Good suggestion and I may try that but would have to do a little thinking on
it first! 
 
I don't use access list numbers, I use names.  It takes me less than 5
seconds to do the cut and paste.
 
 
-----Original Message-----
From: John M. Troher [mailto:[EMAIL PROTECTED] On Behalf Of John M.
Troher
Sent: Friday, February 13, 2004 6:38 AM
To: [EMAIL PROTECTED]
Subject: RE: [Modus] Firewalls for ISPs



Ronnie,
 
you should rotate access list numbers to prevent having to take one down to
update it.
 
lets say for your interfaces to the net that they use access list 101
inbound, reserve access list 102 for updates.
 
Then you can take your current ACL 101 add your new rules and do a fast
search and replace for the 101 and change it to 102 (the acl number in the
list)
 
paste acl 102 in to the router, then update your interface to use 102 in.
This way there is zero downtime, and you have the original around in you
need to switch back in a hurry.
 
next time you need to make a change, remove list 101 and replace with the
change, update interfaces to use 101 and 102 is around for backup incase
something is wrong with new list.
 
John

  _____  

From: [EMAIL PROTECTED] on behalf of Ronnie Franklin
Sent: Thu 2/12/2004 11:25 PM
To: [EMAIL PROTECTED]
Subject: [Modus] Firewalls for ISPs


We do three things here.
 

1.    Primary line of defense is a Cisco 7000RSP as the border router with
several Access-list.  Access list are on the inbound circuits from the
Internet, our T1s that connect to remote locations, and our ethernet ports
that connect to our servers, dialup, DSL and wireless access servers.  There
are also a couple of access-list that are for specific viruses.
 
2.    Secondary line of defense is that each computer at our NOC has Black
Ice or Zone Alarm installed with only the ports open that need to be open
for that server.  If you don't have a secondary line of defense then you are
open for a few seconds when you update your access-list.
 
3.    We have Snort 2.0 installed as an IDS so we can see what else is
happening such as additional ports that need blocked, users that have
viruses and etc.
 
Access-list are a real pain until you understand them and have an easy way
to update them.  I store the "master" access-list in .txt files on a
workstation, then modify them as needed, cut and paste them to the router.
The .txt file contains all the necessary commands, with the exception of
username/passwords, to delete the current access-list from each interface,
create the new access-list and then apply the access-list back to the proper
interfaces.  A modification of an access-list takes me no more that 30
seconds from start to finish.
 
For those that want to setup an IDS using Snort, there is a book out that is
called "Snort 2.0 Intrusion Detection" published by Syngress.  Located at
http://www.syngress.com/catalog/sg_main.cfm?pid=2440
 
Ronnie
 

<<attachment: winmail.dat>>

Reply via email to