<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM CBAC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226105#M346354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Frederico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default on a FWSM traffic from the inside to the router will be allowed and statefully inspected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And traffic from lower to higher will be blocked. No need to configure it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Sep 2013 17:35:57 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-09-02T17:35:57Z</dc:date>
    <item>
      <title>FWSM CBAC</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226102#M346349</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With CBAC I can inspect traffic, with FWSM can I configure the same process? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226102#M346349</guid>
      <dc:creator>frede_frede</dc:creator>
      <dc:date>2019-03-12T02:12:42Z</dc:date>
    </item>
    <item>
      <title>FWSM CBAC</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226103#M346351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you can,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FWSM is an stateful firewall and I would say its way more flexible than CBAC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It´s whole purpose is to be stateful so you should go for it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For Networking Posts check my blog at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com/"&gt;http://laguiadelnetworking.com/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jul 2013 17:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226103#M346351</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-07-16T17:01:26Z</dc:date>
    </item>
    <item>
      <title>FWSM CBAC</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226104#M346353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for example, I don't know how to configure a thing like this in the fwsm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# ip access-list extended EXTERNAL-ACL&lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# deny tcp any any log&lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# deny udp any any log&lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# deny icmp any any log&lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# deny ip any any&lt;/P&gt;&lt;P&gt;Router(config)# ip inspect name CBAC-EXAMPLE tcp&lt;/P&gt;&lt;P&gt;Router(config)# ip inspect name CBAC-EXAMPLE udp&lt;/P&gt;&lt;P&gt;Router(config)# ip inspect name CBAC-EXAMPLE icmp&lt;/P&gt;&lt;P&gt;Router(config)# interface ethernet0&lt;/P&gt;&lt;P&gt;Router(config-if)# ip access-group EXTERNAL-ACL in&lt;/P&gt;&lt;P&gt;Router(config-if)# ip inspect CBAC-EXAMPLE out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fred&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 14:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226104#M346353</guid>
      <dc:creator>frede_frede</dc:creator>
      <dc:date>2013-09-02T14:58:48Z</dc:date>
    </item>
    <item>
      <title>FWSM CBAC</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226105#M346354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Frederico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default on a FWSM traffic from the inside to the router will be allowed and statefully inspected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And traffic from lower to higher will be blocked. No need to configure it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking"&gt;http://laguiadelnetworking&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 17:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226105#M346354</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-09-02T17:35:57Z</dc:date>
    </item>
    <item>
      <title>FWSM CBAC</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226106#M346355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA, as Julio has mentioned, is a stateful firewall.&amp;nbsp; Meaning it keeps track of the connection that originate on interfaces that are configured to allow such connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;initially this is enabled through the use of security-levels. Interfaces configured with higher security-levels are allowed to initiate traffic to interfaces with lower security levels.&amp;nbsp; These connection are then placed in a state table which is then inspected when the return traffic reaches the ASA.&amp;nbsp; If the ASA finds a match in the state table for the return traffic the traffic is permited, otherwise it is dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you configure an ACL on the interface then the security-level no longer has any meaning (until you remove all ACLs on the interface).&amp;nbsp; Then traffic is permitted based on the configured ACL.&amp;nbsp; All traffic that is permitted by the ACL is placed in the state table which is agian checked and permitted for the return traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Sep 2013 10:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-cbac/m-p/2226106#M346355</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-09-03T10:18:19Z</dc:date>
    </item>
  </channel>
</rss>

