Access list and How to use It ?

Please send me a sample of your access list and explain. Thank You

Katie Tam Network Administrator

formatting link

Reply to
Katie Tam
Loading thread data ...

access-list 180 remark Anti-spoofing rules access-list 180 deny ip 0.0.0.0 0.255.255.255 any access-list 180 deny ip 10.0.0.0 0.255.255.255 any access-list 180 deny ip 127.0.0.0 0.255.255.255 any access-list 180 deny ip 172.16.0.0 0.15.255.255 any access-list 180 deny ip 192.168.0.0 0.0.255.255 any access-list 180 deny ip 224.0.0.0 31.255.255.255 any access-list 180 deny ip 192.0.2.0 0.0.0.255 any access-list 180 deny ip 169.254.0.0 0.0.255.255 any

access-list 180 remark ICMP Management access-list 180 permit icmp any host echo-reply access-list 180 permit icmp any host unreachable access-list 180 permit icmp any host time-exceeded

access-list 180 remark SSH Management access-list 180 permit tcp any host eq 22

access-list 180 remark We accept replies to requests first generated internally access-list 180 permit tcp any host gt 1023 established access-list 180 permit udp any host gt 1023

access-list 180 remark Active FTP access-list 180 permit tcp any eq ftp-data host gt

1023

access-list 180 remark Blocks all other IP traffic (WAN -> LAN) access-list 180 deny ip any any

Reply to
Michael Gould

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.