<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVACISCO891#sh runBuilding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476011#M267952</link>
    <description>&lt;P&gt;CISCO891#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 7694 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 20:49:10 UTC Mon Mar 31 2014 by xxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;version 15.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash:c890-universalk9-mz.154-1.T1.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;aqm-register-fnf&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-913463742&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-913463742&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-913463742&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-913463742&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082024B&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip port-map http port tcp 20000&lt;BR /&gt;ip port-map user-protocol--2 port tcp 3389&lt;BR /&gt;ip port-map user-protocol--3 port tcp 5900&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name xxxxxxxx&lt;BR /&gt;ip name-server 192.168.1.24&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip name-server 208.67.220.220&lt;BR /&gt;ip inspect log drop-pkt&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;parameter-map type inspect global&lt;BR /&gt;&amp;nbsp;log dropped-packets enable&lt;BR /&gt;&amp;nbsp;max-incomplete low 18000&lt;BR /&gt;&amp;nbsp;max-incomplete high 20000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO891-K9 sn xxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;no ip ftp passive&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any outbound&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-any inbound&lt;BR /&gt;&amp;nbsp;match access-group name inbound&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect outbound&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class type inspect outbound&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect inbound&lt;BR /&gt;&amp;nbsp;class type inspect inbound&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security outzone&lt;BR /&gt;zone security inzone&lt;BR /&gt;zone-pair security outbound source inzone destination outzone&lt;BR /&gt;&amp;nbsp;service-policy type inspect outbound&lt;BR /&gt;zone-pair security outzone source outzone destination inzone&lt;BR /&gt;&amp;nbsp;service-policy type inspect inbound&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 2&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto isakmp policy 3&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;crypto isakmp key xxxxxxxxxxxx address xxxxxxxxxxx &amp;nbsp; no-xauth&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP/AES-128/MD5 esp-aes esp-md5-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;crypto ipsec transform-set ESP-3DES esp-3des esp-md5-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map SDM_CMAP_1 1 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;description Tunnel toxxxxxxxxxxx&lt;BR /&gt;&amp;nbsp;set peer xxxxxxxxxxxx&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set transform-set ESP/AES-128/MD5&lt;BR /&gt;&amp;nbsp;match address 100&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet5&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt;&amp;nbsp;description TWTELECOM$FW_OUTSIDE$$ETH-WAN$&lt;BR /&gt;&amp;nbsp;ip address xxxxxxxxxxx 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security outzone&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;crypto map SDM_CMAP_1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description vlanrouterswitch$FW_INSIDE$&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security inzone&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Async1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http port 20000&lt;BR /&gt;ip http access-class 1&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source static tcp 192.168.1.24 25 interface FastEthernet8 25&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source static tcp 192.168.1.24 80 interface FastEthernet8 80&lt;BR /&gt;ip nat inside source static tcp 192.168.1.24 443 interface FastEthernet8 443&lt;BR /&gt;ip nat inside source static tcp 192.168.1.243 5900 interface FastEthernet8 5900&lt;BR /&gt;ip nat inside source static tcp 192.168.1.20 3389 interface FastEthernet8 3390&lt;BR /&gt;ip nat inside source static tcp 192.168.1.25 3389 interface FastEthernet8 3389&lt;BR /&gt;ip nat inside source static tcp 192.168.1.36 2021 interface FastEthernet8 2021&lt;BR /&gt;ip nat inside source static tcp 192.168.1.36 2022 interface FastEthernet8 2022&lt;BR /&gt;ip nat inside source route-map TWTELECOM interface FastEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.37 443 xxxxxxxxxxxx 443 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 xxxxxxxxxxx 5&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended inbound&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq smtp&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq www&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.243 eq 5900&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.20 eq 3390&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.25 eq 3389&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.36 eq 2021&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.36 eq 2022&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.37 eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.20 eq 3389&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;BR /&gt;route-map TWTELECOM permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;&amp;nbsp;match interface FastEthernet8&lt;BR /&gt;!&lt;BR /&gt;snmp-server community public RO&lt;BR /&gt;!&lt;BR /&gt;access-list 100 remark CCP_ACL Category=4&lt;BR /&gt;access-list 100 remark IPSec Rule&lt;BR /&gt;access-list 100 permit ip 192.168.1.0 0.0.0.255 host xxxxxxxxxxxx&lt;BR /&gt;access-list 101 remark CCP_ACL Category=18&lt;BR /&gt;access-list 101 remark IPSec Rule&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt;access-list 150 permit tcp host 192.168.1.24 eq 443 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 150 permit tcp host xxxxxxxxxxxxx host 192.168.1.24 eq 443&lt;BR /&gt;access-list 150 permit tcp host 192.168.1.37 eq 443 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 150 permit tcp host xxxxxxxxxxxxx host 192.168.1.37 eq 443&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mgcp behavior rsip-range tgcp-only&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mgcp behavior comedia-role none&lt;BR /&gt;mgcp behavior comedia-check-media-src disable&lt;BR /&gt;mgcp behavior comedia-sdp-force disable&lt;BR /&gt;!&lt;BR /&gt;mgcp profile default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;line 1&lt;BR /&gt;&amp;nbsp;modem InOut&lt;BR /&gt;&amp;nbsp;speed 115200&lt;BR /&gt;&amp;nbsp;flowcontrol hardware&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 103 in&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;access-class 102 in&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
