|
If you
implemented this as an outbound ACL (On the external interface), then you are
going to block connections from these source ports, not the destination port as
intended. In addition you are probably experinecing NAT Table exhaustion. This
is common with SYN flood attacks and Code Red compromises. Check this
article.
http://www.cisco.com/warp/public/63/ts_codred_worm.shtml (NAT
and Code Red)
http://www.cisco.com/warp/public/707/21.html (General
Purpose Router security)
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/ios127xe/config/secure.htm (WatchWrap,
ACLs 201)
HTH
Ken Claussen MCSE CCNA CCA
"In Theory it should work as you describe, but the difference between theory and reality is the truth! For this we all strive"
|
- Packet blocking Matthew Carpenter
- RE: Packet blocking David Ishmael
- RE: Packet blocking Claussen, Ken
- RE: Packet blocking Tony Rall
