<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking outside access to router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987457#M1107418</link>
    <description>&lt;P&gt;I have setup NAT and firewall on my C1111-8w8p router and I believe it is correct. Let me know if you see any other problems here. I am still learning. But now I need to block access to the router. Port scan of public ip shows 22, 80, 443, and 1720 open. Not sure how to do that the best way. Please help. Here is my configuration:&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Sat Dec 30 2023 20:20:06 GMT-0600 (Central Standard Time)&lt;/DIV&gt;&lt;DIV&gt;===================================================================================&lt;/DIV&gt;&lt;DIV&gt;#sh run&lt;/DIV&gt;&lt;DIV&gt;Building configuration...&lt;/DIV&gt;&lt;DIV&gt;Current configuration : 9958 bytes&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;! Last configuration change at 02:18:43 UTC Sun Dec 31 2023 by admin&lt;/DIV&gt;&lt;DIV&gt;! NVRAM config last updated at 00:16:50 UTC Sun Dec 31 2023 by admin&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;version 17.9&lt;/DIV&gt;&lt;DIV&gt;service timestamps debug datetime msec&lt;/DIV&gt;&lt;DIV&gt;service timestamps log datetime msec&lt;/DIV&gt;&lt;DIV&gt;service call-home&lt;/DIV&gt;&lt;DIV&gt;platform qfp utilization monitor load 80&lt;/DIV&gt;&lt;DIV&gt;no platform punt-keepalive disable-kernel-core&lt;/DIV&gt;&lt;DIV&gt;platform hardware throughput crypto 50000&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;hostname Edge_Router&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;boot-start-marker&lt;/DIV&gt;&lt;DIV&gt;boot system bootflash:c1100-universalk9.17.09.04a.SPA.bin&lt;/DIV&gt;&lt;DIV&gt;boot system bootflash:c1100-universalk9_ias.16.10.01b.SPA.bin&lt;/DIV&gt;&lt;DIV&gt;boot-end-marker&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;aaa new-model&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;aaa session-id common&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip name-server 8.8.8.8 1.1.1.1&lt;/DIV&gt;&lt;DIV&gt;ip domain name lewishome.local&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.0&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.1 192.168.1.99&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.200 192.168.1.255&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip dhcp pool default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;network 192.168.1.0 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;default-router 192.168.1.1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;dns-server 8.8.8.8 1.1.1.1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;lease infinite&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;login on-success log&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;subscriber templating&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;vtp version 1&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;multilink bundle-name authenticated&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki trustpoint TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;enrollment selfsigned&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;revocation-check none&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;rsakeypair TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki trustpoint SLA-TrustPoint&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;enrollment pkcs12&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;revocation-check crl&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate chain TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;certificate self-signed 01&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 69666963 6174652D 32383239 34313535 3538301E 170D3233 31303331 30333530&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31365A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 38323934&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31353535 38308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 0A028201 0100D4C8 D205F41D 87D75235 3BF6112F A419AA75 DD5BEBA3 F65A51E0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; F9D66305 D7D3EFEA AFE0CE68 B51807E7 ABAD93C8 7D2CB2F0 127DDD3A 81D0A65C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 28D4AAED 6C723B45 BD33EC5E 4CA33DC0 013E4C52 1912A7B0 3D7DB305 1C3B0C6B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C1CBBC69 D36E5C8F 561A2334 57BC4BA4 F96E74C9 26C1DF87 8A72BB74 E41675D0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 1BC7179F 4E1AC770 9C168634 BBA41693 4197748B 17348D43 E56D3E5F A92BCC94&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 449D42D1 C8CA05FE DBD014C2 F5E87F73 8FFD1F87 16A46317 1AB5A4F6 BDEF2A13&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 9091FDAC 4674D656 D0011D59 01D72939 FF7BE161 AE4861DA 27288373 3ECDBB9A&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D3224C19 F57D213F 1E66E96A 134CC8C3 459566A9 1603B84A 475A4242 B2B4CC78&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DAE84745 0F670203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 301F0603 551D2304 18301680 148196B9 201E83D1 82D6F51B C348A36B FC92075D&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; AC301D06 03551D0E 04160414 8196B920 1E83D182 D6F51BC3 48A36BFC 92075DAC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 300D0609 2A864886 F70D0101 05050003 82010100 53BA30C3 805BB3D6 30F9E106&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 38A164A3 9B6B48D0 5DFD2DA9 940A9F79 945B4E20 A878F406 CCE22730 63C7F7ED&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 3657AADE 2AB34739 1EA13AF6 49E40C27 C3E8BC1B 50B5F0F0 CEB49998 CA0ECE1E&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; AFE2B08A 6B011A4C B4579FCF 7CE42025 AE227792 08141E61 99C90838 AA135E4C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D2D29867 7CDA5B54 7E66A31A AA6BDC3D 027327F9 CAF90986 3ED52D07 69A86D69&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; B48E3F2A 4ACDFD93 9784B856 27C122A5 E01CACFB AEE35360 432CC6E5 35A5EF6C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DA17AA22 AB79F9DD 40AA1110 0D32B60A FF386552 9254FEC4 389B1E6C C9C0A4A6&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; E08CC317 D3FC7267 2C0ADD07 096DFB7E E3070723 78D056D0 FF2226C5 C0E5BEEC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 9C091A72 CFBA7897 A588FD2F 53E91932 7C56826A&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; quit&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate chain SLA-TrustPoint&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;certificate ca 01&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D697DF7F 28&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; quit&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate pool&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;cabundle nvram:ios_core.p7b&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;no license feature hseck9&lt;/DIV&gt;&lt;DIV&gt;license udi pid C1111-8PWB sn&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;license boot level securityk9&lt;/DIV&gt;&lt;DIV&gt;memory free low-watermark processor 66007&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;diagnostic bootup level