At 08:30 AM 3/10/00 +0100, you wrote:
> > At 05:30 PM 3/9/00 +0100, you wrote:
> > > > access-list 102 permit tcp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 gt 1023
> > > > access-list 102 permit udp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 gt 1023
> > > > access-list 102 permit tcp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 eq 22
> > > > access-list 102 permit tcp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 eq 25
> > > > access-list 102 permit tcp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 eq 53
> > > > access-list 102 permit udp 0.0.0.0 255.255.255.255 x.x.x.3
> > > > 0.0.0.0 eq 53
> > >
> > > > I initially placed this list on the serial connection,
> > which is the
> > > > incoming isdn. I had defined it as 'ip access-group 102
> > in', which
> > > > promptly cut off all access. I then placed it on the
> > > > ethernet port as 'ip
> > > > access-group 102 out', which appears to work as it should.
> > > >
> > > > Questions:
> > > >
> > > > 1. Why did the first definition not work? I would have
> > > > thought either
> > > > definition would work the same.
> > > >
> > >you denied everything incoming that is standard TCP/IP, so
> > you were able to
> > >send packets; but unable to receive any responses
> > >permit tcp gt 1023
> > >but at the end there is always an implicit deny !!!!
> >
> > But, my first two rules allow responses.
>yes, for the packets which ports are greater (gt) than 1023 (and this isn't
>regular traffic)
So, shouldn't response packets have been allowed then? According to the
above ruleset, packets from anywhere, destined for the firewall, with ports
set to > 1023, 22, 25, and 53 are allowed. Since outbound access is
unrestricted, why would this have failed to work when placed on the serial0
interface?
I'm utterly failing to see the difference between:
interface serial 0
ip access-group 102 in
and
interface ethernet 0
ip access-group 102 out
when using the above access list.
> >
> > If I think of it this way:
> >
> > e0 serial0
> > FW<----------------[Cisco 2501]<----------------Internet
> > ip access-group 102 out ip access-group 102 in
> >
> > Arrows indicate direction of packet flow. ie: they
> > illustrate packets
> > arriving via the serial interface, and leaving via the
> > ethernet interface
> > (obviously, they flow in both directions, but I'm not concerned with
> > outbound flow). The two definitions should have been
> > identical, wouldn't
> > they? On the serial interface, the list would have matched incoming
> > packets, and on the ethernet interface, the list would match outgoing
> > packets. What is the difference?
> >
>I think that out means leaving, so on e0 out is in the router (the opposite
>direction of your arrow !)
Wouldn't 'out' refer to packets leaving the router, as you mentioned, and
as I drew? I'm envisioning 'out' in this case, as referring to a packet
which leaves the router via the ethernet interface, and is destined for the
firewall.
>With the established keyword, established connections (after the initial
>TCP/IP hand-shake) are allowed, so reducing the overhead for the router to
>check every packet.
So, if I use the 'established' keyword, I can then get rid of the rules to
allow inbound response packets (> 1023), correct?
Cheers!
Jon
-----------------------------------------------------------------
Jon Earle (613) 612-0946 (Cell)
HUB Computer Consulting Inc. (613) 830-1499 (Office)
http://www.hubcc.ca 1-888-353-7272 (Within Canada/US)
"God does not subtract from one's alloted time on Earth,
those hours spent flying." --Unknown
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]