Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Use Access lists on mpls network, but now can't access internet

Posted on 2008-06-11
4
Medium Priority
?
213 Views
Last Modified: 2013-11-16
Ok Here it goes....

I found a network on our mpls link that isn't ours in our routing tables.  So I am trying to put access lists on the switches at all our locations.  However, when I apply the access lists all the internal networks can talk, but nothing can go out to the internet.  I thought that I could put a rule to allow any traffic out but the switch will only allow you to apply an access group in.  Besides that I don't know if cisco keeps track of sessions.  ie.  if a packet is allowed out, is it allow to receive the ack if theres no rule to specifically allow that ip?

Ok so heres what I have setup.

access-list 1 permit 10.10.0.0 0.0.255.255
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 1 permit 172.16.0.0 0.0.255.255

I have tried applying the group on all ports of the switches and just the vlans.  

It can traverse the mpls but won't allow you to go out to the internet.  

I tried making a rule to allow any traffic and apply it to an interface out but there is no out command.  

On the 3750s' I'm running 12.2(40)SE and on the 2960s' I'm running 12.2(25)see3.  

Is there some kind of command you need to remember sessions or something?
0
Comment
Question by:Culbert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 16

Expert Comment

by:btassure
ID: 21760387
OK, first you would need to put an allow any statement in as there is an implicit deny at the bottom of every access list.

Second to block the other networks you would need to put the deny at the TOP of the ACL. It would be more efficient to put it like this:

access-list 1 deny ip [unknown network]
access-list 1 permit ip any any

That will let your networks talk to each other and to the internet. The deny statement will be read and processed for the traffic you don't want and will drop it before it gets to the permit stage.

The "in" part of the command means into the interface, not the network. If you were to put that ACL into your edge interfaces you should be fine.
0
 

Author Comment

by:Culbert
ID: 21760443
I can see that this would work but if I start putting deny statements in then if another new network happens to pop up and I don't know about it the default would be to allow all traffic.  Isn't there a way to do this with a default deny rather then default permit?
0
 
LVL 16

Accepted Solution

by:
btassure earned 2000 total points
ID: 21768612
No. You need a default to allow any as you do not know to which addresses you will be sending internet traffic. The closest you could probably be come would be:

permit YOUR networks
deny 10.x
deny 192.x
deny 172.x (basically put in deny rules for all PRIVATE subnets)
permit any (to allow access to the internet)
0
 

Author Closing Comment

by:Culbert
ID: 31466166
Thanks for your help.  Its working.
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question