michelwest
Technical User
Hi,
The company I work for does not do any business with china or korea, yet about half the email we get originates there [SPAM/hacking attempts]. I started out just blocking the IP blocks we received SPAM/hacking attempts from with an access-list.
If they ran together I consolidated into as few statements as possible. I'm now at over 112 lines like:
access-list 110 deny ip 61.232.0.0 0.3.255.255 192.168.0.0 0.0.0.255
I applied it to the different interfaces like:
interface FastEthernet0/0
ip access-group 110 in
ip access-group 110 out
Since we do business with japan and taiwan and they are mixed in between chinese address blocks I started thinking about starting my list with permit statements and end with very large deny statements.
Is there a better way?
The company I work for does not do any business with china or korea, yet about half the email we get originates there [SPAM/hacking attempts]. I started out just blocking the IP blocks we received SPAM/hacking attempts from with an access-list.
If they ran together I consolidated into as few statements as possible. I'm now at over 112 lines like:
access-list 110 deny ip 61.232.0.0 0.3.255.255 192.168.0.0 0.0.0.255
I applied it to the different interfaces like:
interface FastEthernet0/0
ip access-group 110 in
ip access-group 110 out
Since we do business with japan and taiwan and they are mixed in between chinese address blocks I started thinking about starting my list with permit statements and end with very large deny statements.
Is there a better way?