09 pm -----
>
>
>
> "Scott
>                     Nawalaniec"          To:
> [EMAIL PROTECTED]
>                                     Subject:     RE: ACL Gurus
> [7:27361]
>                     Sent
> by:
>
> nobody@groups
>
> tudy.com
>
>
>
>
>
> 27/11/2001
>                     11:29
> am
>
> Please
>                     respond
> to
>
> "Scott
>
> Nawalaniec"
>
>
>
>
>
>
>
>
> Hello,
>
> Good call on the "access-list 101 permit icmp x.x.54.0 0.0.1.255 any echo
> (equivalent to your
> two lines)"
>
> My understanding is ICMP is not a subset of IP or anything with IP
> protocol.
> ICMP and IP both work at the network layer and are separate protocols. So
> you would not need the "access-list 102 deny icmp any any  (may as well
> block all other icmp)" or "access-list 102 deny icmp any any  (may as well
> block all other icmp)" because the implicit deny at the end should take
> care
> of dropping the unwanted protocols. Please correct me if I am wrong.
>
> What about udp and tcp protocols? The implicit deny would drop all
> protocols
> at the end.
>
> Scott
>
> -----Original Message-----
> From: Gaz [mailto:[EMAIL PROTECTED]]
> Sent: Monday, November 26, 2001 3:56 PM
> To: [EMAIL PROTECTED]
> Subject: Re: ACL Gurus [7:27361]
>
>
> My view/guestimation only here, so anyone is welcome to pick holes in it:
>
> I would apply 101 (the outgoing access list to the ethernet port). May as
> well drop the rubbish before the router processes it.
> I would also make it:
>
> access-list 101 permit icmp x.x.54.0 0.0.1.255 any echo  (equivalent to
> your
> two lines)
> access-list 101 deny icmp any any (denies all other icmp, otherwise your
> next line allowed everything including icmp)
> access-list 101 permit ip any any
>
> I would apply 102 as you have on the serial interface, with slight change.
>
> access-list 102 permit icmp any any echo-reply  (presumably as you allowed
> echo outgoing, you want the replies)
> access-list 102 deny icmp any any  (may as well block all other icmp)
> access-list 102 permit ip any any
>
> Of course this is just fictional to control icmp only.
> I've changed it about 4 times, so I've no doubt it could take some more
> changes.
>
> Regards,
>
> Gaz
>
>
> ""Matthew Tayler""  wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Ok I am a little confused here, but
> >
> > 1. What does access-list 101 actually deny ?
> > 2. If you permit all ip are you not also allowing all tcp & udp ?
> >
> > Matt T
> > Jeff wrote:
> > >
> > > Looking to block icmp-echo on my external router... just want
> > > to doublecheck
> > > that I'm putting these on the right interfaces. Please,
> > > suggestions welcome!
> > >
> > > Cheers,
> > > Jeff
> > > access-list 101 permit icmp x.x.54.0 0.0.0.255 any echo
> > >
> > > access-list 101 permit icmp x.x.55.0 0.0.0.255 any echo
> > >
> > > *Permits internal network to ping any host
> > >
> > > access-list 101 permit ip any any
> > >
> > > *Permits any other traffic to and from the network. Need for
> > > the explicit
> > > deny
> > >
> > >
> > >
> > > access-list 102 permit icmp host x.x.x.x any echo-reply
> > >
> > > *Permits a ping reply from ISP servers for monitoring
> > >
> > > access-list 102 permit icmp any any packet-too-big
> > >
> > > *Permits Fragmentation Required ICMP packets (Used of MTU-PD)
> > >
> > > access-list 102 deny   icmp any any echo-reply
> > >
> > > deny any echo reply from any other sources
> > >
> > >
> > >
> > > access-list 102 deny   icmp any x.x.54.0 0.0.0.255 echo
> > >
> > > access-list 102 deny   icmp any x.x.55.0 0.0.0.255 echo
> > >
> > > deny any echo from any other sources
> > >
> > > access-list 102 permit ip any any
> > >
> > > *Permits any other traffic to and from the network. Needed due
> > > to the
> > > explicit deny rule.
> > >
> > >
> > >
> > > Both Access-list are applied to the Serial Interfaces of the
> > > Edge router.
> > > Access list 102 is assigned to inbound traffic and Access list
> > > 101 is
> > > assigned to outbound traffic. See below..
> > >
> > >
> > >
> > > Internet (same ISP, different BGP peers)
> > >
> > >
> > >
> > > S0/0               S0/1
> > >
> > >    \                      /
> > >
> > >     \                    /
> > >
> > >      \                  /
> > >
> > >       Edge Router
> > >
> > >               |
> > >
> > >            E0/0
> > >
> > >               |
> > >
> > >            FW
> > >
> > >               |
> > >
> > >            LAN
> > >
> > > x.x.54.0 and x.x.55.0 networks




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=28463&t=27361
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to