----- Original Message ----- 
From: Kent Hundley <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; firewalls <[EMAIL PROTECTED]>
Sent: Monday, October 04, 1999 11:35 PM
Subject: RE: Router ACL's


>Bill,

>Comments imbedded:

  <snips>

>Without more specific information, it's hard to give a complete answer.
>It's possible that the IP packets are non-first fragments or that
>someone is purposely using a hacking tool that crafts packets designed
>to make it through non-stateful filtering routers. (i.e. set the ACK or
>RST bit)  Most cisco ACL's won't filter non-first IP fragments.  You can
>enable filtering of all fragments in certain IOS versions, but it's an
>all or nothing process unless you use the Firewall Feature Set, and even
>then you'll need version 12.0.

By 'non-first' I'm assuming you mean other than SYN's?  So, if non-SYN 
packets are received at the (non-stateful) interface, they're not dropped,
even if the packet's IP is in the ACL? I'm still running 11.2 IOS, BTW.
Definitely in need of an upgrade <g>.

>Without knowing more about exactly what packets your seeing hit your
>firewall and what your ACL entries looks like, there's no way to give a
>more specific answer.

A typical ACL entry would be:

access-list 100 deny tcp any host xxx.xxx.xxx.xxx

The list would be assigned as 'in' on the interface.

I've tossed a 'log' onto the end for the hosts that have been punching
through, and I see logged denials.  But I still see quite a few entries 
from the same IP's that have made it to the firewall logs, too.  That's 
why I'm groping.  :)

>HTH,
>Kent Hundley

Thanks Kent, & all the other list members who've dropped me tips.

--Bill


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to