<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS outbound filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413826#M308418</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is an example of how a reflexive ACL would be configured.&amp;nbsp; What it does is to dynamically add an ACL entry to allow returning traffic that is generated from the inside network and exits the interface where the ACL is configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended IN-TO-OUT&lt;/P&gt;&lt;P&gt;permit tcp any any reflect TRAFFIC&lt;/P&gt;&lt;P&gt;permit udp any any refelct TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUT-TO-IN&lt;/P&gt;&lt;P&gt;permit tcp any any eq http&lt;/P&gt;&lt;P&gt;permit tcp any any eq https&lt;/P&gt;&lt;P&gt;evaluate TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gig0/1&lt;/P&gt;&lt;P&gt;description INTERNET FACING INTERFACE&lt;/P&gt;&lt;P&gt;ip add 123.213.221.1 255.255.255.252&lt;/P&gt;&lt;P&gt;access-group IN-TO-OUT out&lt;/P&gt;&lt;P&gt;access-group OUT-TO-IN in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Nov 2013 19:55:30 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2013-11-23T19:55:30Z</dc:date>
    <item>
      <title>Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413822#M308400</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone can help with configuring a Cisco 881 which does NAT for the vlan and has a handful of port forwards from the WAN interface to hosts on the vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've created an extended access-list named 'outbound-filter' with the following rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-list extended outbound-filter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit icmp any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp host 172.16.1.12 any eq smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 43&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 53&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 110&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 143&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 993&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 995&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 5060&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any any eq 5060&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 5242&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any any eq 5243&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 4244&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit tcp any any eq 7071&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit udp any any eq 9785&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This is all that we want to allow out to the Internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the Internet, we have the following ip nat inside rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source list 1 interface FastEthernet4 overload&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source static tcp 172.16.1.12 25 59.100.202.46 25 extendable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source static tcp 172.16.1.12 443 59.100.202.46 443 extendable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip nat inside source static tcp 172.16.1.16 3389 59.100.202.46 3389 extendable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list 1 permit 172.16.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The filter works fine if I apply it to int vlan1 as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-group outbound-filter in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;But once applied, the port forwards no longer work unless I add 'permit ip any any' to the 'outbound-filter' ACL which essentially defeats the purpose.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need a separate ACL 'inbound-filter' and 'outbound-filter' any apply them separating to the WAN and vlan interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would appreciate anyone able to offer some guidance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Trent.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413822#M308400</guid>
      <dc:creator>Trent Renshaw</dc:creator>
      <dc:date>2019-03-12T03:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413823#M308404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Trent &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem for the forwards is thre return traffic from your LAN to the internet. So lets say a host on the internet 195.10.166.10 connects to 59.100.202.46 using https (443) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inbound from internet - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src IP 195.10.166.10&amp;nbsp; src port random (lets use 42001)&amp;nbsp; &lt;/P&gt;&lt;P&gt;dst IP 59.100.202.46&amp;nbsp; dst port 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so far so good - nothing is stopping that traffic&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;return to internet - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src IP 59.100.202.46 src port 443 &lt;/P&gt;&lt;P&gt;dst IP 195.10.166.10 dst port 42001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but your acl on vlan 1 will block this traffic. You do have a rule for 443 which says - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but as you can see from the above with the return traffic 443 is the src port and not the dst port so it doesn't match. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simplest solution is to add this to your acl &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp host 172.16.1.12 eq 443 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you would need rules for the other 2 as well ie. ports 25 &amp;amp; 3389. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reflexive acls can take care of some of this for you because if you allow a connection in (or out) a temporary entry is made to allow the traffic back out. But as i understand you do not have an acl applied inbound on the outside interface so unless you did apply you would gain little by using. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One step further from reflexive acls is a firewall. Your router with the right feature set may well be able to run a firewall which again would take care of the return traffic for you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not recommended to have no inbound acl on the outside of your router if this is the only device between you and the internet ie. there is no firewall elsewhere. