The hack does not require the usage of all 4 protocols. Using any one of
them will allow disable the router interface.

Using hping to test is the best way to see what I mean.

John


On Wed, 2003-07-23 at 14:16, DOUGLAS GULLETT wrote:
> I don't think you have to put all the access-list in.  I believe that 
> the hack requires a certain combination of packets to the four ports, 
> so leaving one or two of them open should still prevent the hack.  That 
> might be a good question for Cisco TAC...they should be willing to help 
> even if you "misplaced" your SmartNet contract information.  ;-)
> 
> Doug
> 
> 
> 
> ----- Original Message -----
> From: Alvaro Gordon-Escobar <[EMAIL PROTECTED]>
> Date: Wednesday, July 23, 2003 10:15 am
> Subject: Cisco Workaround
> 
> > will this access list modification prevent my internal DNS server 
> > from updates to it self from my telco's DNS server?
> > 
> > access-list 101 deny 53 any any
> > access-list 101 deny 55 any any
> > access-list 101 deny 77 any any
> > access-list 101 deny 103 any any
> > !--- insert any other previously applied ACL entries here
> > !--- you must permit other protocols through to allow normal
> > !--- traffic -- previously defined permit lists will work
> > !--- or you may use the permit ip any any shown here
> > access-list 101 permit ip any any
> > 
> > Thanks in advance
> > 
> > ~alvaro Escobar
> > 
> > -------------------------------------------------------------------
> > --------
> > -------------------------------------------------------------------
> > ---------
> > 
> > 


---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to