<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It would appear I fixed it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578913#M199179</link>
    <description>&lt;P&gt;It would appear I fixed it hahah, no 100, 100 permit udp any any eq 53&lt;/P&gt;&lt;P&gt;Now all working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jan 2015 17:08:26 GMT</pubDate>
    <dc:creator>James Saunders</dc:creator>
    <dc:date>2015-01-16T17:08:26Z</dc:date>
    <item>
      <title>permit ip any any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578901#M199167</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question around the permit ip any any statement on an inbound ACL when using NAT. Is it safe? If I take the statement out of my list I can't do anything.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;&amp;nbsp;encapsulation dot1Q 10&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.192&lt;BR /&gt;&amp;nbsp;ip access-group IN_OUT_VLAN10 in&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;ip access-list extended IN_OUT_VLAN10&lt;BR /&gt;&amp;nbsp;permit udp any any eq bootpc&lt;BR /&gt;&amp;nbsp;permit udp any any eq bootps&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.63 192.168.1.64 0.0.0.63&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.63 192.168.1.128 0.0.0.63&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.63 192.168.1.192 0.0.0.63&lt;BR /&gt;&amp;nbsp;permit ip any any&lt;/P&gt;&lt;P&gt;Above list is to block my internal subnets*&lt;/P&gt;&lt;P&gt;interface Dialer1&lt;BR /&gt;&amp;nbsp; mtu 1492&lt;BR /&gt;&amp;nbsp;ip address negotiated&lt;BR /&gt;&amp;nbsp;ip access-group OUTSIDE_INSIDE in&lt;BR /&gt;&amp;nbsp;no ip redirects&lt;BR /&gt;&amp;nbsp;no ip unreachables&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;ip verify unicast source reachable-via rx allow-default 100&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip inspect IN_OUT_CBAC out&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;encapsulation ppp&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1452&lt;BR /&gt;&amp;nbsp;dialer pool 1&lt;BR /&gt;&amp;nbsp;dialer-group 1&lt;BR /&gt;&amp;nbsp;no keepalive&lt;BR /&gt;&amp;nbsp;ppp authentication chap callin&lt;BR /&gt;&amp;nbsp;ppp chap hostname ******&lt;BR /&gt;&amp;nbsp;ppp chap password ******&lt;BR /&gt;&amp;nbsp;no cdp enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE_INSIDE&lt;BR /&gt;&amp;nbsp;remark OUTSIDE_INSIDE_ALLOW&lt;BR /&gt;&amp;nbsp;remark *****&lt;BR /&gt;&amp;nbsp;permit tcp host ********* any eq 22 log-input&lt;BR /&gt;&amp;nbsp;remark ***********&lt;BR /&gt;&amp;nbsp;permit tcp host ************* any eq 22 log-input&lt;BR /&gt;&amp;nbsp;remark *********&lt;BR /&gt;&amp;nbsp;permit tcp host ************* any eq 22 log-input&lt;BR /&gt;&amp;nbsp;remark OUTSIDE_INSIDE_BLOCK&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; icmp any any echo&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; icmp any any echo-reply&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any eq 22 log-input&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq 22 log-input&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; tcp any any eq telnet log-input&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; udp any any eq 23 log-input&lt;/P&gt;&lt;P&gt;&amp;nbsp;permit ip any any &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; Without this here I have no traffic*&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip nat inside source list VLAN10_OUTSIDE interface Dialer1 overload&lt;/P&gt;&lt;P&gt;ip inspect name IN_OUT_CBAC tcp&lt;BR /&gt;ip inspect name IN_OUT_CBAC udp&lt;BR /&gt;ip inspect name IN_OUT_CBAC icmp&lt;/P&gt;&lt;P&gt;Above is a basic firewall for outbound connections and returning traffic** (I hope)&lt;/P&gt;&lt;P&gt;My question is do I need to put every single port I want to allow in and out in even though I am using NAT? It will be an insane list especially with gaming as XBOX uses random ports each time. I don't have any static NAT entries so when I do a port scan they are all closed as expected except 22 and 23 which I have closed only to specific hosts. Does IP here mean basically IP as in routing addresses etc (which would make sense) or does it mean the entire TCP/IP suite like TCP and UDP ports etc..&lt;/P&gt;&lt;P&gt;This has confused me so long I thought I would ask.. I see it on a lot of SMB routers with ADSL etc using NAT..&lt;/P&gt;&lt;P&gt;Thank you kindly everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578901#M199167</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2019-03-12T05:20:42Z</dc:date>
    </item>
    <item>
      <title>You should not have to put in</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578902#M199168</link>
