<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IOS Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200848#M361268</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it turns out I have a router with a security bundle enabled.&lt;/P&gt;&lt;P&gt;I'm trying to read up on this but the amount of information on the internet is becoming somewhat overwhelming.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The running config of the router looks fairly simple, with a number of standard and extended access lists and some natting rules, and pptp vpn configs..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone advise what exactly I'm able to do with this security bundle, and what it's lacking when comparing it with having an actual ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm just studying for a CCNA so my knowledge is very limited, but by the looks of things there's nothing in the router really that's configured that I wouldn't be able to do with the base config.&lt;/P&gt;&lt;P&gt;Are there any rules set up on the router that wouldn't show in the running config, but run in the background of the IOS in relation to the security bundle, or does everything need to be specified in order to be enabled? (that sounded like a really ridiculous question..)&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:06:23 GMT</pubDate>
    <dc:creator>allitnils</dc:creator>
    <dc:date>2019-03-12T01:06:23Z</dc:date>
    <item>
      <title>IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200848#M361268</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it turns out I have a router with a security bundle enabled.&lt;/P&gt;&lt;P&gt;I'm trying to read up on this but the amount of information on the internet is becoming somewhat overwhelming.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The running config of the router looks fairly simple, with a number of standard and extended access lists and some natting rules, and pptp vpn configs..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone advise what exactly I'm able to do with this security bundle, and what it's lacking when comparing it with having an actual ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm just studying for a CCNA so my knowledge is very limited, but by the looks of things there's nothing in the router really that's configured that I wouldn't be able to do with the base config.&lt;/P&gt;&lt;P&gt;Are there any rules set up on the router that wouldn't show in the running config, but run in the background of the IOS in relation to the security bundle, or does everything need to be specified in order to be enabled? (that sounded like a really ridiculous question..)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200848#M361268</guid>
      <dc:creator>allitnils</dc:creator>
      <dc:date>2019-03-12T01:06:23Z</dc:date>
    </item>
    <item>
      <title>IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200849#M361270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you can do on the router depends of its version, the hardware and the type of security bundle you have on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routers can perform as security devices and can do incredible stuff, SOMETIMES are better than an ASA.&lt;/P&gt;&lt;P&gt;The only difference between them i would say, is that the ASA is a dedicated security device, routers aren't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's what you want to configure on your unit?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 05:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200849#M361270</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-27T05:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200850#M361272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, thanks for your reply..&lt;/P&gt;&lt;P&gt;I guess I'm trying to figure out whether we're actually using the security bundle of our router and whether it's actually acting as a firewall, or if it's acting as a router that has firewall capabilities......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;running ver looks like this:&lt;/P&gt;&lt;P&gt;. I just had a look at show ver and it looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;License Info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;License UDI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------&lt;/P&gt;&lt;P&gt;Device#&amp;nbsp;&amp;nbsp; PID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SN&lt;/P&gt;&lt;P&gt;-------------------------------------------------&lt;/P&gt;&lt;P&gt;*0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CISCO1921/K9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FGL164526CA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Technology Package License Information for Module:'c1900'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Technology&amp;nbsp;&amp;nbsp;&amp;nbsp; Technology-package&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Technology-package&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Current&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Next reboot&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ipbase&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipbasek9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permanent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipbasek9&lt;/P&gt;&lt;P&gt;security&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; securityk9&amp;nbsp;&amp;nbsp;&amp;nbsp; Permanent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; securityk9&lt;/P&gt;&lt;P&gt;data&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration register is 0x2102&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- See more at: &lt;/SPAN&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3867757#3867757" rel="nofollow"&gt;https://supportforums.cisco.com/message/3867757#3867757&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the running configuration as follows:&lt;/P&gt;&lt;P&gt;Current configuration : 8364 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Last configuration change at 04:17:05 UTC Thu Feb 21 2013 by mmenga&lt;/P&gt;&lt;P&gt;version 15.1&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname vicst-srcenter&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot system flash c1900-universalk9-mz.SPA.151-4.M4.bin&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication ppp default group radius local&lt;/P&gt;&lt;P&gt;aaa authorization network default if-authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;ip source-route&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip flow-cache timeout active 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;async-bootp dns-server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;async-bootp nbns-server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;vpdn enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;vpdn-group PPTP_WIN2KClient&lt;/P&gt;&lt;P&gt;! Default PPTP VPDN group&lt;/P&gt;&lt;P&gt;accept-dialin&lt;/P&gt;&lt;P&gt;&amp;nbsp; protocol pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; virtual-template 1&lt;/P&gt;&lt;P&gt;l2tp tunnel timeout no-session 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki token default removal timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;license udi pid CISCO1921/K9 sn FGL123456CA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username name privilege 15 password 7 xxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description WAN&lt;/P&gt;&lt;P&gt;ip address xxx.xxx.xxx.xxx x.x.x.x&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description LAN&lt;/P&gt;&lt;P&gt;ip address&lt;/P&gt;&lt;P&gt;xxx.xxx.xxx.xxx x.x.x.x&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Virtual-Template1&lt;/P&gt;&lt;P&gt;description PPTP_VPN&lt;/P&gt;&lt;P&gt;ip unnumbered GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt;peer default ip address pool DIAL-IN&lt;/P&gt;&lt;P&gt;compress mppc&lt;/P&gt;&lt;P&gt;ppp encrypt mppe auto passive&lt;/P&gt;&lt;P&gt;ppp authentication ms-chap ms-chap-v2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool DIAL-IN 192.168.1.10 192.168.1.20&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;ip flow-export source GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;ip flow-export version 5&lt;/P&gt;&lt;P&gt;ip flow-export destination 192.168.1.23 9999&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;then there's a whole bunch of extended/standard access lists, some configuration for line vty and console....&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.205 21 211.xx.xx.xx 21 extendable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;scheduler allocate 20000 1000&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 05:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200850#M361272</guid>
      <dc:creator>allitnils</dc:creator>
      <dc:date>2013-02-27T05:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200851#M361274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yeah, forgot to answer that question the first time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you get your router it will work as a router, period.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want it to go beyond its routing functions you have to manually configure it to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So no, your router doesn't have any firewall or IPS features configured in it.&lt;/P&gt;&lt;P&gt; It just a router with a basic router config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 05:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200851#M361274</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-27T05:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200852#M361276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Is this based on my configuration or you mean router configs in general?&lt;/P&gt;&lt;P&gt;I'm trying to work out whether I am specifically covered based on the configs above, being that I have the security package. &lt;/P&gt;&lt;P&gt;From what I can see thee are no firewall specific commands so I'm just confused. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 06:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200852#M361276</guid>
      <dc:creator>allitnils</dc:creator>
      <dc:date>2013-02-27T06:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200853#M361277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your configuration has no firewall configuration. It was mentioned in the previous post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 06:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall/m-p/2200853#M361277</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-02-27T06:24:08Z</dc:date>
    </item>
  </channel>
</rss>

