How to whitelist external access to an internal webserver via Cisco ACLs?

Posted by Josh on Server Fault See other posts from Server Fault or by Josh
Published on 2012-12-05T21:59:05Z Indexed on 2012/12/06 5:07 UTC
Read the original article Hit count: 441

Filed under:
|
|
|
|

This is our company's internet gateway router. This is what I want to accomplish on our Cisco 2691 router:

  • All employees need to be able to have unrestricted access to the internet (I've blocked facebook with an ACL, but other than that, full access)
  • There is an internal webserver that should be accessible from any internal IP address, but only a select few external IP addresses. Basically, I want to whitelist access from outside the network.
  • I don't have a hardware firewall appliance.

Until now, the webserver has not needed to be accessible externally... or in any case, the occasional VPN has sufficed when needed. As such, the following config has been sufficient:

access-list 106 deny   ip 66.220.144.0 0.0.7.255 any
access-list 106 deny   ip ... (so on for the Facebook blocking)
access-list 106 permit ip any any
!
interface FastEthernet0/0
 ip address x.x.x.x 255.255.255.248
 ip access-group 106 in
 ip nat outside

fa0/0 is the interface with the public IP

However, when I add...

ip nat inside source static tcp 192.168.0.52 80 x.x.x.x 80 extendable

...in order to forward web traffic to the webserver, that just opens it up entirely. That much makes sense to me. This is where I get stumped though. If I add a line to the ACL to explicitly permit (whitelist) an IP range... something like this:

access-list 106 permit tcp x.x.x.x 0.0.255.255 192.168.0.52 0.0.0.0 eq 80

... how do I then block other external access to the webserver while still maintaining unrestricted internet access for internal employees?

I tried removing the access-list 106 permit ip any any. That ended up being a very short-lived config :)

Would something like access-list 106 permit ip 192.168.0.0 0.0.0.255 any on an "outside-inbound" work?

© Server Fault or respective owner

Related posts about cisco

Related posts about router