<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, FTP has seperate streams in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879841#M172320</link>
    <description>&lt;P&gt;Yes, FTP has seperate streams of traffic for request and reply so without any extra configuration the reply traffic will be denied. &amp;nbsp;Basically any traffic that has separate data streams for request and reply.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Sun, 21 Feb 2016 20:42:11 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-21T20:42:11Z</dc:date>
    <item>
      <title>IP Inspect Protocols (Beginner)</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879838#M172317</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Recently passed CCNA and starting to look into CCNA security topics. I have a 1811 router I just set up as my NAT gateway. I've configured a implicit deny ACL for all inbound traffic from the internet and IP Inspect for tcp, udp, icmp originating from my network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From what Im testing so far this seems to work pretty well for home based internet traffic, I've yet to see anything blocked that I initiate. Is anyone able to point me to a reference for what additional functionality exists if I specific on a per protocol basis? For instance I see all sorts of other options with ip inspect like ftp, http, citricmaclient, etc, but I'm not sure if theres any added benefit to listing them specifically as apposed to the blanket statements I made.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879838#M172317</guid>
      <dc:creator>whartigan1</dc:creator>
      <dc:date>2019-03-12T07:22:01Z</dc:date>
    </item>
    <item>
      <title>Limiting to more specific</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879839#M172318</link>
      <description>&lt;P&gt;Limiting to more specific ports can be done if you want your users to only be allowed to, for example, go to http and https, but not ftp. &amp;nbsp;But more often than not, all traffic that is generated from the local LAN is permitted.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 20 Feb 2016 20:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879839#M172318</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-20T20:51:36Z</dc:date>
    </item>
    <item>
      <title>Thank you for the response. </title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879840#M172319</link>
      <description>&lt;P&gt;Thank you for the response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are there any scenarios where it is required to have specific protocols added? I was reading with FTP there are instances it won't work correctly without listing it explicitly. For everyday internet usage I want to make sure I have my ground covered.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Feb 2016 04:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879840#M172319</guid>
      <dc:creator>whartigan1</dc:creator>
      <dc:date>2016-02-21T04:12:05Z</dc:date>
    </item>
    <item>
      <title>Yes, FTP has seperate streams</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879841#M172320</link>
      <description>&lt;P&gt;Yes, FTP has seperate streams of traffic for request and reply so without any extra configuration the reply traffic will be denied. &amp;nbsp;Basically any traffic that has separate data streams for request and reply.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 21 Feb 2016 20:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-protocols-beginner/m-p/2879841#M172320</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-21T20:42:11Z</dc:date>
    </item>
  </channel>
</rss>

