Re: [c-nsp] cisco ACL filter outbound only

2020-09-16 Thread Keith Medcalf
>Sent: Wednesday, 16 September, 2020 04:39 >To: 'cisco-nsp@puck.nether.net' >Subject: RE: [c-nsp] cisco ACL filter outbound only > > >Actually standard packet filtering is supported by all Cisco products, >and most others as well. Packet filters do not do state tracking. T

Re: [c-nsp] cisco ACL filter outbound only

2020-09-16 Thread Keith Medcalf
;From: cisco-nsp on behalf of Mike > >Sent: Tuesday, September 15, 2020 8:52 AM >To: cisco-nsp@puck.nether.net >Subject: Re: [c-nsp] cisco ACL filter outbound only > >On 9/15/20 8:08 AM, Brian Turnbow wrote: >>> It just seems to me that it is indeed possible using the

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Tim Densmore
Hi Mike, Not a Cisco solution, but you might look into a pfsense/opnsense/ipfire/whatever appliance - either physical or virtual.  Even a UBNT edgerouter can do basic stateful stuff if you have one lying around. All of these are inexpensive and (probably?) do what you need done. The first

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Emille Blanc
on't work, and then you can bounce the config off TAC to get one of their "unsupported configuration" canned responses. :] From: cisco-nsp on behalf of Mike Sent: Tuesday, September 15, 2020 8:52 AM To: cisco-nsp@puck.nether.net Subject: Re: [c-nsp] cisco

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Garrett Skjelstad
; From: Brian Turnbow > To: Mike , "cisco-nsp@puck.nether.net" < > cisco-nsp@puck.nether.net> > Cc: > Bcc: > Date: Tue, 15 Sep 2020 16:10:01 +0000 > Subject: RE: [c-nsp] cisco ACL filter outbound only > > > > Again, the cli seems to indicate

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Brian Turnbow via cisco-nsp
--- Begin Message --- > >     Again, the cli seems to indicate support for all the things necessary, > which > includes the idea of 'established', which is why I ask if THIS platform does > in > fact do what the cli suggests: > No it doesn't You need to understand what established does. It

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Mike
On 9/15/20 8:08 AM, Brian Turnbow wrote: >> It just seems to me that it is indeed possible using the above to put it >> together. Is this all just non-working on this platform? >> > The difference is in connection state. > An ACL does not track it so you can do > Permit tcp any any established >

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Brian Turnbow via cisco-nsp
--- Begin Message --- > > It just seems to me that it is indeed possible using the above to put it > together. Is this all just non-working on this platform? > The difference is in connection state. An ACL does not track it so you can do Permit tcp any any established Inbound or outbound on a

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Nick Griffin
It would probably help if you elaborated on what type of connections will be established through/from the device in question. Sent from my iPhone > On Sep 15, 2020, at 9:45 AM, Mike wrote: > > On 9/15/20 3:12 AM, Nick Hilliard wrote: >> Mike wrote on 15/09/2020 02:17: >>> I have some

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Mike
On 9/15/20 3:12 AM, Nick Hilliard wrote: > Mike wrote on 15/09/2020 02:17: >> I have some gear that needs a public ip, but does not have the best >> security profile, and I want to put up an ACL that only permits this >> gear to make outbound connections while dropping all inbound. My router

Re: [c-nsp] cisco ACL filter outbound only

2020-09-15 Thread Nick Hilliard
Mike wrote on 15/09/2020 02:17:     I have some gear that needs a public ip, but does not have the best security profile, and I want to put up an ACL that only permits this gear to make outbound connections while dropping all inbound. My router is an ASR920 running IOS-XE 03.17.03.S. Does

[c-nsp] cisco ACL filter outbound only

2020-09-14 Thread Mike
Hello,     I have some gear that needs a public ip, but does not have the best security profile, and I want to put up an ACL that only permits this gear to make outbound connections while dropping all inbound. My router is an ASR920 running IOS-XE 03.17.03.S. Does anyone have a simple copy/paste