It is not clear from what you posted whether the 18.104.22.168 is the source address or the destination. But it needs to be the destination address. Also the mask that you gave will not filter /4 but would essentially filter /24. If you try this you should find that it works:
deny ip any 22.214.171.124 126.96.36.199
Depending on your particular environment filtering out all multicast may or may not be a desirable thing to do. But if you believe that you want to do it this version of the access list should get it done. Of course there should be some other things in the access list = deny other unwanted traffic and permit desirable traffic.
This document gives several answers on frequently asked questions for PFRv3 channel state behavior.
Q1: What are all the channel operational states from a BR (border role) perspective and what are the rules/conditions to be in each st...
The need was to reach an host inside a LAN through a VPN connection managed by the LAN gateway (Cisco 1921).
The LAN gateway performs NAT and there was a dedicate nat rule for the host i wanted to reach through VPN.
I couldn't connect to the hos...
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...