ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 2482] Some Wireshark Firewall ACL Rules are off-the-mark

Date: Mon, 21 Apr 2008 10:54:44 -0700 (PDT)
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2482





--- Comment #3 from LEGO <luis.ontanon@xxxxxxxxx>  2008-04-21 10:54:43 GMT ---
> The Cisco IOS Extended ACLs, on the other hand, don't match the iptables logic
> and are off-the-mark (at least for my needs). Wireshark chooses the wrong
> source address (the target rather than the scanner):

> access-list NUMBER deny tcp host 192.168.1.123 any eq 0
> access-list NUMBER deny tcp host 192.168.1.123 any eq 443


You can choose which address to use in the ACL using the "Filter" pop-down
menu.

And, If that's wrong when applied to the ingress interface it is OK on the
egress one, and vice-versa...


-- 
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.