That is because most of the communication are bidirectional, you have deny ip any any on the inbound direction; your outgoing traffic can leave the interface but return traffic will be blocked by the ACL deny ip any any rule.
You can use reflexive acl to do that. The idea is when traffic leave the interface, it will create a temporary acl to allow the return traffic, and that acl will be added in your existing inbound acl 103. The configuration will look something like this
ip access ex OUTBOUND
permit ip any any ref temp
ip access ex INBOUND
permit ip any host x.x.x.227 log permit tcp any host x.x.x.57 eq 443 log permit udp any host x.x.x.57 eq 443 log evaluate temp deny ip any any log
I'm working on a project that includes basic router configurations. I configurated everything including: line console 0, line vty 0 15 and secret passwords. There are 3 routers in the network and every LAN is going t...
Desire to create Terminal Server ("TS" in this document) out of 2811 Cisco Router with HWIC-16A card (with Octal cables)
Desire to use SSH over Telnet
TS is ip'ed, SSH access configured (to the TS)
Python based Script to BULK Import/Delete devices using Cisco Prime API
Check my Repo on GitHub for all the details ( see below link )