ACL issue

Unanswered Question
Oct 1st, 2009

Hello,

I have applied the following extended ACL to one of our Vlans but it does not seem to be working. I am able to access the 192.168.2.3 web site and telnet successfully to the host 192.168.2.1.

ip access-list extended ExternalVlan

permit tcp 192.168.12.0 0.0.3.255 host 192.168.2.36 eq 510

permit tcp 192.168.12.0 0.0.3.255 host 192.168.2.36 eq smtp

permit tcp 192.168.12.0 0.0.3.255 host 192.168.2.36 eq www

permit tcp 192.168.12.0 0.0.3.255 host 192.168.2.36 eq pop3

permit tcp 192.168.12.0 0.0.3.255 any eq www

permit tcp 192.168.12.0 0.0.3.255 any eq 443

permit tcp 192.168.12.0 0.0.3.255 any eq ftp

deny tcp 192.168.12.0 0.0.3.255 host 192.168.2.3 eq www

deny tcp 192.168.12.0 0.0.3.255 host 192.168.2.1 eq telnet

The host 192.168.2.1 is a Cisco 3550 layer 3 switch (IOS: 12.1)that does the inter-Vlan routing. The network 192.168.12.0/22 has a Dhcp server that is functioning properly. The host 192.168.2.3 is the Firewall and the gateway to the Internet. What seems to be the problem with this ACL?

Thanks.

I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 3 (1 ratings)
Loading.
pompeychimes Thu, 10/01/2009 - 18:30

This line, specifically the "any" statement, is permitting your port 80 traffic...

permit tcp 192.168.12.0 0.0.3.255 any eq www

The telnet traffic is permitted because this ACL applies to traffic passing through the Switch and not to traffic terminating on the Switch.

James

h-kholghi Fri, 10/02/2009 - 04:30

James,

Thank you so much for your reply. How can I add these deny statements to the ACL list and make them work?

Would something like following work?

Deny tcp 192.168.12.0 0.0.3.255 host 192.168.2.3 eq www

Permit tcp 192.168.12.0 0.0.3.255 any eq www

What would be the best way to block telnet session to the Cisco switch (host 192.168.2.1) from subnet 192.168.12.0/22?

Thanks again,

Hossein Kholghi

pompeychimes Fri, 10/02/2009 - 05:41

"Deny tcp 192.168.12.0 0.0.3.255 host 192.168.2.3 eq www

Permit tcp 192.168.12.0 0.0.3.255 any eq www"

Correct. Put your specific denies above your general permits.

For telnet do something like this...

!

ip access-list standard TELNET

deny 192.168.12.0 0.0.3.255

permit ?.?.?.? ?.?.?.? (Define what addresses can telnet to the device)

!

line vty 0 4

access-class TELNET in

!

Now be careful you don't lock yourself out when applying hte access class to the vty lines. Make sure your computer is in the permit statement.

James

Actions

This Discussion