Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
26 views
Infrastructure Access-List PDF
Uploaded by
Indra Kenward
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Infrastructure Access-List.pdf For Later
Download
Save
Save Infrastructure Access-List.pdf For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
26 views
Infrastructure Access-List PDF
Uploaded by
Indra Kenward
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Infrastructure Access-List.pdf For Later
Carousel Previous
Carousel Next
Save
Save Infrastructure Access-List.pdf For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 4
Search
Fullscreen
Search Infrastructure Access-List Lesson Contents 1.Configuration 1. IEMP Packet Filtering 2.1P Fragment Fiering 13, RFC 3330 Address Filtering 4, RFC 7918 Address Fitering 115, RFC 2827 Address Fltering 1.6.86 Fitering {As lexplained in mylesson about the router security polity, routers are often used at the ‘edge of our network where they are vulnerable to attacks, Because ofthis, you should have an access list chat blocks some ofthe most common attacks while you only permit traffic that s really required, What your access-list wll lock Ike really depends on the the role of your router. Do you Use it for NAT/PAT with some users behind Itfor nternet access or Ista transit router ‘on the Internet? Do you use any VPNs or GP? What kind of traffic ows through your router? These are all questions that you need to answer before you create an infrastructure access-list. To give you an idea what a infrastructure accesslst could look lke I show you some ‘common statements that you might find in an infrastructure access-list. 1. Configuration Here's the topology: ddd Fa0/0——( Internat —_— ‘The router above is connected to the Internet with one interface and has a public IP address, Behind the router isa hast that requires Internet access, 1.1. ICMP Packet Filtering ICMP Is an Important protocol for debugging, troubleshooting and error reporting so you shouldn’ completely block it. However it can be misused for reconnaissance or DoS attacks so it might wise to restrict it Course Contents cenrencon3se401 Uni Stehing ni: Routing Unies Networ reise Unies Secunsy Bt: Devie Access Corral 1B a 2:mrasvusureSecutty Sondre Acceseist Management Pane Protertion DP 1D 23 WietesSeeuty 1B 5: Nework seeury Design Compenenss Bo 5-Tunnelng 1B Unto: Automation 1B Unee-viualzaion Unis: Pracice amna(config-ext-nacl)#permit cmp any any echo-reply Ra(config-ext~1 )Aperait emp any any unreachable Ri(config-ext-nacl)apermit Lemp any any tine-exceeded Ra(config-ext-nacl)deny emp any any With the access-list statements above we only allow echo-reply so that we can respond ‘to pings. Unreachable and time-exceeded are required for a traceroute. Allother ICMP types are denies, 1.2. IP Fragment Filtering Fragmentation isthe process of breaking down IP packets into multiple smaller packets. This can be useful ifyour packets are too large for the interface MIU, ‘The problem with fragmentation is that tnere are a number of exploits so it might be wise to drop all fragmented packets: Ra(config-ext-nacl)deny 4p any any Fragments 1.3. RFC 3330 Address Filtering RFC 3330 describes the special addresses that were assigned for IPv4, There are no legitimiate packets that you could receive from your Internet connection that have these special addresses as the source address: Ra (config-ext-nacl)ideny ip host 0.0.0.0 any ).0 0.255.255.255 any Ra (config-ext-nacl)#deny ip 192.0.2.0 0.0.0.255 any Ra(config-ext-nacl)#deny 4p 224.8.0.0 15.255.255.255 any Ra(config-ext-nacl) deny 4p 127 Let me explain these statements: + You should never see an IP packet that uses 0.00.0 as ts source IP address so we blockit +The 127.0.00/8 range is forthe loopback, you should never see an IP packet from ‘the Internet that uses this address. + 192.0.2.0/28 was assigned as the TEST-NET by IANA andl addresses in this range are never used on the Internet + 24.0.0: 4s the mukicast range. 