<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configure Cisco 1921 as Home Router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configure-cisco-1921-as-home-router/m-p/2870664#M177210</link>
    <description>&lt;P&gt;Long Story short is that I have a Cisco 1921 running 15.3 that I am trying to setup as a typical home router.&amp;nbsp;&amp;nbsp; I want to allow all the traffic from inside to go to the internet, and I want all the traffic from the internet to to be able to get in.&amp;nbsp; If the traffic originated from inside, then naturally the responding traffic needs to come back in.&amp;nbsp; I thought I could do this with a few ACLs and using the IP INSPECT.&amp;nbsp; Doing that, the WAN port will not get an IP address and all inside traffic does not reach the internet.&amp;nbsp;&amp;nbsp; i dont have much experience configuring Security on Cisco Routers that also is running NAT.&amp;nbsp;&amp;nbsp;&amp;nbsp; If someone can point me in the right direction, that would be great.&amp;nbsp; below is the running config that is not working the way I would like&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DLC1921LTNTX3020#sh run&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 1798 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 22:13:54 UTC Sat Jun 18 2016&lt;BR /&gt;version 15.3&lt;BR /&gt;&lt;BR /&gt;ip name-server 208.67.222.222&lt;BR /&gt;ip name-server 208.67.220.220&lt;BR /&gt;ip inspect name FWOUT tcp&lt;BR /&gt;ip inspect name FWOUT udp&lt;BR /&gt;ip inspect name FWOUT dns&lt;BR /&gt;ip inspect name FWOUT http&lt;BR /&gt;ip inspect name FWOUT https&lt;BR /&gt;ip inspect name FWOUT time&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description LAN&lt;BR /&gt;&amp;nbsp;ip address 192.168.205.252 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip inspect FWOUT in&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description WAN&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;&amp;nbsp;ip access-group 5 in&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;interface Serial0/1/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 10 interface GigabitEthernet0/1 overload&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 5 deny&amp;nbsp;&amp;nbsp; any log&lt;BR /&gt;access-list 10 permit 192.168.205.0 0.0.0.255&lt;BR /&gt;access-list 100 permit udp any any eq bootpc&lt;BR /&gt;access-list 100 permit udp any any eq domain&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;&amp;nbsp;no activation-character&lt;BR /&gt;&amp;nbsp;no exec&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;&amp;nbsp;transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;&amp;nbsp;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 10 in&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;DLC1921LTNTX3020#&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:54:41 GMT</pubDate>
    <dc:creator>David Lee</dc:creator>
    <dc:date>2019-03-12T07:54:41Z</dc:date>
    <item>
      <title>Configure Cisco 1921 as Home Router</title>
      <link>https://community.cisco.com/t5/network-security/configure-cisco-1921-as-home-router/m-p/2870664#M177210</link>
      <description>&lt;P&gt;Long Story short is that I have a Cisco 1921 running 15.3 that I am trying to setup as a typical home router.&amp;nbsp;&amp;nbsp; I want to allow all the traffic from inside to go to the internet, and I want all the traffic from the internet to to be able to get in.&amp;nbsp; If the traffic originated from inside, then naturally the responding traffic needs to come back in.&amp;nbsp; I thought I could do this with a few ACLs and using the IP INSPECT.&amp;nbsp; Doing that, the WAN port will not get an IP address and all inside traffic does not reach the internet.&amp;nbsp;&amp;nbsp; i dont have much experience configuring Security on Cisco Routers that also is running NAT.&amp;nbsp;&amp;nbsp;&amp;nbsp; If someone can point me in the right direction, that would be great.&amp;nbsp; below is the running config that is not working the way I would like&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DLC1921LTNTX3020#sh run&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 1798 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 22:13:54 UTC Sat Jun 18 2016&lt;BR /&gt;version 15.3&lt;BR /&gt;&lt;BR /&gt;ip name-server 208.67.222.222&lt;BR /&gt;ip name-server 208.67.220.220&lt;BR /&gt;ip inspect name FWOUT tcp&lt;BR /&gt;ip inspect name FWOUT udp&lt;BR /&gt;ip inspect name FWOUT dns&lt;BR /&gt;ip inspect name FWOUT http&lt;BR /&gt;ip inspect name FWOUT https&lt;BR /&gt;ip inspect name FWOUT time&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description LAN&lt;BR /&gt;&amp;nbsp;ip address 