<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setting up CBAC for an Internet Connected Cisco Lab in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-cbac-for-an-internet-connected-cisco-lab/m-p/3788175#M1049173</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to setup CBAC as my basis for firewall rules / filtering on a home lab. High level description of the setup is as follows (diagram attached):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ISP Router / Modem&lt;/STRONG&gt; (SpeedTouch 780) supplied by ISP and flashed with their firmware / image, so locked down to "normal user" mode (i.e. - basic changes only). Has a LAN side switch with static IP of 192.168.1.254 /24 which is the Gateway of Last Resort for the 2811 Router&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Cisco 2811 Router&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Fa0/0 (192.168.1.200 /24) is connected to LAN Side switch of the ISP Router Modem&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Gi0/0/0&lt;/STRONG&gt; (no IP address at port level) &lt;STRONG&gt;is split into several sub-interfaces&lt;/STRONG&gt;, 1 for each VLAN on the private network, each of which have an IP address used as the Default Gateway for devices on its respective VLAN&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Provides DHCP&lt;/STRONG&gt; to each of the VLANs&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;NAT's each of the VLANs to the IP address of Fa0/0&lt;/STRONG&gt; so that the ISP Router Modem can pass internet destined traffic onwards - necessary as static routes back to the VLANs is not possible because the ISP Router Modem is locked down (many thanks to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324049"&gt;@Jon Marshall&lt;/a&gt;&amp;nbsp;for all his help with that!)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 1&lt;/STRONG&gt;: If I want to apply CBAC in this situation, my assumption is that I would create the first acl on &lt;STRONG&gt;Fa0/0 in&lt;/STRONG&gt; on the 2811 to block incoming traffic, and then acls on each of the VLAN sub-interfaces on Gi0/0/0 (e.g. &lt;STRONG&gt;Gi0/0/0.10 in&lt;/STRONG&gt;) to control and check traffic coming out of each of them that is destined for the internet. Is my assumption correct? If so, then:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 2&lt;/STRONG&gt;:&amp;nbsp;Does this affect the inter-vlan routing that is (presumably) happening on the 2811 Gi0/0/0 port between each of the VLAN's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for all and any help!&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:42:21 GMT</pubDate>
    <dc:creator>LeeSteventon</dc:creator>
    <dc:date>2020-02-21T16:42:21Z</dc:date>
    <item>
      <title>Setting up CBAC for an Internet Connected Cisco Lab</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-cbac-for-an-internet-connected-cisco-lab/m-p/3788175#M1049173</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to setup CBAC as my basis for firewall rules / filtering on a home lab. High level description of the setup is as follows (diagram attached):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ISP Router / Modem&lt;/STRONG&gt; (SpeedTouch 780) supplied by ISP and flashed with their firmware / image, so locked down to "normal user" mode (i.e. - basic changes only). Has a LAN side switch with static IP of 192.168.1.254 /24 which is the Gateway of Last Resort for the 2811 Router&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Cisco 2811 Router&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Fa0/0 (192.168.1.200 /24) is connected to LAN Side switch of the ISP Router Modem&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Gi0/0/0&lt;/STRONG&gt; (no IP address at port level) &lt;STRONG&gt;is split into several sub-interfaces&lt;/STRONG&gt;, 1 for each VLAN on the private network, each of which have an IP address used as the Default Gateway for devices on its respective VLAN&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Provides DHCP&lt;/STRONG&gt; to each of the VLANs&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;NAT's each of the VLANs to the IP address of Fa0/0&lt;/STRONG&gt; so that the ISP Router Modem can pass internet destined traffic onwards - necessary as static routes back to the VLANs is not possible because the ISP Router Modem is locked down (many thanks to&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324049"&gt;@Jon Marshall&lt;/a&gt;&amp;nbsp;for all his help with that!)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 1&lt;/STRONG&gt;: If I want to apply CBAC in this situation, my assumption is that I would create the first acl on &lt;STRONG&gt;Fa0/0 in&lt;/STRONG&gt; on the 2811 to block incoming traffic, and then acls on each of the VLAN sub-interfaces on Gi0/0/0 (e.g. &lt;STRONG&gt;Gi0/0/0.10 in&lt;/STRONG&gt;) to control and check traffic coming out of each of them that is destined for the internet. Is my assumption correct? If so, then:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question 2&lt;/STRONG&gt;:&amp;nbsp;Does this affect the inter-vlan routing that is (presumably) happening on the 2811 Gi0/0/0 port between each of the VLAN's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance for all and any help!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-cbac-for-an-internet-connected-cisco-lab/m-p/3788175#M1049173</guid>
      <dc:creator>LeeSteventon</dc:creator>
      <dc:date>2020-02-21T16:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up CBAC for an Internet Connected Cisco Lab</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-cbac-for-an-internet-connected-cisco-lab/m-p/3788446#M1049189</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Yes you need ACLs on outside interface with direction in to block incoming&lt;BR /&gt;traffic and you need inspect out command to check outgoing connections and&lt;BR /&gt;allow reverse packets&lt;BR /&gt;&lt;BR /&gt;For sub-interfaces its not mandatory to apply ACLs but recommended. This&lt;BR /&gt;isn't needed for inspecting internet traffic but for securing connections&lt;BR /&gt;from clients in general.  It will affect intervlan routing&lt;BR /&gt;</description>
      <pubDate>Sat, 26 Jan 2019 03:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-cbac-for-an-internet-connected-cisco-lab/m-p/3788446#M1049189</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2019-01-26T03:49:57Z</dc:date>
    </item>
  </channel>
</rss>

