<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Julien- in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977159#M144127</link>
    <description>&lt;P&gt;Hello Julien-&lt;/P&gt;
&lt;P&gt;Here is what you will need to do:&lt;/P&gt;
&lt;P&gt;1. Configure and extended ACL with the following ACEs:&lt;/P&gt;
&lt;P&gt;1.1 Permit the specific host from the outside to the specific host on the inside on port 8101 (For this I would recommend using an object-group. That way you can add/remove additional IPs on the fly without the need to add/remove ACEs from the ACL)&lt;/P&gt;
&lt;P&gt;1.2 Deny all other hosts/networks from the outside to the specific host on the inside on port 8101&lt;/P&gt;
&lt;P&gt;1.3 Permit whatever else you need permitted (This can be a simple &lt;STRONG&gt;permit ip any any statement&lt;/STRONG&gt;)&lt;/P&gt;
&lt;P&gt;2. Then you will need to apply the ACL to the G0/1 interface in an "&lt;STRONG&gt;inbound&lt;/STRONG&gt;" direction.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2016 20:59:10 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2016-12-20T20:59:10Z</dc:date>
    <item>
      <title>Router 1921 filter NAT inbound</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977158#M144124</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I own a routeur 1921, version 15.1. We use it as a router and also to allow remote worker.&lt;/P&gt;
&lt;P&gt;For example we NAT port TCP/8108&lt;/P&gt;
&lt;P&gt;ip nat inside source static tcp 192.168.0.70 8101 interface GigabitEthernet0/1 8101&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Doing this way anyone can connect to this port.&lt;/P&gt;
&lt;P&gt;How I can allow just a list of IP to connect to and deny all the others ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We just manage theses ACL :&lt;/P&gt;
&lt;P&gt;ip access-list extended outside&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any eq 135&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any eq 139&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any eq 445&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq 135&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq netbios-ns&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq netbios-dgm&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq netbios-ss&lt;BR /&gt;&amp;nbsp;permit ip any any&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit any&lt;BR /&gt;access-list 99 permit 192.168.0.0 0.0.255.255&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How can I do to control port TCP/8101 usage ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;J&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977158#M144124</guid>
      <dc:creator>julien.silverston</dc:creator>
      <dc:date>2019-03-12T08:40:35Z</dc:date>
    </item>
    <item>
      <title>Hello Julien-</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977159#M144127</link>
      <description>&lt;P&gt;Hello Julien-&lt;/P&gt;
&lt;P&gt;Here is what you will need to do:&lt;/P&gt;
&lt;P&gt;1. Configure and extended ACL with the following ACEs:&lt;/P&gt;
&lt;P&gt;1.1 Permit the specific host from the outside to the specific host on the inside on port 8101 (For this I would recommend using an object-group. That way you can add/remove additional IPs on the fly without the need to add/remove ACEs from the ACL)&lt;/P&gt;
&lt;P&gt;1.2 Deny all other hosts/networks from the outside to the specific host on the inside on port 8101&lt;/P&gt;
&lt;P&gt;1.3 Permit whatever else you need permitted (This can be a simple &lt;STRONG&gt;permit ip any any statement&lt;/STRONG&gt;)&lt;/P&gt;
&lt;P&gt;2. Then you will need to apply the ACL to the G0/1 interface in an "&lt;STRONG&gt;inbound&lt;/STRONG&gt;" direction.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 20:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977159#M144127</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-20T20:59:10Z</dc:date>
    </item>
    <item>
      <title>Hello Neno,</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977160#M144129</link>
      <description>&lt;P&gt;Hello Neno,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your complete and detailled answer.&lt;/P&gt;
&lt;P&gt;May I ask a last favor ?&lt;/P&gt;
&lt;P&gt;Can you provide me some configuration examples ?&lt;/P&gt;
&lt;P&gt;Other IP, ports, ...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 21:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977160#M144129</guid>
      <dc:creator>julien.silverston</dc:creator>
      <dc:date>2016-12-20T21:14:02Z</dc:date>
    </item>
    <item>
      <title>Sure thing. I would recommend</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977161#M144130</link>
      <description>&lt;P&gt;Sure thing. I would recommend checking out the post in the link below. It is very good, with a lot of details, diagrams and sample configs. The important thing to keep in mind is the order of operations (When does NAT, routing and ACLs takes place):&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cciethebeginning.wordpress.com/2010/06/08/order-of-operations-nat-routing-acl/"&gt;https://cciethebeginning.wordpress.com/2010/06/08/order-of-operations-nat-routing-acl/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 20:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977161#M144130</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-21T20:38:45Z</dc:date>
    </item>
    <item>
      <title>Thank you but I have several</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977162#M144132</link>
      <description>&lt;P&gt;Thank you but I have several other NAT rules and I don't want to lock me from the outside.&lt;/P&gt;
&lt;P&gt;How to make sure ?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 21:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977162#M144132</guid>
      <dc:creator>julien.silverston</dc:creator>
      <dc:date>2016-12-21T21:26:26Z</dc:date>
    </item>
    <item>
      <title>Well there are a couple of</title>
      <link>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977163#M144133</link>
      <description>&lt;P&gt;Well there are a couple of different things you can do here:&lt;/P&gt;
&lt;P&gt;1. Replicate your setup in a test/lab environment (physical or virtual). This will allow you to test not only this change but future ones as well. Things you can use here are: GNS3, PacketTracer, VIRL, and many more&lt;/P&gt;
&lt;P&gt;2. You can always use the "reload in&amp;nbsp;&lt;EM&gt;time&lt;/EM&gt;" command that will automatically reload the router in a set time. This is helpful when making changes remotely as if you make a change that locks you out, the router will automatically reload after the timer expires, thus reverting to the starting config that does not include your recent changes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Dec 2016 01:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/router-1921-filter-nat-inbound/m-p/2977163#M144133</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-12-24T01:45:55Z</dc:date>
    </item>
  </channel>
</rss>

