-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 No, because you aren't blocking TCP/UDP 53 (the DNS ports) but instead the IP PROTOCOL 53.
- -- Charlie > -----Original Message----- > From: Alvaro Gordon-Escobar [mailto:[EMAIL PROTECTED] > Sent: Wednesday, July 23, 2003 8:15 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Cisco Workaround > > > will this access list modification prevent my internal DNS > server from updates to it self from my telco's DNS server? > > access-list 101 deny 53 any any > access-list 101 deny 55 any any > access-list 101 deny 77 any any > access-list 101 deny 103 any any > !--- insert any other previously applied ACL entries here > !--- you must permit other protocols through to allow normal > !--- traffic -- previously defined permit lists will work > !--- or you may use the permit ip any any shown here > access-list 101 permit ip any any > > Thanks in advance > > ~alvaro Escobar > > -------------------------------------------------------------- > ------------- > -------------------------------------------------------------- > -------------- > -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBPx63bcrtF6HAen5cEQKgdwCgjt/DHXe+rwS+C1XzJ72PMRF9QYgAnR2g 2aoE7gL9V0yqUkKGzq6tx0Qj =umqL -----END PGP SIGNATURE----- --------------------------------------------------------------------------- ----------------------------------------------------------------------------