<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Create a firewall rule on Cisco 2901 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3921783#M24596</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the following on a Cisco 2901:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Current configuration : 1999 bytes
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Sky-GW01
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 xxxxxxxxxxxxxxxxxxxxxxx
enable password xxxxxxxxx
!
aaa new-model
!
!
aaa authentication login default none
aaa authentication login VTY enable
!
!
!
!
!
aaa session-id common
clock timezone GMT 1 0
clock summer-time GMT recurring 1 Sun Apr 3:00 last Sun Oct 3:00
!
!
!
!
!
!
!
!
!
!
!
!
!
!
ip domain name domain.no
ip name-server 8.8.8.8
ip name-server 8.4.4.8
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
cts logging verbose
!
!
license udi pid CISCO2901/K9 sn FCZ1927C25G
!
!
!
redundancy
!
!
ip ssh authentication-retries 2
ip ssh version 2
ip ssh pubkey-chain
username admin
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description # Linknet #
ip address 1.1.1.138 255.255.255.248
duplex auto
speed auto
no mop enabled
!
interface GigabitEthernet0/1
description # mydesc #
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/1.10
encapsulation dot1Q 10
ip address 2.2.2.193 255.255.255.192
!
interface GigabitEthernet0/1.50
encapsulation dot1Q 50
ip address 2.2.2.129 255.255.255.192 secondary
ip address 2.2.2.1 255.255.255.128
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 3.3.3.3
!
ip access-list standard SSH
permit 2.2.2.0 0.0.0.255
!
!
!
snmp-server community public RO
snmp-server community private RW
!
!
!
control-plane
!
!
!
line con 0
privilege level 15
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
access-class SSH in
privilege level 15
logging synchronous
login authentication VTY
transport input ssh
!
scheduler allocate 20000 1000
!
end&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;We want to block all incoming and outgoing traffic to both interfaces,&amp;nbsp;interface GigabitEthernet0/1.10 and&amp;nbsp;GigabitEthernet0/1.50.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition we want to allow for ports 3389, 60123 and ping. We also want to allow all traffic to and from both the interfaces internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would we set this up in an easy way? (Ip's are not real, just replaced with 1s and 2s)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Sep 2019 13:50:58 GMT</pubDate>
    <dc:creator>Teknisk04977</dc:creator>
    <dc:date>2019-09-10T13:50:58Z</dc:date>
    <item>
      <title>Create a firewall rule on Cisco 2901</title>
      <link>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3921783#M24596</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the following on a Cisco 2901:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Current configuration : 1999 bytes
!
version 15.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Sky-GW01
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 xxxxxxxxxxxxxxxxxxxxxxx
enable password xxxxxxxxx
!
aaa new-model
!
!
aaa authentication login default none
aaa authentication login VTY enable
!
!
!
!
!
aaa session-id common
clock timezone GMT 1 0
clock summer-time GMT recurring 1 Sun Apr 3:00 last Sun Oct 3:00
!
!
!
!
!
!
!
!
!
!
!
!
!
!
ip domain name domain.no
ip name-server 8.8.8.8
ip name-server 8.4.4.8
ip cef
no ipv6 cef
multilink bundle-name authenticated
!
!
cts logging verbose
!
!
license udi pid CISCO2901/K9 sn FCZ1927C25G
!
!
!
redundancy
!
!
ip ssh authentication-retries 2
ip ssh version 2
ip ssh pubkey-chain
username admin
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description # Linknet #
ip address 1.1.1.138 255.255.255.248
duplex auto
speed auto
no mop enabled
!
interface GigabitEthernet0/1
description # mydesc #
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/1.10
encapsulation dot1Q 10
ip address 2.2.2.193 255.255.255.192
!
interface GigabitEthernet0/1.50
encapsulation dot1Q 50
ip address 2.2.2.129 255.255.255.192 secondary
ip address 2.2.2.1 255.255.255.128
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 3.3.3.3
!
ip access-list standard SSH
permit 2.2.2.0 0.0.0.255
!
!
!
snmp-server community public RO
snmp-server community private RW
!
!
!
control-plane
!
!
!
line con 0
privilege level 15
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
access-class SSH in
privilege level 15
logging synchronous
login authentication VTY
transport input ssh
!
scheduler allocate 20000 1000
!
end&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;We want to block all incoming and outgoing traffic to both interfaces,&amp;nbsp;interface GigabitEthernet0/1.10 and&amp;nbsp;GigabitEthernet0/1.50.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition we want to allow for ports 3389, 60123 and ping. We also want to allow all traffic to and from both the interfaces internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would we set this up in an easy way? (Ip's are not real, just replaced with 1s and 2s)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 13:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3921783#M24596</guid>
      <dc:creator>Teknisk04977</dc:creator>
      <dc:date>2019-09-10T13:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Create a firewall rule on Cisco 2901</title>
      <link>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3922132#M24599</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You need to clarify your requirements a bit.&lt;/P&gt;&lt;P&gt;Do you want 0/1.10 and 0/1.50 to be able to talk to each other but should not be able to talk to 0/0 except on ports 3389, 60123 and ping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 23:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3922132#M24599</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2019-09-10T23:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Create a firewall rule on Cisco 2901</title>
      <link>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3922346#M24601</link>
      <description>Well, basically 0/1.10 and 0/1.50 should allow all traffic OUT to the internet. And they should allow 3389,60123 incoming ports open. Internal traffic between 0/1.10 and 0/1.50 both IN And OUT should be open. I'm not sure what 0/0 does really, isn't that the route out to internet?</description>
      <pubDate>Wed, 11 Sep 2019 09:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/create-a-firewall-rule-on-cisco-2901/m-p/3922346#M24601</guid>
      <dc:creator>Teknisk04977</dc:creator>
      <dc:date>2019-09-11T09:40:01Z</dc:date>
    </item>
  </channel>
</rss>

