[81481] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Best practice ACLs for a internet facing border router?

daemon@ATHENA.MIT.EDU (Daniel Senie)
Mon Jun 13 11:42:32 2005

Date: Mon, 13 Jun 2005 11:35:31 -0400
To: <nanog@merit.edu>
From: Daniel Senie <dts@senie.com>
In-Reply-To: <9CE4B7DBDD6EF34A9ECAC4E521FB008D0BB73BFE@ntsviemxs0153.con
 nect.at-work.ent>
Errors-To: owner-nanog@merit.edu


At 10:16 AM 6/13/2005, Frotzler, Florian wrote:

>ftp://ftp-eng.cisco.com/cons/isp/security/Ingress-Prefix-Filter-Template
>s/
>
>Florian

The original question didn't specify whether the interest was prefixes or 
packet filters.

For packet filtering, the above URL is not going to help, but a read of 
BCP38 would be in order.

Edge sites with no downstreams can very easily filter the source addresses 
leaving their network and ensure no bogus-sourced packets leave, be they 
RFC1918, or spoofs.


> > -----Original Message-----
> > From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On
> > Behalf Of Drew Weaver
> > Sent: Montag, 13. Juni 2005 16:28
> > To: nanog@merit.edu
> > Subject: Best practice ACLs for a internet facing border router?
> >
> >
> >       I'm just curious if anyone has ever published a list of
> > what is an agreed upon best practice list of ACLs for an
> > internet facing border router. I'm talking about things like
> > bogons, private Ip addresses, et cetera. If anyone is aware
> > of anything like this I'd like to see it.
> >
> > Thanks,
> > -Drew
> >
> >


home help back first fref pref prev next nref lref last post