      <description>&lt;P&gt;You should not have to put in the ip any any statement. Can you post the acl&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;VLAN10_OUTSIDE?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 15:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578902#M199168</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-15T15:05:30Z</dc:date>
    </item>
    <item>
      <title>Extended IP access list</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578903#M199169</link>
      <description>&lt;P&gt;Extended IP access list VLAN10_OUTSIDE&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip 192.168.1.0 0.0.0.63 any (7459 matches)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 deny ip any any (11814 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for response, above is the requested &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 18:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578903#M199169</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-15T18:33:37Z</dc:date>
    </item>
    <item>
      <title>sorry and by my access list I</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578904#M199170</link>
      <description>&lt;P&gt;sorry and by my access list I mean VLAN10 going to outside... Just my wording &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 18:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578904#M199170</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-15T18:36:22Z</dc:date>
    </item>
    <item>
      <title>Can you post a sanitized</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578905#M199171</link>
      <description>&lt;P&gt;Can you post a sanitized "show ip inspect all"?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 18:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578905#M199171</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-15T18:51:11Z</dc:date>
    </item>
    <item>
      <title>Established Sessions Session</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578906#M199172</link>
      <description>&lt;P&gt;Established Sessions&lt;BR /&gt;&amp;nbsp;Session 29F5EA3C (192.168.1.198:55435)=&amp;gt;(X.X.X.X:5671) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F4FD0C (192.168.1.15:49941)=&amp;gt;(X.X.X.X.:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5A0EC (192.168.1.15:49943)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5CE34 (192.168.1.26:52537)=&amp;gt;(X.X.X.X:5223) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F505AC (192.168.1.15:49940)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5B454 (192.168.1.15:49158)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5BACC (192.168.1.15:49944)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F52EA4 (192.168.1.14:61670)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5B67C (192.168.1.14:62041)=&amp;gt;(X.X.X.X:80) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F50E4C (192.168.1.15:49946)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5F2DC (192.168.1.15:49947)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5B8A4 (192.168.1.15:49945)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F52A54 (192.168.1.15:49265)=&amp;gt;(X.X.X.X:80) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5C9E4 (192.168.1.13:57579)=&amp;gt;(X.X.X.X:5223) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5DB24 (192.168.1.15:49938)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F577F4 (192.168.1.15:49939)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5E19C (192.168.1.19:50431)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5B22C (192.168.1.15:49942)=&amp;gt;(X.X.X.X:443) tcp SIS_OPEN&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 18:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578906#M199172</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-15T18:57:18Z</dc:date>
    </item>
    <item>
      <title>Can I get all of it please?</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578907#M199173</link>
      <description>&lt;P&gt;Can I get all of it please?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jan 2015 19:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578907#M199173</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-15T19:01:23Z</dc:date>
    </item>
    <item>
      <title>Sorry Colin, here we are #sh</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578908#M199174</link>
