cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
706
Views
0
Helpful
2
Replies

2621 router and NAT tuning

pauljavete
Level 1
Level 1

Hello all,

Just looking for a few suggestions...

I'd like to tune my router to filter connection requests. What Class A networks can be safely filtered out and how do I do it?

I'd also like to set some of the IP NAT TRANSLATION timeout values... Are there recommended settings for a good security setup?

2 Replies 2

steve.barlow
Level 7
Level 7

From a cisco doc I have:

This list represents the common filtering practice of several ISPs. It includes default, broadcast, Martian, and RFC1918 networks. The use of these filters on border routers is recommended. Note: the list of these networks is updated and discussed quite frequently by groups such as NANOG(nanog@merit.edu) and IEPG (iepg@iepg.org).

access-list 180 deny ip host 0.0.0.0 any

access-list 180 deny ip 0.0.0.0 0.255.255.255 255.0.0.0 0.255.255.255

access-list 180 deny ip 1.0.0.0 0.255.255.255 255.0.0.0 0.255.255.255

access-list 180 deny ip 10.0.0.0 0.255.255.255 255.0.0.0 0.255.255.255

access-list 180 deny ip 19.255.0.0 0.0.255.255 255.255.0.0 0.0.255.255

access-list 180 deny ip 59.0.0.0 0.255.255.255 255.0.0.0 0.255.255.255

access-list 180 deny ip 127.0.0.0 0.255.255.255 255.0.0.0 0.255.255.255

access-list 180 deny ip 129.156.0.0 0.0.255.255 255.255.0.0 0.0.255.255

access-list 180 deny ip 169.254.0.0 0.0.255.255 255.255.0.0 0.0.255.255

access-list 180 deny ip 172.16.0.0 0.15.255.255 255.240.0.0 0.15.255.255

access-list 180 deny ip 192.0.2.0 0.0.0.255 255.255.255.0 0.0.0.255

access-list 180 deny ip 192.5.0.0 0.0.0.255 255.255.255.0 0.0.0.255

access-list 180 deny ip 192.9.200.0 0.0.0.255 255.255.255.0 0.0.0.255

access-list 180 deny ip 192.9.99.0 0.0.0.255 255.255.255.0 0.0.0.255

access-list 180 deny ip 192.168.0.0 0.0.255.255 255.255.0.0 0.0.255.255

access-list 180 deny ip 224.0.0.0 31.255.255.255 224.0.0.0 31.255.255.255

access-list 180 deny ip any 255.255.255.128 0.0.0.127

access-list 180 permit ip any any

Apply acl 180 inbound on your external interface.

Anytime you change default timers you can cause more problems than it's worth. If I were to change them I would change only timeout and tcp-timeout to 12 hours. Wait a couple of days, see if anything happens (eg users complain, apps fail etc). If nothing does I would change it to 6 hours. Wait, then go to 3 hours. Wait, then 1 hour. The IOS defaults are:

timeout: 86400 seconds (24 hours)

udp-timeout: 300 seconds (5 minutes)

dns-timeout: 60 seconds (1 minute)

tcp-timeout: 86400 seconds (24 hours)

finrst-timeout: 60 seconds (1 minute)

icmp-timeout: 60 seconds (1 minute)

pptp-timeout: 86400 seconds (24 hours)

syn-timeout: 60 seconds (1 minute)

port-timeout: 0 (never)

Hope it helps.

Steve

Thanks alot... that's exactly what I was looking for....

Cheers!