minimal&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;spanning-tree extend system-id&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;enable secret 9&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;username admin privilege 15 secret 9&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;redundancy&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;mode none&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;vlan internal allocation policy ascending&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;class-map type inspect match-any INSIDE-TO-OUTSIDE_cmap_app&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol http&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol https&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol icmp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol tcp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol udp&lt;/DIV&gt;&lt;DIV&gt;class-map type inspect match-all INSIDE-TO-OUTSIDE_cmap&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match access-group name INSIDE-TO-OUTSIDE_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match class-map INSIDE-TO-OUTSIDE_cmap_app&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;policy-map type inspect INSIDE-TO-OUTSIDE_policy&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;class type inspect INSIDE-TO-OUTSIDE_cmap&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; inspect&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;class class-default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; drop log&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;zone security INSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Zone for inside interfaces&lt;/DIV&gt;&lt;DIV&gt;zone security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Zone for outside interfaces&lt;/DIV&gt;&lt;DIV&gt;zone-pair security INSIDE-TO-OUTSIDE source INSIDE destination OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE_policy&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/0/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description WAN 1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address xxx.xxx.xxx.xxx 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip nat outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;negotiation auto&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/0/1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;no ip address&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;media-type rj45&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;negotiation auto&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description To Core Switch&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;switchport access vlan 250&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/4&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/5&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/6&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/7&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Wlan-GigabitEthernet0/1/8&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Vlan1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Vlan250&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description WAN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 192.168.250.10 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip nat inside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip http server&lt;/DIV&gt;&lt;DIV&gt;ip http authentication local&lt;/DIV&gt;&lt;DIV&gt;ip http secure-server&lt;/DIV&gt;&lt;DIV&gt;ip forward-protocol nd&lt;/DIV&gt;&lt;DIV&gt;ip nat inside source list NAT_acl interface GigabitEthernet0/0/0 overload&lt;/DIV&gt;&lt;DIV&gt;ip nat inside source route-map track-primary-if interface GigabitEthernet0/0/0 overload&lt;/DIV&gt;&lt;DIV&gt;ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0/0 71.37.144.146&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.10.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.40.0 255.255.254.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.50.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.60.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.70.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.80.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.100.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip access-list extended INSIDE-TO-OUTSIDE_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;1 permit ip 192.168.1.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;10 permit ip 192.168.10.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;40 permit ip 192.168.40.0 0.0.1.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;50 permit ip 192.168.50.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;60 permit ip 192.168.60.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;70 permit ip 192.168.70.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;80 permit ip 192.168.80.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;100 permit ip 192.168.100.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;250 permit ip 192.168.250.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;ip access-list extended NAT_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;1 permit ip 192.168.1.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;10 permit ip 192.168.10.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;40 permit ip 192.168.40.0 0.0.1.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;50 permit ip 192.168.50.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;60 permit ip 192.168.60.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;70 permit ip 192.168.70.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;80 permit ip 192.168.80.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;100 permit ip 192.168.100.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;250 permit ip 192.168.250.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;route-map track-primary-if permit 1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match ip address 197&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;set interface GigabitEthernet0/0/0&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;control-plane&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;banner login ^CLewis Home Edge Router^C&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;line con 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input none&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;stopbits 1&lt;/DIV&gt;&lt;DIV&gt;line vty 0 4&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;length 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input ssh&lt;/DIV&gt;&lt;DIV&gt;line vty 5 14&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input ssh&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;call-home&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;! If contact email address in call-home is configured as sch-smart-licensing@cisco.com&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;contact-email-addr sch-smart-licensing@cisco.com&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;profile "CiscoTAC-1"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; active&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; destination transport-method http&lt;/DIV&gt;&lt;DIV&gt;ntp server 0.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;ntp server 1.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;ntp server 2.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;end&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 31 Dec 2023 02:28:24 GMT</pubDate>
    <dc:creator>jeremy0463</dc:creator>
    <dc:date>2023-12-31T02:28:24Z</dc:date>
    <item>
      <title>Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987457#M1107418</link>
      <description>&lt;P&gt;I have setup NAT and firewall on my C1111-8w8p router and I believe it is correct. Let me know if you see any other problems here. I am still learning. But now I need to block access to the router. Port scan of public ip shows 22, 80, 443, and 1720 open. Not sure how to do that the best way. Please help. Here is my configuration:&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Sat Dec 30 2023 20:20:06 GMT-0600 (Central Standard Time)&lt;/DIV&gt;&lt;DIV&gt;===================================================================================&lt;/DIV&gt;&lt;DIV&gt;#sh run&lt;/DIV&gt;&lt;DIV&gt;Building configuration...&lt;/DIV&gt;&lt;DIV&gt;Current configuration : 9958 bytes&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;! Last configuration change at 02:18:43 UTC Sun Dec 31 2023 by admin&lt;/DIV&gt;&lt;DIV&gt;! NVRAM config last updated at 00:16:50 UTC Sun Dec 31 2023 by admin&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;version 17.9&lt;/DIV&gt;&lt;DIV&gt;service timestamps debug datetime msec&lt;/DIV&gt;&lt;DIV&gt;service timestamps log datetime msec&lt;/DIV&gt;&lt;DIV&gt;service call-home&lt;/DIV&gt;&lt;DIV&gt;platform qfp utilization monitor load 80&lt;/DIV&gt;&lt;DIV&gt;no platform punt-keepalive disable-kernel-core&lt;/DIV&gt;&lt;DIV&gt;platform hardware throughput crypto 50000&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;hostname Edge_Router&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;boot-start-marker&lt;/DIV&gt;&lt;DIV&gt;boot system bootflash:c1100-universalk9.17.09.04a.SPA.bin&lt;/DIV&gt;&lt;DIV&gt;boot system bootflash:c1100-universalk9_ias.16.10.01b.SPA.bin&lt;/DIV&gt;&lt;DIV&gt;boot-end-marker&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;aaa new-model&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;aaa session-id common&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip name-server 8.8.8.8 1.1.1.1&lt;/DIV&gt;&lt;DIV&gt;ip domain name lewishome.local&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.0&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.1 192.168.1.99&lt;/DIV&gt;&lt;DIV&gt;ip dhcp excluded-address 192.168.1.200 192.168.1.255&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip dhcp pool default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;network 192.168.1.0 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;default-router 192.168.1.1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;dns-server 8.8.8.8 1.1.1.1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;lease infinite&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;login on-success log&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;subscriber templating&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;vtp version 1&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;multilink bundle-name authenticated&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki trustpoint TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;enrollment selfsigned&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;revocation-check none&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;rsakeypair TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki trustpoint SLA-TrustPoint&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;enrollment pkcs12&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;revocation-check crl&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate chain TP-self-signed-2829415558&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;certificate self-signed 01&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 69666963 6174652D 32383239 34313535 3538301E 170D3233 31303331 30333530&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31365A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 38323934&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 31353535 38308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 0A028201 0100D4C8 D205F41D 87D75235 3BF6112F A419AA75 DD5BEBA3 F65A51E0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; F9D66305 D7D3EFEA AFE0CE68 B51807E7 ABAD93C8 7D2CB2F0 127DDD3A 81D0A65C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 28D4AAED 6C723B45 BD33EC5E 4CA33DC0 013E4C52 1912A7B0 3D7DB305 1C3B0C6B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C1CBBC69 D36E5C8F 561A2334 57BC4BA4 F96E74C9 26C1DF87 8A72BB74 E41675D0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 1BC7179F 4E1AC770 9C168634 BBA41693 4197748B 17348D43 E56D3E5F A92BCC94&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 449D42D1 C8CA05FE DBD014C2 F5E87F73 8FFD1F87 16A46317 1AB5A4F6 BDEF2A13&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 9091FDAC 4674D656 D0011D59 01D72939 FF7BE161 AE4861DA 27288373 3ECDBB9A&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D3224C19 F57D213F 1E66E96A 134CC8C3 459566A9 1603B84A 475A4242 B2B4CC78&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DAE84745 0F670203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 301F0603 551D2304 18301680 148196B9 201E83D1 82D6F51B C348A36B FC92075D&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; AC301D06 03551D0E 04160414 8196B920 1E83D182 D6F51BC3 48A36BFC 92075DAC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 300D0609 2A864886 F70D0101 05050003 82010100 53BA30C3 805BB3D6 30F9E106&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 38A164A3 9B6B48D0 5DFD2DA9 940A9F79 945B4E20 A878F406 CCE22730 63C7F7ED&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 3657AADE 2AB34739 1EA13AF6 49E40C27 C3E8BC1B 50B5F0F0 CEB49998 CA0ECE1E&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; AFE2B08A 6B011A4C B4579FCF 7CE42025 AE227792 08141E61 99C90838 AA135E4C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D2D29867 7CDA5B54 7E66A31A AA6BDC3D 027327F9 CAF90986 3ED52D07 69A86D69&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; B48E3F2A 4ACDFD93 9784B856 27C122A5 E01CACFB AEE35360 432CC6E5 35A5EF6C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DA17AA22 AB79F9DD 40AA1110 0D32B60A FF386552 9254FEC4 389B1E6C C9C0A4A6&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; E08CC317 D3FC7267 2C0ADD07 096DFB7E E3070723 78D056D0 FF2226C5 C0E5BEEC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 9C091A72 CFBA7897 A588FD2F 53E91932 7C56826A&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; quit&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate chain SLA-TrustPoint&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;certificate ca 01&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; 418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; D697DF7F 28&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; quit&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;crypto pki certificate pool&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;cabundle nvram:ios_core.p7b&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;no license feature hseck9&lt;/DIV&gt;&lt;DIV&gt;license udi pid C1111-8PWB sn&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;license boot level securityk9&lt;/DIV&gt;&lt;DIV&gt;memory free low-watermark processor 66007&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;diagnostic bootup level minimal&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;spanning-tree extend system-id&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;enable secret 9&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;username admin privilege 15 secret 9&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;redundancy&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;mode none&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;vlan internal allocation policy ascending&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;class-map type inspect match-any INSIDE-TO-OUTSIDE_cmap_app&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol http&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol https&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol icmp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol tcp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match protocol udp&lt;/DIV&gt;&lt;DIV&gt;class-map type inspect match-all INSIDE-TO-OUTSIDE_cmap&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match access-group name INSIDE-TO-OUTSIDE_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match class-map INSIDE-TO-OUTSIDE_cmap_app&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;policy-map type inspect INSIDE-TO-OUTSIDE_policy&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;class type inspect INSIDE-TO-OUTSIDE_cmap&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; inspect&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;class class-default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; drop log&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;zone security INSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Zone for inside interfaces&lt;/DIV&gt;&lt;DIV&gt;zone security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Zone for outside interfaces&lt;/DIV&gt;&lt;DIV&gt;zone-pair security INSIDE-TO-OUTSIDE source INSIDE destination OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;service-policy type inspect INSIDE-TO-OUTSIDE_policy&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/0/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description WAN 1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address xxx.xxx.xxx.xxx 255.255.255.252&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip nat outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;negotiation auto&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/0/1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;no ip address&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security OUTSIDE&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;media-type rj45&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;negotiation auto&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description To Core Switch&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;switchport access vlan 250&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/2&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/3&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/4&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/5&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/6&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface GigabitEthernet0/1/7&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Wlan-GigabitEthernet0/1/8&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Vlan1&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description Default&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;interface Vlan250&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;description WAN&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip address 192.168.250.10 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;ip nat inside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;zone-member security INSIDE&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip http server&lt;/DIV&gt;&lt;DIV&gt;ip http authentication local&lt;/DIV&gt;&lt;DIV&gt;ip http secure-server&lt;/DIV&gt;&lt;DIV&gt;ip forward-protocol nd&lt;/DIV&gt;&lt;DIV&gt;ip nat inside source list NAT_acl interface GigabitEthernet0/0/0 overload&lt;/DIV&gt;&lt;DIV&gt;ip nat inside source route-map track-primary-if interface GigabitEthernet0/0/0 overload&lt;/DIV&gt;&lt;DIV&gt;ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0/0 71.37.144.146&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.10.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.40.0 255.255.254.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.50.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.60.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.70.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.80.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;ip route 192.168.100.0 255.255.255.0 192.168.250.1&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;ip access-list extended INSIDE-TO-OUTSIDE_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;1 permit ip 192.168.1.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;10 permit ip 192.168.10.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;40 permit ip 192.168.40.0 0.0.1.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;50 permit ip 192.168.50.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;60 permit ip 192.168.60.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;70 permit ip 192.168.70.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;80 permit ip 192.168.80.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;100 permit ip 192.168.100.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;250 permit ip 192.168.250.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;ip access-list extended NAT_acl&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;1 permit ip 192.168.1.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;10 permit ip 192.168.10.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;40 permit ip 192.168.40.0 0.0.1.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;50 permit ip 192.168.50.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;60 permit ip 192.168.60.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;70 permit ip 192.168.70.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;80 permit ip 192.168.80.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;100 permit ip 192.168.100.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;250 permit ip 192.168.250.0 0.0.0.255 any&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;route-map track-primary-if permit 1&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;match ip address 197&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;set interface GigabitEthernet0/0/0&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;control-plane&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;banner login ^CLewis Home Edge Router^C&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;line con 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input none&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;stopbits 1&lt;/DIV&gt;&lt;DIV&gt;line vty 0 4&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;length 0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input ssh&lt;/DIV&gt;&lt;DIV&gt;line vty 5 14&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;transport input ssh&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;call-home&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;! If contact email address in call-home is configured as sch-smart-licensing@cisco.com&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;contact-email-addr sch-smart-licensing@cisco.com&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;profile "CiscoTAC-1"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; active&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; destination transport-method http&lt;/DIV&gt;&lt;DIV&gt;ntp server 0.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;ntp server 1.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;ntp server 2.ciscome.pool.ntp.org&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;end&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 02:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987457#M1107418</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2023-12-31T02:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987505#M1107420</link>
      <description>&lt;P&gt;to be honest I was think that the OUT-IN Zone pair cover also zone-pair OUT-Self&amp;nbsp;&lt;BR /&gt;but in such case and I have time I lab it to check&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Case 1&lt;BR /&gt;the OUT-IN using class match protocol OUT-IN action is drop&amp;nbsp;&lt;BR /&gt;and you can see I can telnet to R1&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (651).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206143i87D3EBA0989F106D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (651).png" alt="Screenshot (651).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Case2&lt;BR /&gt;Zone Pair OUT-Self with class match telnet and action is drop&amp;nbsp;&lt;BR /&gt;you can see the port is closs and I cant access R1 anymore&lt;BR /&gt;so use class match protocol then use policy action drop&amp;nbsp;&lt;BR /&gt;NOTE:- this make you can not access Router via telnet or SSH from OUT anymore&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (652).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/206144iE190B1824F7E4BB7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (652).png" alt="Screenshot (652).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 09:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987505#M1107420</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-31T09:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987506#M1107421</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1621291"&gt;@jeremy0463&lt;/a&gt; if you wish to restrict access "to" the router itself using ZBFW then you need to use the "self" zone. Create a zone-pair from source OUTSIDE to destination self (referening the service policy obviously). Using a zone-pair from OUTSIDE to INSIDE affects only traffic going "through" the firewall, not "to" the firewall itself.&lt;/P&gt;
&lt;P&gt;EDIT - &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; I notice you have now corrected your initial response, FYI here is more information on the self zone &lt;A href="https://community.cisco.com/t5/security-knowledge-base/zbfw-self-zone-integration/ta-p/3154572" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/zbfw-self-zone-integration/ta-p/3154572&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 15:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987506#M1107421</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T15:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987616#M1107427</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let us stop work and enjoy with our family this night.&lt;/P&gt;
&lt;P&gt;Have a nice new year eve&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See you next year lol..&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 16:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987616#M1107427</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-31T16:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987658#M1107441</link>
      <description>&lt;P&gt;So here is what I am planning on implementing. It should leave room to add vpn later. Does this work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SELF AND INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended Self_and_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name Self_and_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Policy-map type inspect Self_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Self_to_Inside source self destination INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Self_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Inside_to_Self source INSIDE destination self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SELF AND OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended OUTSIDE_to_self_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended self_to_OUTSIDE_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE_to_self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol ipsec&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any self_to_&lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE-to-self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE_to_self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name OUTSIDE_to_self_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all &lt;/SPAN&gt;&lt;SPAN class=""&gt;self-to-OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map &lt;/SPAN&gt;&lt;SPAN class=""&gt;self-to-OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name &lt;/SPAN&gt;&lt;SPAN class=""&gt;self-to-OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect self-TO-OUTSIDE_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE-TO-self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect OUTSIDE-TO-self_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;self-TO-OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Out-To-Self source OUTSIDE destination self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Out_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Self-To-Out source self destination OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Self_Out&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 21:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987658#M1107441</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2023-12-31T21:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987659#M1107442</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1621291"&gt;@jeremy0463&lt;/a&gt; Why are you matching &lt;U&gt;all&lt;/U&gt; on the same class map? Traffic will have to match both.&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN class=""&gt;class-map type inspect &lt;STRONG&gt;match-all &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE-to-self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;match class-map &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE_to_self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_app&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; match access-group name OUTSIDE_to_self_acl&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Regardless, you would "pass" the IPSec traffic (udp/500, esp and udp/4500 if nat-t) rather than match on ipsec for traffic to the router. &lt;A href="https://www.cisco.com/c/en/us/support/docs/routers/3800-series-integrated-services-routers/112051-zbf-vpn-access-config.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/routers/3800-series-integrated-services-routers/112051-zbf-vpn-access-config.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;So create an ACL to match the IPsec traffic, match on that ACL in the class-map and reference in the policy-map. Then deny all other traffic to self from outside using the class-default and drop. Example:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ISAKMP-IPSEC&lt;BR /&gt; permit udp any any eq isakmp&lt;BR /&gt; permit esp any any&lt;BR /&gt; permit udp any any eq non500-isakmp&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-all CM-IPSEC&lt;BR /&gt; match access-group name ISAKMP-IPSEC&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect PM-OUTSIDE-&amp;gt;self&lt;BR /&gt; class type inspect CM-IPSEC&lt;BR /&gt; pass&lt;BR /&gt;class class-default&lt;BR /&gt; drop&lt;BR /&gt;&lt;BR /&gt;zone-pair security OUTSIDE-&amp;gt;self source OUTSIDE destination self&lt;BR /&gt; service-policy type inspect PM-OUTSIDE-&amp;gt;self&lt;/PRE&gt;
&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 22:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987659#M1107442</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T22:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987663#M1107443</link>
      <description>&lt;P&gt;The vpn was just a provision for the future just in case, I can leave that alone for now and make that another step. Basically I had a match all so that the acl would be matched and the class map would also be matched. I left the deny all in place to block it completely for now, but was later going to permit specific iPs and then I could do the pass con portion. I don’t know, still learning here. &amp;nbsp;My primary goal is to block outside access to the router itself. I jumped the gun on vpn. Let’s stick with blocking services. So as far as an overall “self-zone” to block services from outside to self but allow self to outside, inside to self, and self to inside, would this accomplish:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SELF AND INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended Self_and_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name Self_and_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Policy-map type inspect Self_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Self_to_Inside source self destination INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Self_Inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security Inside_to_Self source INSIDE destination self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect Inside_Self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SELF AND OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;—————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended OUTSIDE_to_self_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE_to_self_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name OUTSIDE_to_self_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect OUTSIDE-TO-self_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;OUTSIDE-TO-self&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended self_to_OUTSIDE_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;self_to_OUTSIDE_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name self_to_OUTSIDE_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect self-TO-OUTSIDE_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect &lt;/SPAN&gt;&lt;SPAN class=""&gt;self-TO-OUTSIDE&lt;/SPAN&gt;&lt;SPAN class=""&gt;_cmap&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security OUTSIDE-TO-self source OUTSIDE destination self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect OUTSIDE-TO-self_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security self-TO-OUTSIDE source self destination OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect self-TO-OUTSIDE_policy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987663#M1107443</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2023-12-31T23:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987666#M1107444</link>
      <description>&lt;P&gt;I feel like I’m confused now&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987666#M1107444</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2023-12-31T23:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987667#M1107445</link>
      <description>&lt;P&gt;Dont confused' in late night of Monday I will send you some note.&lt;/P&gt;
&lt;P&gt;Dont worry&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy new year friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987667#M1107445</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-31T23:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987674#M1107448</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1621291"&gt;@jeremy0463&lt;/a&gt;&amp;nbsp;for outside to self policy map just reference the class-default class which will drop the traffic from outside to self, as per your requirements.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Dec 2023 23:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987674#M1107448</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-31T23:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987769#M1107451</link>
      <description>&lt;P&gt;it long time from last year LOL...&lt;BR /&gt;NOW let start&amp;nbsp;&lt;BR /&gt;classify the Zone&amp;nbsp;&lt;BR /&gt;there is&amp;nbsp;&lt;BR /&gt;1-default Zone which all interface member of it unless you make interface member of other Zone (this use for though the box)&lt;BR /&gt;2-Zone, simple way config zone with name IN and OUT or LAN and WAN ...etc.&lt;BR /&gt;3-Self Zone this include the all interface in this device (use for to-box traffic)&lt;BR /&gt;&lt;BR /&gt;Zone Pair&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;1-to-Self-from-Out&lt;/STRONG&gt;&lt;BR /&gt;traffic like&amp;nbsp;&lt;BR /&gt;1- icmp&lt;BR /&gt;2-telnet&amp;nbsp;&lt;BR /&gt;3-SSH&lt;BR /&gt;4-VPN IPSec UDP 500/4500&lt;BR /&gt;5-http&lt;/P&gt;
&lt;P&gt;use class match-any let called it Class Port&lt;BR /&gt;&lt;BR /&gt;traffic toward specific IP&amp;nbsp;&lt;BR /&gt;use acl&amp;nbsp;&lt;BR /&gt;use class match all let called it Class IP&lt;/P&gt;
&lt;P&gt;finally we config class let called it Class to-self match all under it we match class Class Port and Class IP&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;for policy we use Class to-self and action is&amp;nbsp;&lt;BR /&gt;1- Pass if we dont use other zone pair from-Self&amp;nbsp;&lt;BR /&gt;2- Inspect if we use&amp;nbsp; other zone pair from-self&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1-from-Self-to-Out&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;this zone if you want to ping from router to other and telnet from it to other.&lt;BR /&gt;traffic like&amp;nbsp;&lt;BR /&gt;1- icmp&lt;BR /&gt;2-telnet&amp;nbsp;&lt;BR /&gt;3-SSH&lt;BR /&gt;4-VPN IPSec UDP ports 500/4500&lt;BR /&gt;5-http&lt;/P&gt;
&lt;P&gt;use class match-any let called it Class Port&lt;BR /&gt;&lt;BR /&gt;note:- you can optional specific IP that router can ping or make it open&amp;nbsp;&lt;/P&gt;
&lt;P&gt;finally we config class let called it Class from-self match all under it we match class Class Port&lt;BR /&gt;&lt;BR /&gt;for policy we use Class from-self and action is&amp;nbsp;&lt;BR /&gt;Inspect since we use to-self with inspect&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;that all what you need&lt;/P&gt;
&lt;P&gt;you are free to ask if you have Q&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 16:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987769#M1107451</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-01T16:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987771#M1107452</link>
      <description>&lt;P&gt;agreed&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 16:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987771#M1107452</guid>
      <dc:creator>Sarahtaylor69</dc:creator>
      <dc:date>2024-01-01T16:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987776#M1107453</link>
      <description>&lt;P&gt;lol! Yes it has been a long time…haha&lt;/P&gt;&lt;P&gt;ok, let me get to working on this and I will report back. I’m going to do some more reading and start the firewall configuration over completely. I feel like there is a gap in my understanding of how zone based firewalls work. I will report back soon&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 17:02:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987776#M1107453</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2024-01-01T17:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987811#M1107456</link>
      <description>&lt;P&gt;Ok, just got finished reading the ZBFW design doc all over again. Here is what I think I have come up with. Let’s just start over here:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;——————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Firewall requirements:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Allow all traffic from inside to outside&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Deny all traffic outside to inside for now&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Allow all traffic from self to outside&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;Deny all traffic from outside to self except VPN&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;***Configuration below uses Cisco default firewall configuration as a base***&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;——————————————————————————————————————————&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;1-2:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone security INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;description Zone for inside interfaces&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone security OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;description Zone for outside interfaces&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone security default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol udp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect INSIDE-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security INSIDE-OUTSIDE source INSIDE destination OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect INSIDE-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;interface gigabitEthernet 0/1/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;interface Vlan1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;interface Vlan250&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-member security INSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;interface gigabitEthernet 0/1/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-member security OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Comments - This configuration defines three zones, which by default are deny according to the ZBFW rules. A class map “Web” has been defined to inspect and match all traffic in the Web_acl and the Web_app class map. Inside each of those is a match any. So as I understand it, what happens is, any traffic from inside to out must match anything in the acl and any traffic in the class map in order to be permitted. This seems to allow restricting/permitting particular clients or networks and more generally, particular protocols. So if I wanted to allow https but not http, I would do that in the class map. If I wanted to restrict internal subnets from getting through, I would specify only the ones I wanted to get through in the acl. The policy map INSIDE-OUTSIDE-POLICY then performs the action. It inspects based on the web class map and permits but inspects that traffic. Then everything else is dropped and logged based on the class class-default. In this case, all traffic is inspected but permitted from inside to out. Since the zone outside and inside are defined, but no policy is in place for outside to inside, all traffic is denied by default. This seems to accomplish the first two objectives in the requirements. If I wanted to allow som out-in traffic at some point, I would need to do the same configuration as above for the out-in policy, limit to particular ip addresses in the acl, and limit to particular protocols in the class map with a new class map that was match all. Then I would inspect that traffic and then drop and log all other traffic based on class-default. Although, I’m not sure why I need the drop portion of the policy if the default is deny. Wouldn’t the policy allow what has been defined and drop everything else? Or is that only implicit when a policy does not exist?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Now on to the self zone. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;According to the documentation, the self-zone a system defined zone is the only exception to the default deny all policy. All traffic to any router interface is allowed until traffic is explicitly denied. Therefore, it would seem that in this case, I can similarly configure the self-out policy to permit all traffic as above. However, I can’t leave out-self without a policy because it will implicitly permit all traffic. Therefore, I think this needs to be my self zone configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;3:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended self_Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any self_Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol udp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all self_Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map self_Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name self_Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect self-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect self_Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;inspect&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security self-OUTSIDE source self destination OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect self-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;4: (This one is the one I am not sure about)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended Web_self_acl remark: in place to permit future vpn ip addresses&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any Web_self_app remark: left empty to add vpn protocols&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all Web_self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map Web_self_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name Web_self_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect OUTSIDE-self-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect self_Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;pass remark: because layer 7 can’t be inspected?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security OUTSIDE-self source OUTSIDE destination self&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect OUTSIDE-self-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Comments: now I know I could simplify #4 to policy-map type inspect OUTSIDE-self-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;But I want to leave room for vpn from specific addresses. And I may even permit all in the acl in order to use the client to site vpn so I could connect from anywhere. But this is where I am. Does this seem right and like I understand everything correctly? This is after reading this article again (&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.pdf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.pdf&lt;/A&gt;) and the articles you guys posted. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 22:15:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987811#M1107456</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2024-01-01T22:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987821#M1107458</link>
      <description>&lt;P&gt;all is correct, and I also check your point 4,&amp;nbsp;&lt;BR /&gt;I check if by default the traffic between the OUT and Self is permit or not&amp;nbsp;&lt;BR /&gt;and I get result it permit by default&amp;nbsp;&lt;BR /&gt;I run IPSec VPN and the tunnel is UP and traffic is pass between two routers (after allow traffic from IN/OUT to OUT/IN)&lt;BR /&gt;so your steps to deny the traffic is override the default and deny any VPN&lt;BR /&gt;&lt;BR /&gt;MHM&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 22:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987821#M1107458</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-01T22:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987824#M1107459</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1621291"&gt;@jeremy0463&lt;/a&gt;&amp;nbsp;For your "&lt;SPAN class=""&gt;Web_app&lt;/SPAN&gt;" class map you should reorder you match protocols. FTP should be above TCP, otherwise the&lt;BR /&gt;FTP connection is going to match on TCP and not treated as an FTP connection, this would probably cause problems with FTP.&lt;/P&gt;
&lt;P&gt;On "self_Web_app" you cannot match on L7 protocol "ftp" and inspect on a self zone.&lt;/P&gt;
&lt;P&gt;Using a "deny ip any any" on "Web_self_acl" means traffic will not match class-map "&lt;SPAN class=""&gt;Web_self"&lt;/SPAN&gt; and will subsequently be dropped by class-default - not sure that was your intention?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 23:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987824#M1107459</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-01T23:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987825#M1107460</link>
      <description>&lt;P&gt;Awesome, I feel like I’m understanding the concept now. On 4, yes, I intended to deny all for now until I get around to setting up the vpn. For now, the policy should deny all traffic from outside to self.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 23:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987825#M1107460</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2024-01-01T23:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987826#M1107461</link>
      <description>&lt;P&gt;Yes I see and it more secure.&lt;BR /&gt;for IN-OUT you match any protocol and action is inspect this will allow traffic from IN to OUT match protocol + prefix&amp;nbsp;&lt;BR /&gt;and since you use inspect NOT pass the return traffic can &lt;STRONG&gt;permit&lt;/STRONG&gt; from OUT-IN&amp;nbsp;&lt;BR /&gt;that different between inspect and pass&amp;nbsp;&lt;BR /&gt;have a nice day and happy new year&amp;nbsp;&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 23:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987826#M1107461</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-01T23:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987827#M1107462</link>
      <description>&lt;P&gt;Oh yeah, I remember reading that somewhere about order for ftp. Noted. I will reorder those.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;On the layer 7 inspection part, would this work:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ip access-list extended self_Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-any self_Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol udp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match protocol icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class-map type inspect match-all self_Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match class-map self_Web_app&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;match access-group name self_Web_acl&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;policy-map type inspect self-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class type inspect self_Web&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;pass&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;class class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;zone-pair security self-OUTSIDE source self destination OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;service-policy type inspect self-OUTSIDE-POLICY&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;And on the last part, yes I intended to drop all traffics grout outside to self for now until I can get around to setting up vpn. I’ll start another post for that eventually.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 23:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987827#M1107462</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2024-01-01T23:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outside access to router</title>
      <link>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987830#M1107463</link>
      <description>&lt;P&gt;Plus swapping the protocol order, forgot to do that before posting&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2024 23:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-outside-access-to-router/m-p/4987830#M1107463</guid>
      <dc:creator>jeremy0463</dc:creator>
      <dc:date>2024-01-01T23:33:38Z</dc:date>
    </item>
  </channel>
</rss>

