Appendix A. Cisco Access List Sample Configurations

This appendix comprises two access lists that demonstrate possible ways to securely configure a Cisco router as a standalone security device. These sections use best practices as described in Chapter 2, “Packet Filtering,” and Chapter 6, “The Role of a Router,” listed out so that a complete configuration can be seen in its entirety. The first access list is used to demonstrate a network that has no publicly shared resources, and the second access list illustrates an example of a network with publicly accessible mail, DNS, and web servers.

Complete Access List for a Private-Only Network

The following sample access list is appropriate for a network that has outbound and return traffic only, with ...

Get Inside Network Perimeter Security, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.