HSNRSM(config)# access−list 100 deny tcp any any eq 20

HSNRSM(config)# access−list 100 deny tcp any any eq 21

3.Because the access list has an implied “deny all” at the end, you need to apply a rule that any other traffic can pass through. The ip indicates that all IP protocols are being identified:

HSNRSM(config)# access−list 100 permit ip any any

You do not want to apply the access list to an outbound interface, because then the FTP packets would span the switch fabric and use up bandwidth and processing power. You want to apply the access list immediately to the inbound interface to the company’s Distribution layer switch.

To apply the access lists to an interface, follow these steps:

1.Access the interface to be configured. In this case, from Global Configuration mode, use the following command:

interface fastethernet0/0

2.Apply the access list to the interface to block access to inbound packets using the following command:

ip access−group 100 in

Unless the packets for FTP are coming from the advertising company, no one else will be able to access your FTP server.

Related solutions:

Found on page:

Opening a Session on an Internal Route Processor

381

Entering Configuration Mode on an RSM

381

Creating an Extended Access List

Creating an extended access list is very similar to creating a standard access list, but the options are more complex and can become quite lengthy. We suggest writing out your extended access list beforehand and then implementing it. Here’s the syntax an Extended Access List can require for configuration:

access−list access−list−number {denypermit} {protocol type} source−address source−wildcard destination−address destination−wildcard [protocol specific optionsoperator] [log]

Let’s step through creating an extended access list that can be applied to an interface and deny any host on network 172.16.10.0 from going to any host on network 172.15.10.0. It will also deny ports 80, 23, 21, and

20.This will effectively disallow any access to World Wide Web services, Telnet, and FTP. Let’s look at all the options:

1. For an extended access list we must identify an access list number between 100 and 199:

CoriolisRSM1(config)#access−list 199

?

deny

Specify packets

to reject

 

dynamic

Specify

a DYNAMIC list of PERMITs or DENYs

permit

Specify

packets

to forward

 

2.We must then choose who to deny. We are using TCP instead of IP so we can just identify the ports we want to deny. The first IP address identifies the network. The 0.0.0 identifies that the first three octets must be the same and the .255 identifies all the hosts in the last octet:

CoriolisRSM1(config)#access−list 199 deny tcp

172.16.10.0 0.0.0.255 ?

A.B.C.D

Destination address

 

any

Any destination host

 

eq

Match only

packets

on a given port

number

gt

Match only

packets

with a greater port number

264

Page 280
Image 280
Cisco Systems RJ-45-to-AUX manual Creating an Extended Access List, 264