    <pubDate>Fri, 04 Apr 2014 21:00:02 GMT</pubDate>
    <dc:creator>CTS-Tech1</dc:creator>
    <dc:date>2014-04-04T21:00:02Z</dc:date>
    <item>
      <title>Cisco 891 and Stealth Firewall</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476007#M267948</link>
      <description>&lt;P&gt;How can I configure the Cisco 891 to have Stealth ports on the GRC Shields Up test ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.grc.com/shieldsup" target="_blank"&gt;https://www.grc.com/shieldsup&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476007#M267948</guid>
      <dc:creator>CTS-Tech1</dc:creator>
      <dc:date>2019-03-12T04:00:58Z</dc:date>
    </item>
    <item>
      <title>You need to configure either</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476008#M267949</link>
      <description>&lt;P&gt;You need to configure either CBAC or ZBFW on your router.&lt;/P&gt;&lt;P&gt;CBAC - http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/13814-32.html&lt;/P&gt;&lt;P&gt;ZBFW - http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CBAC would be the easier configuration out of the two, but it is an older implementation.&amp;nbsp; ZBFW is the new standard for IOS firewall, but can be quite complicated if you do not understand how it works.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 12:46:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476008#M267949</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-01T12:46:39Z</dc:date>
    </item>
    <item>
      <title>I already had Cisco Support</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476009#M267950</link>
      <description>&lt;P&gt;I already had Cisco Support create, enable and verify the Zone Based Firewall.&amp;nbsp; The GRC Shields Up test still reports the ports as "closed" or "open" - no "stealth".&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 15:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476009#M267950</guid>
      <dc:creator>CTS-Tech1</dc:creator>
      <dc:date>2014-04-01T15:39:23Z</dc:date>
    </item>
    <item>
      <title>Could you post a full running</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476010#M267951</link>
      <description>&lt;P&gt;Could you post a full running config (sanitised) of the router please.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2014 06:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476010#M267951</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-02T06:39:23Z</dc:date>
    </item>
    <item>
      <title>CVACISCO891#sh runBuilding</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476011#M267952</link>
      <description>&lt;P&gt;CISCO891#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 7694 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 20:49:10 UTC Mon Mar 31 2014 by xxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;version 15.4&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash:c890-universalk9-mz.154-1.T1.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;aqm-register-fnf&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-913463742&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-913463742&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-913463742&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-913463742&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082024B&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip port-map http port tcp 20000&lt;BR /&gt;ip port-map user-protocol--2 port tcp 3389&lt;BR /&gt;ip port-map user-protocol--3 port tcp 5900&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name xxxxxxxx&lt;BR /&gt;ip name-server 192.168.1.24&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip name-server 208.67.220.220&lt;BR /&gt;ip inspect log drop-pkt&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;parameter-map type inspect global&lt;BR /&gt;&amp;nbsp;log dropped-packets enable&lt;BR /&gt;&amp;nbsp;max-incomplete low 18000&lt;BR /&gt;&amp;nbsp;max-incomplete high 20000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO891-K9 sn xxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;no ip ftp passive&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any outbound&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;class-map type inspect match-any inbound&lt;BR /&gt;&amp;nbsp;match access-group name inbound&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect outbound&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class type inspect outbound&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect inbound&lt;BR /&gt;&amp;nbsp;class type inspect inbound&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security outzone&lt;BR /&gt;zone security inzone&lt;BR /&gt;zone-pair security outbound source inzone destination outzone&lt;BR /&gt;&amp;nbsp;service-policy type inspect outbound&lt;BR /&gt;zone-pair security outzone source outzone destination inzone&lt;BR /&gt;&amp;nbsp;service-policy type inspect inbound&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 2&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; crypto isakmp policy 3&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;&amp;nbsp;encr 3des&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;crypto isakmp key xxxxxxxxxxxx address xxxxxxxxxxx &amp;nbsp; no-xauth&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP/AES-128/MD5 esp-aes esp-md5-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;crypto