• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 518
  • Last Modified:

Use Access lists on mpls network, but now can't access internet

Ok Here it goes....

I found a network on our mpls link that isn't ours in our routing tables.  So I am trying to put access lists on the switches at all our locations.  However, when I apply the access lists all the internal networks can talk, but nothing can go out to the internet.  I thought that I could put a rule to allow any traffic out but the switch will only allow you to apply an access group in.  Besides that I don't know if cisco keeps track of sessions.  ie.  if a packet is allowed out, is it allow to receive the ack if theres no rule to specifically allow that ip?

Ok so heres what I have setup.

access-list 1 permit 10.10.0.0 0.0.255.255
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 1 permit 172.16.0.0 0.0.255.255

I have tried applying the group on all ports of the switches and just the vlans.  

It can traverse the mpls but won't allow you to go out to the internet.  

I tried making a rule to allow any traffic and apply it to an interface out but there is no out command.  

On the 3750s' I'm running 12.2(40)SE and on the 2960s' I'm running 12.2(25)see3.  

Is there some kind of command you need to remember sessions or something?
0
Culbert
Asked:
Culbert
  • 5
  • 3
  • 2
1 Solution
 
MelaleucaCommented:
I believe the command you are looking for is this tcp established.
access-list 101 permit tcp any any established
0
 
CulbertAuthor Commented:
So in this case I would have to make my access list look like this?

access-list 101 permit ip 10.10.0.0 0.0.255.255 any
access-list 101 permit ip 192.168.0.0 0.0.255.255 any
access-list 101 permit ip 172.16.0.0 0.0.255.255 any
access-list 101 permit tcp any any established

And this would be applied to all ports or a vlan in?
0
 
MelaleucaCommented:
that depends on how your topology is setup you could add this to the trunk link between your switch and the router or you can place it on the router or on the vlan if your 3750 is routing. I'm not sure what you are trying to accomplish with this, but if you found a route that shouldn't be coming from the MPLS i would talk to your provider because they could be injecting the wrong routes into your MPLS-VRF.
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
CulbertAuthor Commented:
I've already contacted bell about this route and they are looking into it.  But more then likely this is going to take awhile for them to actually do.  In the mean time I just don't want them roaming around in our network with no restrictions.  I will apply this access list tonight to the vlan in.  

access-list 101 permit ip 10.10.0.0 0.0.255.255 any
access-list 101 permit ip 192.168.0.0 0.0.255.255 any
access-list 101 permit ip 172.16.0.0 0.0.255.255 any
access-list 101 permit tcp any any established
0
 
logic2Commented:
man if you are putting this ACL in the in direction then you are permiiting access only from Intranet ip addresses and not Internet ones !!! so incoming internet traffic would be dropped
can you tell me the following

1- how do you access the internet usually (directly via the MPLS or via a proxy server)
2- how is this strange route known (do a sh ip route x.x.x.x)

depending on the protocol used to know this router we can prevent it (usually it would be bgp so it would be a piece of cake)
however some companies inject some routes to customer routers to allow them to have remote access to your router if they manage it which i dont think is the case but just maybe they are injecting it, anyway best to block it






0
 
CulbertAuthor Commented:
1. Our remote offices are going through the mpls to our main office where the internet connection is located and directly out.  
2. The strange route is coming in via the Service Provider mpls router.

We are running eigrp over the mpls.  
0
 
logic2Commented:
ok here is the plan

1- remove those access lists as it will be blocking incoming internet traffic
2- i understand that the strange route is coming via eigrp from the SP, in that case add an input distribute list to the eigrp config to deny this route as an example i'd assume that the route is 172.25.3.4/24

Router(config)#access-list 50 deny 172.25.3.4 0.0.0.255
Router(config)#access-list 50 permit any

Router(config)#router eigrp 1
Router(config-router)#distribute-list 50 in
0
 
CulbertAuthor Commented:

Isn't there a way to do this while keeping the default deny?
0
 
CulbertAuthor Commented:
Thanks for your help.  Its working
0
 
logic2Commented:
what do u mean by the default deny ?
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

  • 5
  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now