The ACL will need to permit access to the specific addresses that those services run on. You don't want to open up your entire network to all those ports. Also, are you doing NAT on the router to translate global IP's to private 172.16 addresses, or are you port forwarding traffic to internal hosts. For example, I allow port 3389 into my router only from my work IP address and port forward it to my PC (192.168.3.2) so that I can log on to my home PC from the office ...
ip nat inside source static tcp 192.168.3.2 3389 interface ATM0.1 3389
ip classless
!
access-list 105 remark ** Inbound access list to deny port 3389 traffic from any source other than the office **
access-list 105 permit tcp host <office IP> any eq 3389 log
access-list 105 deny tcp any any eq 3389 log
access-list 105 permit ip any any
!
So, I can do Remote Desktop from the office but anyone else attemtpting to access my desktop from any other IP address will be denied by ACL 105.
If I was running other services such as an SMTP server, SSH server etc I could put similar statements in.
To be honest, if you are running a network with all these services running on it then a firewall would be a far better option than a router. It would provide better security and something like a PIX or FW-1 would also provide full stateful inspection. However, if you are looking at doing it "on the cheap" then it can be done on a router, but you have less fuctionality, just simple packet filtering.
Chris.
**********************
Chris Andrew, CCNA, CCSA
chris@iproute.co.uk
**********************