<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WAN Firewall and Network Security in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009818#M23253</link>
    <description>&lt;P&gt;You can disable all interfaces except one from even responding to management traffic by using the management plane protection feature.&lt;/P&gt;
&lt;P&gt;Reference:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios/security/configuration/guide/sec_mgmt_plane_prot.html#wp1049317" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios/security/configuration/guide/sec_mgmt_plane_prot.html#wp1049317&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 11 Jan 2020 11:18:19 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-01-11T11:18:19Z</dc:date>
    <item>
      <title>WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009789#M23248</link>
      <description>&lt;P&gt;I am entirely new to Cisco hardware and am slowly learning how to configure things via console. I have a 2911 running IOS 15.7.3. It's stock configuration with 3 GigabitEthernet interfaces. I also have a 4948 Switch. What I am wanting to do currently is Configure 1 Interface for WAN and use another to directly connect to my switch with OSPF and possibly do a vlan or two.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Before I connect to the internet I want to do a few things. I want to disable all remote management. ssh, telnet, http, etc. I setup through the "setup" wizard and believe everything is disabled but would like to disable any vector that would allow exploitation other than physically being connected to console.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am familiar with pf and ufw as far as firewalls go and I am aware 99% of firewall issues are outbound traffic. but I would like to setup a block all incoming on WAN interface with some more information on possibly allowing certain traffic to certain ports on vlan ips.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tutorials would be great. I want to deny all incoming traffic before I connect this to the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Nate&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2020 03:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009789#M23248</guid>
      <dc:creator>NathanLKoch</dc:creator>
      <dc:date>2020-01-11T03:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009813#M23250</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can restrict access just to the router by using an ACL applied to the VTY line, example &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/12-4t/sec-data-acl-12-4t-book/sec-cntrl-acc-vtl.html" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To control traffic through the router, you can again use an ACL or alternatively use Zone Based Firewall (ZBFW), example &lt;A href="https://community.cisco.com/t5/security-documents/ios-zone-based-firewall-step-by-step-basic-configuration/ta-p/3142774" target="_self"&gt;here&lt;/A&gt; and &lt;A href="https://www.youtube.com/watch?v=n19NnWXX4Ts" target="_self"&gt;here&lt;/A&gt;. ZBFW is stateful so will keep track of the connections.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2020 09:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009813#M23250</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-11T09:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009818#M23253</link>
      <description>&lt;P&gt;You can disable all interfaces except one from even responding to management traffic by using the management plane protection feature.&lt;/P&gt;
&lt;P&gt;Reference:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios/security/configuration/guide/sec_mgmt_plane_prot.html#wp1049317" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios/security/configuration/guide/sec_mgmt_plane_prot.html#wp1049317&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2020 11:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009818#M23253</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-11T11:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009977#M23254</link>
      <description>&lt;P&gt;I followed the tutorial. I didn't need the DMZ thought. I have some questions. Here is my config:&lt;/P&gt;&lt;PRE&gt;class-map type inspect match-all INSIDE-TO-OUTSIDE-CLASS
 match access-group name INSIDE-TO-OUTSIDE
class-map type inspect match-all OUTSIDE-TO-INSIDE-CLASS
 match access-group name OUTSIDE-TO-INSIDE
!         
policy-map type inspect INSIDE-TO-OUTSIDE-POLICY
 class type inspect INSIDE-TO-OUTSIDE-CLASS
  inspect 
 class class-default
  drop log
policy-map type inspect OUTSIDE-TO-INSIDE-POLICY
 class type inspect OUTSIDE-TO-INSIDE-CLASS
  pass    
 class class-default
  drop log
!         
zone security INSIDE
zone security OUTSIDE
zone-pair security IN-TO-OUT source INSIDE destination OUTSIDE
 service-policy type inspect INSIDE-TO-OUTSIDE-POLICY
zone-pair security OUT-TO-IN source OUTSIDE destination INSIDE
 service-policy type inspect OUTSIDE-TO-INSIDE-POLICY
!         
!         
interface GigabitEthernet0/0
 ip address dhcp
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 zone-member security OUTSIDE
 no ip route-cache
 duplex auto
 speed auto
 no mop enabled
!         
interface GigabitEthernet0/1
 no ip address
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 zone-member security INSIDE
 no ip route-cache
 shutdown 
 duplex auto
 speed auto
 no mop enabled
!       
!         
ip access-list extended INSIDE-TO-OUTSIDE
ip access-list extended OUTSIDE-TO-INSIDE
!         
!         
access-list 100 permit udp any any eq bootpc
! &lt;/PRE&gt;&lt;PRE&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY
 class type inspect OUTSIDE-TO-INSIDE-CLASS
  pass   &lt;/PRE&gt;&lt;P&gt;What's confusing me is this outside-to-inside-class? Shouldn't it be inspect and the other? Does this look like a good way to block all incoming connections on my wan port?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2020 03:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009977#M23254</guid>
      <dc:creator>NathanLKoch</dc:creator>
      <dc:date>2020-01-12T03:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009981#M23255</link>
      <description>&lt;P&gt;#show management-interface&lt;BR /&gt;No management interfaces configured&lt;BR /&gt;&lt;BR /&gt;(none of the things meme)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are these things?&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line 2&lt;/P&gt;&lt;P&gt;line vty 0 4?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2020 03:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4009981#M23255</guid>
      <dc:creator>NathanLKoch</dc:creator>
      <dc:date>2020-01-12T03:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010058#M23256</link>
      <description>&lt;P&gt;The various line commands are described in detail in this book excerpt:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.oreilly.com/library/view/cisco-ios-in/0596008694/ch04.html" target="_blank"&gt;https://www.oreilly.com/library/view/cisco-ios-in/0596008694/ch04.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2020 11:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010058#M23256</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-12T11:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010100#M23258</link>
      <description>Your initial requirement was to deny inbound traffic on the outside interface, so you'd want to drop.</description>
      <pubDate>Sun, 12 Jan 2020 14:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010100#M23258</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-01-12T14:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: WAN Firewall and Network Security</title>
      <link>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010101#M23260</link>
      <description>&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;PRE&gt;!
line con 0
 exec-timeout 5 0
 login authentication local_auth
 transport output telnet
 speed 115200
line aux 0
 exec-timeout 15 0
 login authentication local_auth
 transport output telnet
line 2
 exec-timeout 15 0
 login authentication local_auth
 no activation-character
 no exec
 transport preferred none
 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
 stopbits 1
line vty 0 4
 password 7 supersecurepassword
 login authentication local_auth
 transport input telnet
!&lt;/PRE&gt;&lt;P&gt;I want to disable line 2 and vty but I'm not sure what they are. vty is any ip based service like telnet and ssh. but what is line 2?&lt;/P&gt;&lt;P&gt;At some point I want to use my aux port to link my router to my switch so I only have to use one console cable.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jan 2020 15:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wan-firewall-and-network-security/m-p/4010101#M23260</guid>
      <dc:creator>NathanLKoch</dc:creator>
      <dc:date>2020-01-12T15:06:59Z</dc:date>
    </item>
  </channel>
</rss>