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the above entries to your acl should at least get you going for now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 14:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413823#M308404</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-22T14:16:02Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413824#M308412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could try to use CBAC to allow the return traffic.&amp;nbsp; The following will track all UDP, TCP and ICMP traffic that enters the interface and allow the return traffic.&amp;nbsp; Your ACL which is assigned to the interface will allow or block the traffic you specify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FILTER tcp&lt;/P&gt;&lt;P&gt;ip inspect name FILTER udp&lt;/P&gt;&lt;P&gt;ip inspect name FILTER icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface &lt;INT number=""&gt;&lt;/INT&gt;&lt;/P&gt;&lt;P&gt;ip access-group outbound-filter in&lt;/P&gt;&lt;P&gt;ip inspect FILTER in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 14:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413824#M308412</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-22T14:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413825#M308415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jon and Marius. You are both correct and I have used both your answers in my solution. CBAC so Skype and other allowed apps can negotiate dynamic ports for file transfers etc. and the addtional permit rules for the port forwards to permit SMTP, https and RDP to the respective hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still be interested to see an answer that illustrates using reflexive access lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much appreciated,&lt;/P&gt;&lt;P&gt;Trent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Nov 2013 00:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413825#M308415</guid>
      <dc:creator>Trent Renshaw</dc:creator>
      <dc:date>2013-11-23T00:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413826#M308418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is an example of how a reflexive ACL would be configured.&amp;nbsp; What it does is to dynamically add an ACL entry to allow returning traffic that is generated from the inside network and exits the interface where the ACL is configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended IN-TO-OUT&lt;/P&gt;&lt;P&gt;permit tcp any any reflect TRAFFIC&lt;/P&gt;&lt;P&gt;permit udp any any refelct TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUT-TO-IN&lt;/P&gt;&lt;P&gt;permit tcp any any eq http&lt;/P&gt;&lt;P&gt;permit tcp any any eq https&lt;/P&gt;&lt;P&gt;evaluate TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gig0/1&lt;/P&gt;&lt;P&gt;description INTERNET FACING INTERFACE&lt;/P&gt;&lt;P&gt;ip add 123.213.221.1 255.255.255.252&lt;/P&gt;&lt;P&gt;access-group IN-TO-OUT out&lt;/P&gt;&lt;P&gt;access-group OUT-TO-IN in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Nov 2013 19:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413826#M308418</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-23T19:55:30Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413827#M308421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I like that solution, looks cleaner than using CBAC. Your example appears to allow any tcp or udp traffic out to the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I want to lock this down to just ICMP, HTTP/S, HTTP/S alternates, FTP, DNS and mail (IMAP/S and POP3/S) and cater for our port forwards from the Internet for SMTP and RDP, would I be correct in making the following changes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended IN-TO-OUT&lt;/P&gt;&lt;P&gt; permit icmp any any reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq ftp-data reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq ftp reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq domain reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit udp any any eq domain reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq www reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq pop3 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 143 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 443 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 993 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 995 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 8080 reflect TRAFFIC&lt;/P&gt;&lt;P&gt; permit tcp any any eq 8443 reflect TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUT-TO-IN&lt;/P&gt;&lt;P&gt; permit tcp host 172.16.1.12 eq 25 any&lt;/P&gt;&lt;P&gt; permit tcp host 172.16.1.16 eq 3389 any&lt;/P&gt;&lt;P&gt; evaluate TRAFFIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Fa4&lt;/P&gt;&lt;P&gt; access-group IN-TO-OUT out&lt;/P&gt;&lt;P&gt; access-group OUT-TO-IN in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Many thanks,&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Trent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 00:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413827#M308421</guid>
      <dc:creator>Trent Renshaw</dc:creator>
      <dc:date>2013-11-27T00:43:34Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS outbound filtering</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413828#M308422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The difference between CBAC and reflective ACL is that CBAC turns the router into a stateful device while the reflective ACL just adds an entry in the inbound ACL for return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command inspect name FILTER TCP doesn't let all TCP through the router (all traffic is permitted through the router by default), it just tells the router to keep track of TCP type traffic.&amp;nbsp; Then you need to create the ACLs which permit the traffic you want with a deny any any at the end of it.&amp;nbsp; Then you can add a deny any any inbound&amp;nbsp; and the router will track the connection states of what leaves and enters the interface.&amp;nbsp; CBAC is a more secure way of allowing return traffic as it keeps track of the ACK and SEQ fields in the packets.&amp;nbsp; This meaning that if a packet is received with a different SEQ number than expected the packet is dropped.&amp;nbsp; This doesn't happen when using a reflexive ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;permit icmp any any reflect TRAFFIC&lt;/PRE&gt;&lt;P&gt;This command is not supported with a reflective ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2013 08:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-outbound-filtering/m-p/2413828#M308422</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-27T08:33:22Z</dc:date>
    </item>
  </channel>
</rss>