1,4, RFC 1918 Address Filtering Private addresses are used on our local network, you shouldnt expect to see any IP packets from the Internet with a private adress as the source. Ra(config-ext-nacl) deny ip 1€.0.0.0 @.255.255.255 any ra(confie ‘t-nacl)#deny 4p 172.26.0.0 8.15.255.255 any Ra(config-ext-nacl)deny 1p 192.168.9.0 0.0.255.255 any 1.5. RFC 2827 Address Filtering you have your own public address space then you should add itn your accessist You should never see an IP packet from the Internet that has one of your own IP addresses as the source: Ra(config-ext-naci)#deny 4p 1.0.0.8 0.255.255.255 any1.6. BGP Filtering your router has an eBGP adjacency with another router then it might be wise to only permit this specitic TCP connection: Ra(config-ext-nach)spermit tep host 3.3.3.3 host 1.1.1.1 eq bgp Ra(config-ext-nach)apermit tep host 3.3.3.3 eq bgp host 2.2.2.2 Ra(config-ext-nacl) deny tep any any eq bEp ‘The statements above will permit BGP trafic Beween 1.1.1.1 and 3.3.3.3 but will deny al other BGP traffic. "hope this example has been helpful to get an idea what an infrastructure access-list could look tke. For your own network you really should research what protocols you require and what traffic you should permit or deny. beavis Lesson NextLesson ( visser vac mmesaseddccesist > © Togs: ACL, Secusiy Forum Replies Helle, Theresa po Ra(config-ext-nacl}Rdery 1p 224.0.0.8 31.285.255.255 any etme expan these statement: 2240.0. 4's the mubcast ange. Ithinki shouldbe 15,255. 255 255 instead) a Ioranides Hello sales2161 Yesyou ae correct iletRene know. Thanks! Isthis scenario relevant int he reat workin our production network, ll our routers ste behind fertigat frewal,& ‘ Hello Waker ‘The dea ofan nastructure acess ss mare ofa concept than an aetalimplementation svatey, The idea sto ensure that there ae some fundamental best practices that shoul be enables tthe edge of your network, fo protect an secret. Nowa the very least, you simply have a router you must employ these as simple access Iss on tha outer, ensixing that you are blockingthe appropriate ICMP packets private addresses and fragments to name a fs Now if you have 2 fvewall or some sort of secur appllance onthe edge of th Continue reading in our forum ie, ‘thanks helped alo 2021 NetworkLessons, Disclaimer Privacy Policy Support About
You might also like
4.4.1.2 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
PDF
No ratings yet
4.4.1.2 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
20 pages
Configure A DHCP
PDF
No ratings yet
Configure A DHCP
15 pages
Traffic PDF
PDF
100% (4)
Traffic PDF
162 pages
3 Chapter Three
PDF
No ratings yet
3 Chapter Three
10 pages
Ccna Quick Revision Notes
PDF
100% (3)
Ccna Quick Revision Notes
49 pages
firewalls
PDF
No ratings yet
firewalls
40 pages
Firewall FBasic Examples
PDF
No ratings yet
Firewall FBasic Examples
3 pages
Computer System Engineering Department ENCS413 Network Lab Access List
PDF
No ratings yet
Computer System Engineering Department ENCS413 Network Lab Access List
13 pages
Lab 8 Packet Tracer Version
PDF
No ratings yet
Lab 8 Packet Tracer Version
6 pages
Work Security
PDF
No ratings yet
Work Security
114 pages
4.4.1.2 - Configure Ip Acls To Mitigate Attacks: Topology
PDF
No ratings yet
4.4.1.2 - Configure Ip Acls To Mitigate Attacks: Topology
85 pages
What Are Access Control Lists
PDF
No ratings yet
What Are Access Control Lists
4 pages
What Are Access Control Lists
PDF
No ratings yet
What Are Access Control Lists
4 pages
491s Lec8 Firewalls
PDF
No ratings yet
491s Lec8 Firewalls
37 pages
Lab 5.5.1: Basic Access Control Lists: Topology Diagram
PDF
0% (1)
Lab 5.5.1: Basic Access Control Lists: Topology Diagram
10 pages
26.1.2
PDF
No ratings yet
26.1.2
7 pages
Configure Extended Access Lists
PDF
