Skip to main content

Allowed Specific IP to talk to one host on Router



We have to Block Production server access from below three network on cisco router and only allowed access from specific IPs

Three internal network In Office
1)      10.10.32.0/24
2)      10.10.128.0/24
3)      10.10.62.0/24
Specific IP Address:-
1)      10.10.128.70

Production Network
1)      10.13.40.139
2)      10.13.40.142

Script:-

Creating Object group to added internal Network Pool

WAN-R1#sh object-group
Network object group Internal
 10.10.32.0 255.255.255.0
 10.10.128.0 255.255.255.0
 10.10.62.0 255.255.255.0

Added access-list:-
WAN-R1#sh access-lists 123
Extended IP access list 123
    10 permit ip host 10.10.128.70 host 10.13.40.139
    20 permit ip host 10.10.128.70 host 10.13.40.142
    30 deny ip object-group Internal host 10.13.40.139
    40 deny ip object-group Internal host 10.13.40.142
    50 permit ip any any
Applied access-list on Outside Interface
Interface Serial2/0
Description “Outside World”
 ip access-group 123 out

Comments

Popular posts from this blog

How to enable SSH login access to a Cisco router

This guide walks you through how to setup SSH on a Cisco Router. SSH is by far more secure then telnet. Telnet allows your passwords to be sent in plain text that anyone can see and gain access to your network. SSH is all encrypted traffic. NOTE: This should work with any Cisco router provided the Cisco IOS on the router supports ssh. Firstly is ssh enabled? router#sh ip ssh SSH Disabled - version 2.0 %Please create RSA keys to enable SSH. Authentication timeout: 60 secs; Authentication retries: 5 In this case its not, if you got a error saying that sh ip ssh is not recognized then you would know that ssh is not supported or possibly that the command is different for your platform. How to enable SSH on a Cisco 800 series router# config term router(config)#crypto key generate rsa usage-keys label router-key The name for the keys will be: router-key Choose the size of the key modulus in the range of 360 to 2048 for your

INSTALL DOT NET FRAMEWORK ON MULTIPLE SERVERS USING POWERSHELL SCRIPT

Installing .Net 4.5.2 $servers = Array of Servers foreach($server in $servers) { Write-Host “Copying the installation file” copy-item  –path “-SOURCE” –destination “ destination ” Write-Host “Installing .NET 4.5.2” Invoke-Command –Computername $server –Credentials xxxx { C:\Temp\ NET 4.5.2  /passive /norestart }

Connection failed: enforce firewall policy failed (on win 7 / 64bit)

Connection failed: enforce firewall policy failed (on win 7 / 64bit)  error: connection failed: enforce firewall policy failed client: Check point endpoint security r75 build 835002205 on win 7 / 64 bit The solution is to find driver file vsdatant.sys and copy it to system32/drivers Ref :- https://forums.checkpoint.com/forums/thread.jspa?messageID=46927