Good suggestion and I may try that but would have to do a little thinking on it first! I don't use access list numbers, I use names. It takes me less than 5 seconds to do the cut and paste. -----Original Message----- From: John M. Troher [mailto:[EMAIL PROTECTED] On Behalf Of John M. Troher Sent: Friday, February 13, 2004 6:38 AM To: [EMAIL PROTECTED] Subject: RE: [Modus] Firewalls for ISPs
Ronnie, you should rotate access list numbers to prevent having to take one down to update it. lets say for your interfaces to the net that they use access list 101 inbound, reserve access list 102 for updates. Then you can take your current ACL 101 add your new rules and do a fast search and replace for the 101 and change it to 102 (the acl number in the list) paste acl 102 in to the router, then update your interface to use 102 in. This way there is zero downtime, and you have the original around in you need to switch back in a hurry. next time you need to make a change, remove list 101 and replace with the change, update interfaces to use 101 and 102 is around for backup incase something is wrong with new list. John _____ From: [EMAIL PROTECTED] on behalf of Ronnie Franklin Sent: Thu 2/12/2004 11:25 PM To: [EMAIL PROTECTED] Subject: [Modus] Firewalls for ISPs We do three things here. 1. Primary line of defense is a Cisco 7000RSP as the border router with several Access-list. Access list are on the inbound circuits from the Internet, our T1s that connect to remote locations, and our ethernet ports that connect to our servers, dialup, DSL and wireless access servers. There are also a couple of access-list that are for specific viruses. 2. Secondary line of defense is that each computer at our NOC has Black Ice or Zone Alarm installed with only the ports open that need to be open for that server. If you don't have a secondary line of defense then you are open for a few seconds when you update your access-list. 3. We have Snort 2.0 installed as an IDS so we can see what else is happening such as additional ports that need blocked, users that have viruses and etc. Access-list are a real pain until you understand them and have an easy way to update them. I store the "master" access-list in .txt files on a workstation, then modify them as needed, cut and paste them to the router. The .txt file contains all the necessary commands, with the exception of username/passwords, to delete the current access-list from each interface, create the new access-list and then apply the access-list back to the proper interfaces. A modification of an access-list takes me no more that 30 seconds from start to finish. For those that want to setup an IDS using Snort, there is a book out that is called "Snort 2.0 Intrusion Detection" published by Syngress. Located at http://www.syngress.com/catalog/sg_main.cfm?pid=2440 Ronnie
<<attachment: winmail.dat>>