ipsec transform-set ESP-3DES esp-3des esp-md5-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map SDM_CMAP_1 1 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;description Tunnel toxxxxxxxxxxx&lt;BR /&gt;&amp;nbsp;set peer xxxxxxxxxxxx&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set transform-set ESP/AES-128/MD5&lt;BR /&gt;&amp;nbsp;match address 100&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet5&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt;&amp;nbsp;description TWTELECOM$FW_OUTSIDE$$ETH-WAN$&lt;BR /&gt;&amp;nbsp;ip address xxxxxxxxxxx 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security outzone&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;crypto map SDM_CMAP_1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;description vlanrouterswitch$FW_INSIDE$&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;zone-member security inzone&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Async1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http port 20000&lt;BR /&gt;ip http access-class 1&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source static tcp 192.168.1.24 25 interface FastEthernet8 25&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source static tcp 192.168.1.24 80 interface FastEthernet8 80&lt;BR /&gt;ip nat inside source static tcp 192.168.1.24 443 interface FastEthernet8 443&lt;BR /&gt;ip nat inside source static tcp 192.168.1.243 5900 interface FastEthernet8 5900&lt;BR /&gt;ip nat inside source static tcp 192.168.1.20 3389 interface FastEthernet8 3390&lt;BR /&gt;ip nat inside source static tcp 192.168.1.25 3389 interface FastEthernet8 3389&lt;BR /&gt;ip nat inside source static tcp 192.168.1.36 2021 interface FastEthernet8 2021&lt;BR /&gt;ip nat inside source static tcp 192.168.1.36 2022 interface FastEthernet8 2022&lt;BR /&gt;ip nat inside source route-map TWTELECOM interface FastEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.37 443 xxxxxxxxxxxx 443 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 xxxxxxxxxxx 5&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended inbound&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq smtp&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq www&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.24 eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.243 eq 5900&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.20 eq 3390&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.25 eq 3389&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.36 eq 2021&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.36 eq 2022&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.37 eq 443&lt;BR /&gt;&amp;nbsp;permit tcp any host 192.168.1.20 eq 3389&lt;BR /&gt;!&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;BR /&gt;route-map TWTELECOM permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;&amp;nbsp;match interface FastEthernet8&lt;BR /&gt;!&lt;BR /&gt;snmp-server community public RO&lt;BR /&gt;!&lt;BR /&gt;access-list 100 remark CCP_ACL Category=4&lt;BR /&gt;access-list 100 remark IPSec Rule&lt;BR /&gt;access-list 100 permit ip 192.168.1.0 0.0.0.255 host xxxxxxxxxxxx&lt;BR /&gt;access-list 101 remark CCP_ACL Category=18&lt;BR /&gt;access-list 101 remark IPSec Rule&lt;BR /&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 101 permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt;access-list 150 permit tcp host 192.168.1.24 eq 443 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 150 permit tcp host xxxxxxxxxxxxx host 192.168.1.24 eq 443&lt;BR /&gt;access-list 150 permit tcp host 192.168.1.37 eq 443 host xxxxxxxxxxxxxx&lt;BR /&gt;access-list 150 permit tcp host xxxxxxxxxxxxx host 192.168.1.37 eq 443&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mgcp behavior rsip-range tgcp-only&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; mgcp behavior comedia-role none&lt;BR /&gt;mgcp behavior comedia-check-media-src disable&lt;BR /&gt;mgcp behavior comedia-sdp-force disable&lt;BR /&gt;!&lt;BR /&gt;mgcp profile default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;line 1&lt;BR /&gt;&amp;nbsp;modem InOut&lt;BR /&gt;&amp;nbsp;speed 115200&lt;BR /&gt;&amp;nbsp;flowcontrol hardware&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 103 in&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;--More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;access-class 102 in&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 04 Apr 2014 21:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476011#M267952</guid>
      <dc:creator>CTS-Tech1</dc:creator>
      <dc:date>2014-04-04T21:00:02Z</dc:date>
    </item>
    <item>
      <title>From which IP are you testing</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476012#M267953</link>
      <description>&lt;P&gt;From which IP are you testing from?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Sat, 05 Apr 2014 13:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476012#M267953</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-05T13:32:55Z</dc:date>
    </item>
    <item>
      <title>An internal LAN IP on the 192</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476013#M267954</link>
      <description>&lt;P&gt;An internal LAN IP on the 192.168.1.x network.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Apr 2014 14:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476013#M267954</guid>
      <dc:creator>CTS-Tech1</dc:creator>
      <dc:date>2014-04-07T14:42:38Z</dc:date>
    </item>
    <item>
      <title>Well, the config looks fine,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476014#M267955</link>
      <description>&lt;P&gt;Well, the config looks fine, so I am not sure why it is not showing as stealth.&amp;nbsp; Depending on how adventurous you want to get with this, you could try removing the config that matches the inbound ACL and see if it then shows as stealth.&amp;nbsp; But do so at your own risk...if you are not very familiar with ZBF that is.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2014 06:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-891-and-stealth-firewall/m-p/2476014#M267955</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-08T06:41:53Z</dc:date>
    </item>
  </channel>
</rss>

