Goline Logo

News

  • Route RPKI validation April 1st, 2022
    RPKI is a security framework by which network owners can validate and secure the critical route updates or Border Gateway Protocol (BGP) announcements between public Internet networks. BGP is essentially the central nervous system of the Internet and one of its fundamental building blocks. The main function of BGP is to facilitate efficient routing between Autonomous Systems (AS), by building and maintaining the Internet routing table. The Internet routing table is effectively the navigation system of the Internet and without it, traffic would be unable to flow between its constituent networks. Unfortunately, routing equipment alone cannot distinguish between legitimate and malicious routing announcements,...
  • RIPE – Atlas Anchor February 17th, 2022
    We have become an even more integral part of the RIPE Atlas project by hosting an anchor, a device that allows for latency analysis of traffic between autonomous systems.https://atlas.ripe.net/probes/7073/RIPE Atlas anchors play an integral role in the RIPE Atlas network by acting both as enhanced RIPE Atlas probes with more measurement capacity, as well as regional measurement targets within the greater RIPE Atlas network. Anchors are able to perform many more measurements than a regular RIPE Atlas probe, and the large amount of data they collect is made available to everyone. In addition, anchors act as powerful targets that can...
  • MANRS June 20th, 2020
    GOLINE firmly believes in initiatives to protect networks, improve security and resilience of the global routing system. Therefore we decided to support the MANRS project and join as participants.Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors. Requirements for Participation Please read the full MANRS Actions document before applying. You can become a participant if you meet these requirements: You (or your company) support...

Cisco IOS – Access-list resequence

Paolo Caparrelli Cisco 22 June 2022

However, IOS includes a convenient command to resequence all entries in an ACL without a reboot and without recreating the ACL:

Router(config)# ip access-list resequence Foo ?

  <1-2147483647>  Starting Sequence Number



Router(config)# ip access-list resequence Foo 10 ?

  <1-2147483647>  Step to increment the sequence number



Router(config)# ip access-list resequence Foo 10 10

Router(config)# do show ip access-lists

Extended IP access list Foo

    10 permit ip host 10.0.23.23 any

    20 permit ip host 10.0.23.76 any

    30 permit ip host 10.0.22.144 any

    40 permit tcp any any eq www

    50 permit tcp any any eq 8080

    60 permit tcp any any eq 443

    70 permit tcp any any eq 4343

    80 permit udp any any eq domain

    90 permit tcp 10.0.8.0 0.0.3.255 any eq smtp

    100 permit tcp 10.0.12.0 0.0.1.255 any eq smtp

    110 deny ip any any log


The example above uses the default starting number and interval, however arbitrary values can be provided for both if you'd like a little more room to maneuver between entries:

Router(config)# ip access-list resequence Foo 100 50

Router(config)# do show ip access-lists

Extended IP access list Foo

    100 permit ip host 10.0.23.23 any

    150 permit ip host 10.0.23.76 any

    200 permit ip host 10.0.22.144 any

    250 permit tcp any any eq www

    300 permit tcp any any eq 8080

    350 permit tcp any any eq 443

    400 permit tcp any any eq 4343

    450 permit udp any any eq domain

    500 permit tcp 10.0.8.0 0.0.3.255 any eq smtp

    550 permit tcp 10.0.12.0 0.0.1.255 any eq smtp

    600 deny ip any any log


0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x