Hot Downloads

Welcome, Guest
Username: Password: Remember me
  • Page:
  • 1
  • 2

TOPIC: Use of ACL's to mitigate the risk of IP Spoofing

Use of ACL's to mitigate the risk of IP Spoofing 6 years 6 months ago #34655

  • FlipRich
  • FlipRich's Avatar
  • Offline
  • Distinguished Member
  • Posts: 80
  • Karma: 0
Consider this ACL used for protection against IP Spoofing:

Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip access-list ext ingress-antispoof
Router(config-ext-nacl)# deny ip 10.0.0.0 0.255.255.255 any
Router(config-ext-nacl)# deny ip 172.16.0.0 0.15.255.255 any
Router(config-ext-nacl)# deny ip 192.168.0.0 0.0.255.255 any
Router(config-ext-nacl)# deny ip 127.0.0.0 0.255.255.255 any
Router(config-ext-nacl)# deny ip 224.0.0.0 31.255.255.255 any
Router(config-ext-nacl)# deny ip 169.254.0.0 0.0.255.255 any

This incoming ACL would be placed to on the outside int to prevent IP Spoofing.

What's the use of this ACL if IP is already implicitly denied? Other than saving router resources.

This questioned has been in my head for months and I still dont know the answer. I did pass the CCNA-S test without the answer though. :)
Rich
Network Engineer /CCNP, CCNA-S
Tallahassee, FL
The administrator has disabled public write access.

Re: Use of ACL's to mitigate the risk of IP Spoofing 6 years 6 months ago #34669

  • JamieP
  • JamieP's Avatar
  • Offline
  • Frequent Member
  • Posts: 60
  • Karma: 0
These ACL's are usually applied to wan interfaces, which *should* have a public IP address.

Therefore, unless you are addressing the inside of your network with a public IP Range, you will be using one of the ranges specified in the ACL, and NATing from inside to out.

So, working on the assumption that your wan interface has a public IP address, and the ranges in the ACL cannot be routed on the public network (i.e. the internet) you should never see this traffic, unless it is malicious.

The below is a copy from one of my edge ACL's, the counters were only reset yesterday, and i'm already seeing hits

110 deny ip 10.0.0.0 0.255.255.255 any
120 deny ip 172.16.0.0 0.15.255.255 any
130 deny ip 192.168.0.0 0.0.255.255 any (6 matches)
140 deny ip 127.0.0.0 0.255.255.255 any


Hope that helps, any questions drop me a PM or something
Jamie Parks
Network Engineer, UK
The administrator has disabled public write access.

Re: Use of ACL's to mitigate the risk of IP Spoofing 6 years 5 months ago #34686

  • FlipRich
  • FlipRich's Avatar
  • Offline
  • Distinguished Member
  • Posts: 80
  • Karma: 0
Yes, that helps jamieP. Thanks.

Since you block all RFC1918 on the outside int., did you permit all IP behind your deny statements?
Rich
Network Engineer /CCNP, CCNA-S
Tallahassee, FL
The administrator has disabled public write access.

Re: Use of ACL's to mitigate the risk of IP Spoofing 6 years 5 months ago #34688

  • Losh
  • Losh's Avatar
  • Offline
  • Distinguished Member
  • Posts: 103
  • Karma: 0
ok like someone just told you, this rule is usually applied on the wan interfaces in the ingress direction.
If you look at the addresses denied you will notice they all belong to private address classes and the last being a microsoft default dhcp address.
Those address are usually referred to as martian addressess, you dont expect them to come from a wan interface i.e from the internet/outside of your network. they are supposed to originate from the inside of your network instead.
Therefore is someone from outside your network is trying to hack you, they will pretend to come from inside your network so that you allow them in when in real sense they are coming from the outside network.
That is why you block these addresses so as no one will try to confuse your network device even if there is an implicit deny statement.
Another option is to use the command

Router (config)#ip inspect name BLOCKOUT
Router (config)#ip access-list extended BLOCKOUT

then configure the ACLs to block the addressess
This will allow incoming packets only if they are replies to what originated from your inside network.

I hope this helps abit.
~ Networking :- Just when u think its starting to make sense......... ~
____________________________________________
CCNA, CCNP, CCNA Security, JNCIA, APDS, CISA
The administrator has disabled public write access.

Re: Use of ACL's to mitigate the risk of IP Spoofing 6 years 5 months ago #34693

  • JamieP
  • JamieP's Avatar
  • Offline
  • Frequent Member
  • Posts: 60
  • Karma: 0
Yes, that helps jamieP. Thanks.

Since you block all RFC1918 on the outside int., did you permit all IP behind your deny statements?

I certainly dont have a permit all, there are lots of other rules to allow in some TCP/UDP ports, rules to allow services such as DNS, NTP, IPsec etc...

For obvious security reasons i wont post my whole ACL, but the last two rules are;

[code:1] remark ~~ TCP Established Permit ~~
permit tcp any any established
remark ~~ Deny Any ~~
deny ip any any log[/code:1]

I cant imagin a situation where you would permit any any on an ingress ACL on your WAN interface
Jamie Parks
Network Engineer, UK
The administrator has disabled public write access.

Re: Use of ACL's to mitigate the risk of IP Spoofing 6 years 5 months ago #34702

  • FlipRich
  • FlipRich's Avatar
  • Offline
  • Distinguished Member
  • Posts: 80
  • Karma: 0
I actually did some research on this and I dont think this type of ACL is needed on an outside int because of the implicit deny all.

However, these ACL statements can be used on the inside int to prevent spoofing.
Rich
Network Engineer /CCNP, CCNA-S
Tallahassee, FL
The administrator has disabled public write access.
  • Page:
  • 1
  • 2
Time to create page: 0.095 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup