<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco router zone based firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071264#M136275</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could anyone advise on the configuration of the port range port forwarding for the cisco zone based firewall? In face I have the sip trunk that required the range of port forwarding (16000-16511) to internal pabx system.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:15:13 GMT</pubDate>
    <dc:creator>wayne loh</dc:creator>
    <dc:date>2019-03-12T09:15:13Z</dc:date>
    <item>
      <title>Cisco router zone based firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071264#M136275</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could anyone advise on the configuration of the port range port forwarding for the cisco zone based firewall? In face I have the sip trunk that required the range of port forwarding (16000-16511) to internal pabx system.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071264#M136275</guid>
      <dc:creator>wayne loh</dc:creator>
      <dc:date>2019-03-12T09:15:13Z</dc:date>
    </item>
    <item>
      <title>Wayne typically RTP uses UDP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071265#M136277</link>
      <description>&lt;P&gt;Wayne typically RTP uses UDP on high ports&amp;nbsp;&lt;SPAN&gt;16384 - 32767, SIP and SIP_TLS use 5060 and 5061 respectively.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco ASA can be configured to use SIP inspection, which means that the high ports do not have to be explicitly opened, but the ASA will open them dynamically, by inspecting the SIP signalling (at least that is the theory).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate if useful&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 12:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071265#M136277</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2017-04-24T12:47:00Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071266#M136281</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is a sample. In your ACLs you can specify the ports you are looking for. Seems that you are running on non-standard SIP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended IN-OUT&lt;BR /&gt;&amp;nbsp;permit ip object-group TRUSTED-SUNBETS object-group TRUSTED-SUNBETS&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended OUT-IN&lt;BR /&gt;&amp;nbsp;permit ip object-group TRUSTED-SUNBETS object-group TRUSTED-SUNBETS&lt;BR /&gt;&lt;BR /&gt;class-map type inspect match-all IN-OUT&lt;BR /&gt;&amp;nbsp;match access-group name IN-OUT&lt;BR /&gt;class-map type inspect match-all OUT-IN&lt;BR /&gt;&amp;nbsp;match access-group name OUT-IN&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect IN-OUT&lt;BR /&gt;&amp;nbsp;class type inspect IN-OUT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect OUT-IN&lt;BR /&gt;&amp;nbsp;class type inspect OUT-IN&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;zone security OUT&lt;BR /&gt;zone security IN&lt;BR /&gt;&lt;BR /&gt;zone-pair security IN-OUT source IN destination OUT&lt;BR /&gt;&amp;nbsp;service-policy type inspect IN-OUT&lt;BR /&gt;zone-pair security OUT-IN source OUT destination IN&lt;BR /&gt;&amp;nbsp;service-policy type inspect OUT-IN&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;int g0/0&lt;BR /&gt;&amp;nbsp;zone security member IN&lt;BR /&gt;&amp;nbsp;int g0/1&lt;BR /&gt;&amp;nbsp;zone security member OUT&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 13:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-router-zone-based-firewall/m-p/3071266#M136281</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-04-24T13:41:47Z</dc:date>
    </item>
  </channel>
</rss>

