Appendix A. Cisco Access List Sample Configurations

This appendix comprises two access lists that demonstrate possible ways to securely configure a Cisco router as a standalone security device. These sections use best practices as described in Chapter 2, “Packet Filtering,” and Chapter 6, “The Role of a Router,” listed out so that a complete configuration can be seen in its entirety. The first access list is used to demonstrate a network that has no publicly shared resources, and the second access list illustrates an example of a network with publicly accessible mail, DNS, and web servers.

Complete Access List for a Private-Only Network

The following sample access list is appropriate for a network that has outbound and return traffic only, with ...

Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.