<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When you name the interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737644#M192254</link>
    <description>&lt;P&gt;When you name the interface as "inside", it automatically acquires the security level 100 and outside would be 0.&amp;nbsp; So, by default all outgoing traffic is allowed and incoming is blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to do it explicitly, you can specify ACLs and apply them on the interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneesh&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;SPAN style="font-size: 11px;"&gt;Please rate helpful posts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 30 Aug 2015 04:15:50 GMT</pubDate>
    <dc:creator>Puneesh Chhabra</dc:creator>
    <dc:date>2015-08-30T04:15:50Z</dc:date>
    <item>
      <title>How to allow all outgoing traffic and block all incoming traffic with access list?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737643#M192253</link>
      <description>&lt;P&gt;Using Cisco PIX 515E firewall&lt;/P&gt;&lt;P&gt;Version 7.2(4)25&lt;/P&gt;&lt;P&gt;Unrestricted (UR) license&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my current configuration:&lt;/P&gt;&lt;P&gt;config t&lt;BR /&gt;int e0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;nameif outside&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;int e1&lt;BR /&gt;ip address 10.1.1.1 255.0.0.0&lt;BR /&gt;nameif inside&lt;BR /&gt;no shut&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;global (outside) 1 inter&lt;BR /&gt;nat (inside) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737643#M192253</guid>
      <dc:creator>N5fGc9uYr</dc:creator>
      <dc:date>2019-03-12T06:31:18Z</dc:date>
    </item>
    <item>
      <title>When you name the interface</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737644#M192254</link>
      <description>&lt;P&gt;When you name the interface as "inside", it automatically acquires the security level 100 and outside would be 0.&amp;nbsp; So, by default all outgoing traffic is allowed and incoming is blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to do it explicitly, you can specify ACLs and apply them on the interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneesh&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;SPAN style="font-size: 11px;"&gt;Please rate helpful posts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 04:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737644#M192254</guid>
      <dc:creator>Puneesh Chhabra</dc:creator>
      <dc:date>2015-08-30T04:15:50Z</dc:date>
    </item>
    <item>
      <title>Yes I know how to do it by</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737645#M192255</link>
      <description>&lt;P&gt;Yes I know how to do it by using security levels inside 100 and outside 0.&lt;/P&gt;&lt;P&gt;But for educational purposes I wanted to know how to do it explicitly via access list in a simple way.&lt;/P&gt;&lt;P&gt;No fancy setups if possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 05:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737645#M192255</guid>
      <dc:creator>N5fGc9uYr</dc:creator>
      <dc:date>2015-08-30T05:44:50Z</dc:date>
    </item>
    <item>
      <title>For outbound traffic: access</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737646#M192256</link>
      <description>&lt;P&gt;For outbound traffic:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list Inside_allow_all permit ip any any&lt;/P&gt;&lt;P&gt;access-group Inside_allow_all in interface inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For inbound traffic&lt;/P&gt;&lt;P&gt;access-list Outside_Restricted deny ip x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;access-group Outside_Restricted in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Puneesh&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;STRONG&gt;Please rate helpful posts&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 05:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737646#M192256</guid>
      <dc:creator>Puneesh Chhabra</dc:creator>
      <dc:date>2015-08-30T05:55:16Z</dc:date>
    </item>
    <item>
      <title>For inbound traffic:The deny</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737647#M192257</link>
      <description>&lt;P&gt;For inbound traffic:&lt;/P&gt;&lt;P&gt;The deny ip x.x.x.x x.x.x.x should be?&lt;/P&gt;&lt;P&gt;my local ip&lt;/P&gt;&lt;P&gt;my public ip&lt;/P&gt;&lt;P&gt;my private ip&lt;/P&gt;&lt;P&gt;my gateway&lt;/P&gt;&lt;P&gt;dhcp setroute&lt;/P&gt;&lt;P&gt;any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 07:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737647#M192257</guid>
      <dc:creator>N5fGc9uYr</dc:creator>
      <dc:date>2015-08-30T07:03:36Z</dc:date>
    </item>
    <item>
      <title>I use any any in x.x.x.x x.x</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737648#M192258</link>
      <description>&lt;P&gt;I use any any in x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;It took all the commands properly&lt;/P&gt;&lt;P&gt;Thanks, great support&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2015 08:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-all-outgoing-traffic-and-block-all-incoming-traffic/m-p/2737648#M192258</guid>
      <dc:creator>N5fGc9uYr</dc:creator>
      <dc:date>2015-08-30T08:26:04Z</dc:date>
    </item>
  </channel>
</rss>

