<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic inside to outside access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357592#M308943</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio&lt;/P&gt;&lt;P&gt;Did you see this question I also asked?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing I want to do is to deny the inside network 192.168.223.0 to access any other addr except the vendor addr of&amp;nbsp; 208.40.10.149. What is the proper acl to do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Nov 2013 14:31:42 GMT</pubDate>
    <dc:creator>john.wright</dc:creator>
    <dc:date>2013-11-15T14:31:42Z</dc:date>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357584#M308931</link>
      <description>&lt;P&gt;We have a site that requires access to a single outside address.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;No access is required outside to inside.&lt;/P&gt;&lt;P&gt;This inside does require certain ports to accessed whcih are listed configed in the attached config.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;We are unable to access the vendor at the 94.94.94.3 on any port.&lt;/P&gt;&lt;P&gt;Do we need to code an acl to allow the ports to be accessed both ways as shown in this object-group service rfguns_tcp tcp?&lt;/P&gt;&lt;P&gt;All of the devices are on the 192.168.223.0 network&lt;/P&gt;&lt;P&gt;If an acl is needed what would it be?&lt;/P&gt;&lt;P&gt;Any help appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357584#M308931</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2019-03-12T03:05:08Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357585#M308934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; woops, sent wrong attachment. this is the actual config. the vendor IP is not the 94.94.94.3. it as as reflected in the config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 20:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357585#M308934</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-11-14T20:09:33Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357586#M308935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please point out what is the source interface and what is the IP address that you are testing from so I can give you an example packet-tracer and simulate traffic. &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 21:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357586#M308935</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-14T21:03:13Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357587#M308938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the vendor IP is&amp;nbsp; 208.40.10.149????? RIght?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the case.then you are allowing this traffic to it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service rfguns_tcp tcp &lt;/P&gt;&lt;P&gt; description allow mprodigy access to rf guns &lt;/P&gt;&lt;P&gt; port-object eq 9001 &lt;/P&gt;&lt;P&gt; port-object eq 9004 &lt;/P&gt;&lt;P&gt; port-object eq 9008 &lt;/P&gt;&lt;P&gt; port-object eq 9009 &lt;/P&gt;&lt;P&gt; port-object eq www &lt;/P&gt;&lt;P&gt; port-object eq https &lt;/P&gt;&lt;P&gt;object-group service rfguns_udp udp &lt;/P&gt;&lt;P&gt; description allowmprodigy access ti rf guns &lt;/P&gt;&lt;P&gt; port-object eq 9002&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route inside 0.0.0.0 255.255.255.0 192.168.223.254 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On which port are you connecting, from which IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 22:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357587#M308938</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-14T22:33:33Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357588#M308939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you much for responding. &lt;/P&gt;&lt;P&gt;Yes the vendor is 208.40.10.149.&lt;/P&gt;&lt;P&gt;All the inside addr range 192.168.223.0 needs to be able to access on the tcp ports listed in &lt;/P&gt;&lt;P&gt;object-group service rfguns_tcp tcp &lt;/P&gt;&lt;P&gt;and the one udp port in the config. rfguns_udp udp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 12:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357588#M308939</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-11-15T12:08:04Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357589#M308940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jumora&lt;/P&gt;&lt;P&gt;The inside is 192.168.223.0, the outside addr is 12.163.226.3 and the vendor addr we are trying to access on all the ports is 208.40.10.149.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 12:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357589#M308940</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-11-15T12:11:14Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357590#M308941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio&lt;/P&gt;&lt;P&gt;One other thing I want to do is to deny the inside network 192.168.223.0 to access any other addr except the vendor addr of&amp;nbsp; 208.40.10.149. What is the proper acl to do that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI&lt;/P&gt;&lt;P&gt;Removing the route is what made this work and making sure the gateway which is the inside addr of the FW was present in the IP config.&lt;/P&gt;&lt;P&gt;I will rate it.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 13:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357590#M308941</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-11-15T13:22:57Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357591#M308942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to know I could help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 13:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357591#M308942</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-15T13:39:55Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357592#M308943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio&lt;/P&gt;&lt;P&gt;Did you see this question I also asked?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One other thing I want to do is to deny the inside network 192.168.223.0 to access any other addr except the vendor addr of&amp;nbsp; 208.40.10.149. What is the proper acl to do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 14:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357592#M308943</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-11-15T14:31:42Z</dc:date>
    </item>
    <item>
      <title>inside to outside access</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357593#M308944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are already doing it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WIth the configuration you have you are allowing traffic to only that IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Nov 2013 14:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-access/m-p/2357593#M308944</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-15T14:41:50Z</dc:date>
    </item>
  </channel>
</rss>