      <description>&lt;P&gt;Sorry Colin, here we are&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#sh ip inspect all&lt;BR /&gt;Session audit trail is disabled&lt;BR /&gt;Session alert is enabled&lt;BR /&gt;one-minute (sampling period) thresholds are [unlimited : unlimited] connections&lt;BR /&gt;max-incomplete sessions thresholds are [unlimited : unlimited]&lt;BR /&gt;max-incomplete tcp connections per host is unlimited. Block-time 0 minute.&lt;BR /&gt;tcp synwait-time is 30 sec -- tcp finwait-time is 5 sec&lt;BR /&gt;tcp idle-time is 3600 sec -- udp idle-time is 30 sec&lt;BR /&gt;tcp reassembly queue length 16; timeout 5 sec; memory-limit 1024 kilo bytes&lt;BR /&gt;dns-timeout is 5 sec&lt;BR /&gt;Inspection Rule Configuration&lt;BR /&gt;&amp;nbsp;Inspection name IN_OUT_CBAC&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp alert is on audit-trail is off timeout 3600&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp alert is on audit-trail is off timeout 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp alert is on audit-trail is off timeout 10&lt;/P&gt;&lt;P&gt;Interface Configuration&lt;BR /&gt;&amp;nbsp;Interface Dialer1&lt;BR /&gt;&amp;nbsp; Inbound inspection rule is not set&lt;BR /&gt;&amp;nbsp; Outgoing inspection rule is IN_OUT_CBAC&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp alert is on audit-trail is off timeout 3600&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp alert is on audit-trail is off timeout 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp alert is on audit-trail is off timeout 10&lt;BR /&gt;&amp;nbsp; Inbound access list is OUTSIDE_INSIDE&lt;BR /&gt;&amp;nbsp; Outgoing access list is not set&lt;/P&gt;&lt;P&gt;Established Sessions&lt;BR /&gt;&amp;nbsp;Session 29F5EA3C (192.168.1.198:55435)=&amp;gt;(54.194.173.224:5671) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5282C (192.168.1.14:62790)=&amp;gt;(54.243.233.199:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F4FAE4 (192.168.1.14:62795)=&amp;gt;(17.110.224.20:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F51914 (192.168.1.13:58339)=&amp;gt;(65.20.0.43:993) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F54CD4 (192.168.1.13:58341)=&amp;gt;(65.20.0.43:993) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5E5EC (192.168.1.13:58340)=&amp;gt;(65.20.0.43:993) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F52A54 (192.168.1.13:58314)=&amp;gt;(17.172.239.80:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5C36C (192.168.1.17:49964)=&amp;gt;(157.55.236.97:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F4FF34 (192.168.1.14:62797)=&amp;gt;(216.157.12.18:80) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5DF74 (192.168.1.14:62723)=&amp;gt;(69.171.235.48:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5534C (192.168.1.14:62794)=&amp;gt;(66.117.29.37:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F5F2DC (192.168.1.14:62793)=&amp;gt;(81.144.168.143:443) tcp SIS_OPEN&lt;BR /&gt;&amp;nbsp;Session 29F52EA4 (192.168.1.18:53043)=&amp;gt;(17.110.226.11:443) tcp SIS_OPEN&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 07:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578908#M199174</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T07:13:16Z</dc:date>
    </item>
    <item>
      <title>Strange. Everything looks to</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578909#M199175</link>
      <description>&lt;P&gt;Strange. Everything looks to be configured and working correctly. Let me make sure I understand the issue. When you remove permit ip any any from the ACL all traffic to the internet stops working?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 16:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578909#M199175</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-16T16:57:09Z</dc:date>
    </item>
    <item>
      <title>That is correct yes</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578910#M199176</link>
      <description>&lt;P&gt;That is correct yes&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 16:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578910#M199176</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T16:58:51Z</dc:date>
    </item>
    <item>
      <title>Can you remove 'permit ip any</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578911#M199177</link>
      <description>&lt;P&gt;Can you remove 'permit ip any any' and put in 'deny ip any any log'?&amp;nbsp;Try a webpage, then send the log please.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:01:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578911#M199177</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-16T17:01:59Z</dc:date>
    </item>
    <item>
      <title>000507: Jan 16 16:59:37.377</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578912#M199178</link>
