Culbert
asked on
Use Access lists on mpls network, but now can't access internet
Ok Here it goes....
I found a network on our mpls link that isn't ours in our routing tables. So I am trying to put access lists on the switches at all our locations. However, when I apply the access lists all the internal networks can talk, but nothing can go out to the internet. I thought that I could put a rule to allow any traffic out but the switch will only allow you to apply an access group in. Besides that I don't know if cisco keeps track of sessions. ie. if a packet is allowed out, is it allow to receive the ack if theres no rule to specifically allow that ip?
Ok so heres what I have setup.
access-list 1 permit 10.10.0.0 0.0.255.255
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 1 permit 172.16.0.0 0.0.255.255
I have tried applying the group on all ports of the switches and just the vlans.
It can traverse the mpls but won't allow you to go out to the internet.
I tried making a rule to allow any traffic and apply it to an interface out but there is no out command.
On the 3750s' I'm running 12.2(40)SE and on the 2960s' I'm running 12.2(25)see3.
Is there some kind of command you need to remember sessions or something?
I found a network on our mpls link that isn't ours in our routing tables. So I am trying to put access lists on the switches at all our locations. However, when I apply the access lists all the internal networks can talk, but nothing can go out to the internet. I thought that I could put a rule to allow any traffic out but the switch will only allow you to apply an access group in. Besides that I don't know if cisco keeps track of sessions. ie. if a packet is allowed out, is it allow to receive the ack if theres no rule to specifically allow that ip?
Ok so heres what I have setup.
access-list 1 permit 10.10.0.0 0.0.255.255
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 1 permit 172.16.0.0 0.0.255.255
I have tried applying the group on all ports of the switches and just the vlans.
It can traverse the mpls but won't allow you to go out to the internet.
I tried making a rule to allow any traffic and apply it to an interface out but there is no out command.
On the 3750s' I'm running 12.2(40)SE and on the 2960s' I'm running 12.2(25)see3.
Is there some kind of command you need to remember sessions or something?
ASKER
I can see that this would work but if I start putting deny statements in then if another new network happens to pop up and I don't know about it the default would be to allow all traffic. Isn't there a way to do this with a default deny rather then default permit?
ASKER CERTIFIED SOLUTION
membership
Create a free account to see this answer
Signing up is free and takes 30 seconds. No credit card required.
ASKER
Thanks for your help. Its working.
Second to block the other networks you would need to put the deny at the TOP of the ACL. It would be more efficient to put it like this:
access-list 1 deny ip [unknown network]
access-list 1 permit ip any any
That will let your networks talk to each other and to the internet. The deny statement will be read and processed for the traffic you don't want and will drop it before it gets to the permit stage.
The "in" part of the command means into the interface, not the network. If you were to put that ACL into your edge interfaces you should be fine.