<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPBASE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094321#M393371</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you want to allow the return-traffic for Web-browsing then you need the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;permit tcp any eq 80&amp;nbsp; host PUBLIC-IP established ! for http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;permit tcp any eq 443 host PUBLIC-IP established ! for HTTPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;PUBLIC-IP&lt;/SPAN&gt; is the IP that you use for outgoing NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The better way would be to add the SECURITY-license because then you can activate the IOS-firewall which will give you better security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 Jan 2013 17:21:38 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2013-01-06T17:21:38Z</dc:date>
    <item>
      <title>IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094317#M393366</link>
      <description>&lt;P&gt;HI I have an issue when configuring to allow web browsing. We replaced an 800 router with an 1921.&lt;/P&gt;&lt;P&gt;the 800 works fine, but we have a problem with the 1900 in that we use ACLs to allow web traffic. the acl is set to allow from the outside any ip address. To inside lan subnet. this works fine, but I would like to be more granular. Whe I set it to allow on the previous example, but only for web traffic. I cannot browse. It all stops working. I have logged the acl and it shows me what I expect, in that an outside address on port 80 is being blocked.&lt;/P&gt;&lt;P&gt;The difference between the old router and the new one, is that the old one has advsecurity feature, but the new one is ipbase only.&lt;/P&gt;&lt;P&gt;I didn't think you needed advsec feature set for port based acls?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094317#M393366</guid>
      <dc:creator>cae_technology</dc:creator>
      <dc:date>2019-03-12T00:43:46Z</dc:date>
    </item>
    <item>
      <title>IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094318#M393367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the config. Maybe there is just an simple mistake.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 15:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094318#M393367</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2013-01-06T15:53:47Z</dc:date>
    </item>
    <item>
      <title>IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094319#M393369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ip addresses below are used as an example and are not actual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;desc link to internet&lt;/P&gt;&lt;P&gt; ip address 1.1.1.234 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 101 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.234 eq 22 log&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.235 eq smtp log&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.235 eq www log&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.235 eq 443 log&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.236 eq 443 log&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.236 eq www log&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 1.1.1.232 echo-reply log&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 1.1.1.234 echo-reply log&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 1.1.1.234 time-exceeded log&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any host 86.188.151.234 unreachable log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the local interface is as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;desc lan interface&lt;/P&gt;&lt;P&gt; ip address 10.10.10.10 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 100 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 1.1.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 16:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094319#M393369</guid>
      <dc:creator>cae_technology</dc:creator>
      <dc:date>2013-01-06T16:04:05Z</dc:date>
    </item>
    <item>
      <title>IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094320#M393370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry forgot to say,&lt;/P&gt;&lt;P&gt;I then added&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7 permit ip any any&amp;nbsp; (which worked)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then added 7 permit tcp any 10.10.10.0 0.0.0.255 eq www ( that failed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7 permit tcp any 10.10.10.0 0.0.0.255 eq established ( failed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7 permit tcp any 10.10.10.0 0.0.0.255 eq 80 (failed)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 16:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094320#M393370</guid>
      <dc:creator>cae_technology</dc:creator>
      <dc:date>2013-01-06T16:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094321#M393371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you want to allow the return-traffic for Web-browsing then you need the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;permit tcp any eq 80&amp;nbsp; host PUBLIC-IP established ! for http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;permit tcp any eq 443 host PUBLIC-IP established ! for HTTPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;PUBLIC-IP&lt;/SPAN&gt; is the IP that you use for outgoing NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The better way would be to add the SECURITY-license because then you can activate the IOS-firewall which will give you better security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 17:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094321#M393371</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-01-06T17:21:38Z</dc:date>
    </item>
    <item>
      <title>IPBASE</title>
      <link>https://community.cisco.com/t5/network-security/ipbase/m-p/2094322#M393373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that did it, many thanks. I see I was putting in the lan address rather than the public one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 19:20:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipbase/m-p/2094322#M393373</guid>
      <dc:creator>cae_technology</dc:creator>
      <dc:date>2013-01-06T19:20:26Z</dc:date>
    </item>
  </channel>
</rss>