192.168.205.252 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip inspect FWOUT in&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description WAN&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;&amp;nbsp;ip access-group 5 in&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;interface Serial0/1/0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 10 interface GigabitEthernet0/1 overload&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 5 deny&amp;nbsp;&amp;nbsp; any log&lt;BR /&gt;access-list 10 permit 192.168.205.0 0.0.0.255&lt;BR /&gt;access-list 100 permit udp any any eq bootpc&lt;BR /&gt;access-list 100 permit udp any any eq domain&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;&amp;nbsp;no activation-character&lt;BR /&gt;&amp;nbsp;no exec&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;&amp;nbsp;transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;BR /&gt;&amp;nbsp;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 10 in&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;BR /&gt;&lt;BR /&gt;DLC1921LTNTX3020#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-cisco-1921-as-home-router/m-p/2870664#M177210</guid>
      <dc:creator>David Lee</dc:creator>
      <dc:date>2019-03-12T07:54:41Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/configure-cisco-1921-as-home-router/m-p/2870665#M177211</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;few things based on your config.&lt;/P&gt;
&lt;P&gt;1. For NAT acl, I will recommend to use extended ACL instead of standard (it will allow you to details more who can have access to internet and with which protocols). Right now, it would be quite the same:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;B&gt;&lt;I&gt;Ip access-list extended NAT&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;&lt;I&gt;deny ip 192.168.205.0 0.0.0.255&amp;nbsp;192.168.205.0 0.0.0.255&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;&lt;I&gt;permit ip&amp;nbsp;192.168.205.0 0.0.0.255 any&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;2. You are missing a default route (normally, your ISP connected on the WAN interface should give you a default-route.) In that case the command is:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;B&gt;&lt;I&gt;ip route 0.0.0.0 0.0.0.0 dhcp&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;3. On your WAN interface, you're applying the ACL 5 that deny any. Why?&lt;/P&gt;
&lt;P&gt;4. To allow the traffic back based on an acl that limit some ports, you need to use reflective&amp;nbsp;acl (1st solution).&lt;/P&gt;
&lt;P&gt;Some documentation of Reflective acl:&amp;nbsp;http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfreflx.html&lt;/P&gt;
&lt;P&gt;The minding is to create a simple acl (that you will put as in on your interface) and create another that reflect the in (that you will put as out on your interface)&lt;/P&gt;
&lt;P&gt;&lt;B&gt;&lt;U&gt;A sample of ACL&lt;/U&gt;&lt;/B&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Extended IP access list FIREWALL-IN&lt;BR /&gt; 10 permit udp any any eq ntp&amp;nbsp;&lt;BR /&gt; 20 permit udp any eq ntp any&lt;BR /&gt; 30 permit icmp any any echo-reply&amp;nbsp;&lt;BR /&gt; 40 permit icmp any any traceroute&lt;BR /&gt; 50 permit esp any any&amp;nbsp;&lt;BR /&gt; 60 permit ahp any any&lt;BR /&gt; 70 permit udp any any eq isakmp&amp;nbsp;&lt;BR /&gt; 80 permit udp any eq isakmp any&lt;BR /&gt; 90 permit udp any any eq non500-isakmp&amp;nbsp;&lt;BR /&gt; 100 permit udp any eq non500-isakmp any&lt;BR /&gt; 110 permit udp any any eq bootps&amp;nbsp;&lt;BR /&gt; 120 permit udp any any eq bootpc&lt;BR /&gt; 130 evaluate FIREWALL-REFLEX-IN&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Extended IP access list FIREWALL-OUT&lt;BR /&gt; 10 permit ip any any reflect FIREWALL-REFLEX-IN&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;4 bis. You can even use inspect, however your issue don't seems to be related to the INSPECT rule. Usually, we apply the inspect on the WAN interface as out to allow that return traffic is allowed.&lt;/P&gt;
&lt;P&gt;See here some doc:&amp;nbsp;https://learningnetwork.cisco.com/docs/DOC-7832&lt;/P&gt;
&lt;P&gt;5. You said that your WAN is not getting IP even if it has been configured as DHCP. You have an acl denying everything. Remove that acl first and try it again&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope that's clear.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 01:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-cisco-1921-as-home-router/m-p/2870665#M177211</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-19T01:04:53Z</dc:date>
    </item>
  </channel>
</rss>