No ratings yet
Configure Extended Access Lists
7 pages
5.2.7 Packet Tracer - Configure and Modify Standard IPv4 ACLs - ILM
PDF
No ratings yet
5.2.7 Packet Tracer - Configure and Modify Standard IPv4 ACLs - ILM
9 pages
5.2.7 Packet Tracer - Configure and Modify Standard IPv4 ACLs
PDF
No ratings yet
5.2.7 Packet Tracer - Configure and Modify Standard IPv4 ACLs
7 pages
5 4 13 PDF
PDF
No ratings yet
5 4 13 PDF
8 pages
Chapter 8 Access Control Lists (ACL)
PDF
No ratings yet
Chapter 8 Access Control Lists (ACL)
47 pages
Lab_ACL
PDF
No ratings yet
Lab_ACL
5 pages
SIC Practical4 by STUD - Talks
PDF
No ratings yet
SIC Practical4 by STUD - Talks
13 pages
Configuring Standard ACLs
PDF
No ratings yet
Configuring Standard ACLs
6 pages
EWAN Lab 5 5 1
PDF
No ratings yet
EWAN Lab 5 5 1
10 pages
ACL Solution
PDF
No ratings yet
ACL Solution
4 pages
Why Use Access Control Lists (ACL)
PDF
No ratings yet
Why Use Access Control Lists (ACL)
5 pages
Practical 4
PDF
No ratings yet
Practical 4
12 pages
7.2.2.6 Lab - Configuring and Modifying Standard IPv4 ACLs - ILM
PDF
No ratings yet
7.2.2.6 Lab - Configuring and Modifying Standard IPv4 ACLs - ILM
21 pages
More Access Control Lists: Eumed - Grnet
PDF
No ratings yet
More Access Control Lists: Eumed - Grnet
29 pages
Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy
PDF
No ratings yet
Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy Answer MattCisco CCNA 2 skills based assessment SBA answers 2008 completedy
6 pages
ACLs
PDF
No ratings yet
ACLs
18 pages
Sybex CCNA 640-802 Chapter 12
PDF
No ratings yet
Sybex CCNA 640-802 Chapter 12
30 pages
5 1 8 PDF
PDF
100% (1)
5 1 8 PDF
7 pages
Lab Worksheet 7: Basic Access Control List
PDF
No ratings yet
Lab Worksheet 7: Basic Access Control List
5 pages
004 Secruity-IP Services-CCNA PDF
PDF
No ratings yet
004 Secruity-IP Services-CCNA PDF
204 pages
4.1.2.5 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
PDF
No ratings yet
4.1.2.5 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
5 pages
Introducing ACL Operation: Access Control Lists
PDF
No ratings yet
Introducing ACL Operation: Access Control Lists
38 pages
7.2.1.6 Packet Tracer Configuring Numbered Standard IPv4 ACLs Instructions - ILM
PDF
No ratings yet
7.2.1.6 Packet Tracer Configuring Numbered Standard IPv4 ACLs Instructions - ILM
4 pages
Topic5-Access Control Lists ACL
PDF
No ratings yet
Topic5-Access Control Lists ACL
43 pages
Access Control Lists: Advanced Systems Administration Course
PDF
No ratings yet
Access Control Lists: Advanced Systems Administration Course
21 pages
Ccnas Chp4 Ptacta Acl Instructor
PDF
No ratings yet
Ccnas Chp4 Ptacta Acl Instructor
4 pages
4.4.1.2 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
PDF
No ratings yet
4.4.1.2 Packet Tracer - Configure IP ACLs To Mitigate Attacks - Instructor
17 pages
Clase 17. Packet Filtering
PDF
No ratings yet
Clase 17. Packet Filtering
70 pages
9.2.1.10 Packet Tracer Configuring Standard ACLs Instructions IG
PDF
No ratings yet
9.2.1.10 Packet Tracer Configuring Standard ACLs Instructions IG
7 pages
9.3.2.10 Packet Tracer Lab Walk Through
PDF
No ratings yet
9.3.2.10 Packet Tracer Lab Walk Through
5 pages
CCNA Lab M4 5.5.1
PDF
No ratings yet
CCNA Lab M4 5.5.1
6 pages
8.5.6 Packet Tracer - Configure Numbered Standard IPv4 ACLs
PDF
No ratings yet
8.5.6 Packet Tracer - Configure Numbered Standard IPv4 ACLs
3 pages
3-Access - List Ccna Security Ipv4 Ipv6
PDF
No ratings yet
3-Access - List Ccna Security Ipv4 Ipv6
101 pages
Acl CCNP
PDF
No ratings yet
Acl CCNP
16 pages
ACL2
PDF
No ratings yet
ACL2
88 pages
Lesson 01 Course Introduction
PDF
No ratings yet
Lesson 01 Course Introduction
16 pages
59-Integration On UCCX With CallManager
PDF
No ratings yet
59-Integration On UCCX With CallManager
7 pages
LTRCRS 2579
PDF
No ratings yet
LTRCRS 2579
74 pages
Microphone and Speaker Placement
PDF
No ratings yet
Microphone and Speaker Placement
5 pages