So I'm working on this lab and I'm having some issues actually making this work 
as it should. The task in question is asking that we "configure R8 to only 
allow packets destined to 100.100.200.0/24 that were originated by users in the 
f0/0 (100.100.200.0/24) LAN".

We can solve this in one of two ways using either the older reflexive access 
lists or CBAC. For this particular task I'm going with the reflexive ACL and 
not CBAC. Also note that this is my home lab and so the Fast Ethernet 
interfaces are actually just Ethernet interfaces for me.


Here are the commands i configured for the task



ip access-list extended TASK17.3_TRUST

permit ip 100.100.200.0 0.0.0.255 any reflect STUFF



int e0/0

ip access-group TASK17.3_TRUST in



ip access-list extended TASK17.3_NOTRUST

evaluate STUFF

deny ip any any



int e0/0

ip access-group TASK17.3_NOTRUST out



However the issue I'm facing is that I can't get it to work. To verify this 
task I created an SVI on Cat2 for VLAN 200



Int vlan 200

Ip address 100.100.200.12 255.255.255.0



I'm going to start over by removing my ACL's and  try this again, hopefully you 
can follow and help me out here



First I will remove the ACL's from the e0/0 interface on R8



R8(config-ext-nacl)#int e0/0

R8(config-if)# no ip access-group TASK17.3_TRUST in

R8(config-if)# no ip access-group TASK17.3_NOTRUST out



and now we will attempt to ping and telnet from  R7 over to Cat2



R7(config-line)#do ping 100.100.200.12

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 100.100.200.12, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 8/8/12 m



And telnet?



R7(config-line)#do telnet 100.100.200.12

Trying 100.100.200.12 ... Open



Cat3560-2>



So it works with the ACL's removed. Now I'm going to put them back and add the  
keyword "log" after the deny statement and see what happens.



R8(config-if)# ip access ext TASK17.3_NOTRUST

R8(config-ext-nacl)#20 deny ip any any log

R8(config-ext-nacl)#int e0/0

R8(config-if)# ip access-group TASK17.3_NOTRUST out

R8(config-if)# ip access-group TASK17.3_TRUST in



Let's attempt another ping from R7 to Cat2 so we can make sure that the deny 
matches are incrementing



R7(config-line)#do ping 100.100.200.12

U.U.U



R8(config)#do sh ip access TASK17.3_NOTRUST

Extended IP access list TASK17.3_NOTRUST

    10 evaluate STUFF

    20 deny ip any any log (5 matches)



OK cool. Now let's run yet another ping from Cat2 to R7 which should succeed, 
this should also create a dynamic entry in the relexive ACL we named "STUFF"



Cat3560-2(config)#do ping 150.100.78.7



Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 150.100.78.7, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 8/11/25 ms



Ping is good let's verify the dynamic entry on R8



R8(config)#do sh ip access STUFF

Reflexive IP access list STUFF

     permit icmp host 150.100.78.7 host 100.100.200.12  (19 matches) (time left 
263)



This statement clearly shows that ICMP packets sourced from 150.100.78.7 should 
make it all the way over to Cat2 100.100.200.12, but do they?



R7(config-line)#do ping 100.100.200.12 source 150.100.78.7



Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 100.100.200.12, timeout is 2 seconds:

Packet sent with a source address of 150.100.78.7

U.U.U

Success rate is 0 percent (0/5)



NOPE! Let's check R8 and see if the deny matches have incremented



R8(config)#do sh ip access TASK17.3_NOTRUST

Extended IP access list TASK17.3_NOTRUST

    10 evaluate STUFF

    20 deny ip any any log (15 matches)



and the debug output



*Mar  1 10:24:22.889: IP: s=150.100.78.7 (Serial0/0), d=100.100.200.12 
(Ethernet0/0), len 100, access denied



Sure enough they are still being blocked, almost as if R8 is NOT evaluating 
"STUFF"? I mean the routes are good and it's sending it out and even with the 
"evaluate" key word and the correct dynamic entry I'm still being denied. We 
know teh routes are good as you can see in the debugs as well as what shows up 
in the route table and FIB





R7(config-line)#do sh ip route 100.100.200.12

Routing entry for 100.100.200.0/24

  Known via "ospf 1", distance 110, metric 791, type intra area

  Last update from 150.100.78.8 on Serial0/0, 06:41:34 ago

  Routing Descriptor Blocks:

  * 150.100.78.8, from 200.0.0.8, 06:41:34 ago, via Serial0/0

      Route metric is 791, traffic share count is 1



R7(config-line)#do sh ip cef 100.100.200.12

100.100.200.0/24, version 102, epoch 0, cached adjacency to Serial0/0

0 packets, 0 bytes

  via 150.100.78.8, Serial0/0, 0 dependencies

    next hop 150.100.78.8, Serial0/0

    valid cached adjacency



Here is my latest config for your review



Reflexive IP access list STUFF

Extended IP access list TASK17.3_NOTRUST

    10 evaluate STUFF

    20 deny ip any any

Extended IP access list TASK17.3_TRUST

    10 permit ip any any reflect STUFF



interface Ethernet0/0

ip address 100.100.200.8 255.255.255.0

ip access-group TASK17.3_TRUST in

ip access-group TASK17.3_NOTRUST out



I obviously can't call this task good and done if it doesn't work!!!



Any thoughts or ideas for me??



-       Steve















UHS Confidentiality Notice:  This e-mail message, including any attachments, is 
for the sole use of the intended recipient (s) and may contain confidential and 
privileged information.  Any unauthorized review, use, disclosure or 
distribution of this information is prohibited.  If this was sent to you in 
error, please notify the sender by reply e-mail and destroy all copies of the 
original message.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to