      <description>&lt;P&gt;000507: Jan 16 16:59:37.377 gmt: %SEC-6-IPACCESSLOGP: list OUTSIDE_INSIDE denied udp 8.26.56.26(53) -&amp;gt; 86.167.1X.X(51878), 1 packet &amp;nbsp;&lt;BR /&gt;000508: Jan 16 16:59:38.377 gmt: %SEC-6-IPACCESSLOGP: list OUTSIDE_INSIDE denied udp 8.20.247.20(53) -&amp;gt; 86.167.X.X(64572), 1 packet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DNS issue?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578912#M199178</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:06:06Z</dc:date>
    </item>
    <item>
      <title>It would appear I fixed it</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578913#M199179</link>
      <description>&lt;P&gt;It would appear I fixed it hahah, no 100, 100 permit udp any any eq 53&lt;/P&gt;&lt;P&gt;Now all working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578913#M199179</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:08:26Z</dc:date>
    </item>
    <item>
      <title>Actually cancel that... only</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578914#M199180</link>
      <description>&lt;P&gt;Actually cancel that... only cached pages &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; working..&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578914#M199180</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:12:50Z</dc:date>
    </item>
    <item>
      <title>Actually cancel that... only</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578915#M199181</link>
      <description>&lt;P&gt;Actually cancel that... only cached pages &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; working..&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578915#M199181</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:13:14Z</dc:date>
    </item>
    <item>
      <title>Looks like CBAC is not</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578916#M199182</link>
      <description>&lt;P&gt;Looks like CBAC is not working correctly. Here's my CBAC config from a working router.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;ip inspect max-incomplete high 8000&lt;BR /&gt;ip inspect max-incomplete low 7900&lt;BR /&gt;ip inspect one-minute low 7900&lt;BR /&gt;ip inspect one-minute high 8000&lt;BR /&gt;ip inspect udp idle-time 360&lt;BR /&gt;ip inspect dns-timeout 10&lt;BR /&gt;ip inspect tcp idle-time 7200&lt;BR /&gt;ip inspect tcp finwait-time 10&lt;BR /&gt;ip inspect tcp max-incomplete host 1000 block-time 0&lt;BR /&gt;ip inspect tcp reassembly queue length 1024&lt;BR /&gt;ip inspect tcp reassembly timeout 60&lt;BR /&gt;ip inspect tcp reassembly memory limit 256000&lt;BR /&gt;ip inspect name IN_OUT_CBAC icmp&lt;BR /&gt;ip inspect name IN_OUT_CBAC&amp;nbsp;http&lt;BR /&gt;ip inspect name IN_OUT_CBAC&amp;nbsp;https&lt;BR /&gt;ip inspect name IN_OUT_CBAC&amp;nbsp;tcp&lt;BR /&gt;ip inspect name IN_OUT_CBAC&amp;nbsp;udp&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578916#M199182</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-16T17:19:39Z</dc:date>
    </item>
    <item>
      <title>ok I applied that and was</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578917#M199183</link>
      <description>&lt;P&gt;ok I applied that and was able to get to google but not access the pages.. Look like inboud acl is blocking UDP so I put permit udp any any on and that works&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578917#M199183</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:33:45Z</dc:date>
    </item>
    <item>
      <title>You should not have to do</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578918#M199184</link>
      <description>&lt;P&gt;You should not have to do that. CBAC should take care of all that stuff for you.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578918#M199184</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-16T17:35:21Z</dc:date>
    </item>
    <item>
      <title>I am at a loss on this..</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578919#M199185</link>
      <description>&lt;P&gt;I am at a loss on this.. Maybe if I put up the entire current config would help?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2015 17:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578919#M199185</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-16T17:39:08Z</dc:date>
    </item>
    <item>
      <title>no service padservice tcp</title>
      <link>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578920#M199186</link>
      <description>&lt;P&gt;Post Deleted!!! ###RESOLVED####&lt;/P&gt;</description>
      <pubDate>Sun, 18 Jan 2015 22:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-ip-any-any/m-p/2578920#M199186</guid>
      <dc:creator>James Saunders</dc:creator>
      <dc:date>2015-01-18T22:29:31Z</dc:date>
    </item>
  </channel>
</rss>

