<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO Advanced Firewall on 2911 router using CCP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119863#M393603</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Obaid,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would encourage you to configure this on the long but GOOD way &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; using the CLI..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know CCP is faster witch is good but the thing is that it could be way more restrictive than you want and you want to use the approach they want while if you do it manually you could do it however you want,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can definetly help you setting this up via CLI &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 30 Dec 2012 22:39:26 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-12-30T22:39:26Z</dc:date>
    <item>
      <title>CISCO Advanced Firewall on 2911 router using CCP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119861#M393600</link>
      <description>&lt;P&gt;Guys I am using a cisco 2911 router with three interfaces: Gi0/0&amp;nbsp; connected through a switch to all my servers and Gi0/2 which will&amp;nbsp; connect to another server, and Gi0/1 is my outside interface connecting&amp;nbsp; through a switch to two ISP's.&lt;/P&gt;&lt;P&gt; I have webservers and Terminal servers/File&amp;nbsp; Servers with 10.0.0.0 network address connected throught My Gi0/0 interface.&lt;/P&gt;&lt;P&gt; Now I want to implement a Cisco Advanced firewall for security on my&amp;nbsp; router using CCP.I want the firewall to work such that it allows&amp;nbsp; external users to access the servers on Gi0/0 through ports&amp;nbsp; 80,23,25,20,21,53, 110,3389. and to access the SIP server on Gi0/2. My&amp;nbsp; issue is do I put both Gi0/0 and Gi0/2 in the inside zone or do i have to just create two DMZ's for both interface Gi0/0 and Gi0/2&amp;nbsp; without creating an inside zone and Gi0/1 as outside zone as my internal&amp;nbsp; traffic is mostly server based and the users connect remotely through&amp;nbsp; terminal server to access resourcess using RDP, secondly how do I open&amp;nbsp; the relevant ports.I have checked alot and all I have seen is just basic&amp;nbsp; process on using the wizard I have no idea how to go about this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Would appreciate some assistance on this. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119861#M393600</guid>
      <dc:creator>orahman99</dc:creator>
      <dc:date>2019-03-12T00:41:59Z</dc:date>
    </item>
    <item>
      <title>CISCO Advanced Firewall on 2911 router using CCP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119862#M393601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would put G0/0 and G0/2 in two different zones because it sounds like they have no reason to be in the same, it's always safer to have more zones and to be able to control what traffic is permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the seconds problem I'm may not be the best person to ask because I've never used CCP, I only know how to do this through th CLI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 17:10:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119862#M393601</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2012-12-30T17:10:38Z</dc:date>
    </item>
    <item>
      <title>CISCO Advanced Firewall on 2911 router using CCP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119863#M393603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Obaid,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would encourage you to configure this on the long but GOOD way &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; using the CLI..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know CCP is faster witch is good but the thing is that it could be way more restrictive than you want and you want to use the approach they want while if you do it manually you could do it however you want,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can definetly help you setting this up via CLI &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Dec 2012 22:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119863#M393603</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-30T22:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO Advanced Firewall on 2911 router using CCP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119864#M393604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did some research on&amp;nbsp; ZBFand came up with the following configuration on my router for Outside users to be able to access my inside network resources through the opened ports.&amp;nbsp; would apreciate if someone could look at it and see if it is ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Zone security out-zone&lt;BR /&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi0/1&lt;BR /&gt;Zone-member security out-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi0/0&lt;BR /&gt;zone-member security in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gi0/2&lt;BR /&gt;zone-member security in-zone&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security OUT-IN source out-zone destination in-zone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended OUTSIDE-TO-INSIDE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;permit tcp any host 10.0.0.50 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 110&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.50 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 53&lt;/P&gt;&lt;P&gt; permit udp any host 10.0.0.52 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 110&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.52 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 53&lt;/P&gt;&lt;P&gt; permit udp any host 10.0.0.23 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 110&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.23 eq 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 53&lt;/P&gt;&lt;P&gt; permit udp any host 10.0.0.59 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 110&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.59 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 53&lt;/P&gt;&lt;P&gt; permit udp any host 10.0.0.61 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 110&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.61 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 20:21&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 25&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 53&lt;/P&gt;&lt;P&gt; permit udp any host 10.0.0.228 eq 53&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 110&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 143&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 443&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.228 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.58 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.33 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.25 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.44 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.251 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.21 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.22 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.24 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.16 eq 80&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.30 eq www&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.30 eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any host 10.0.0.230 eq 3389&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;permit tcp any 10.0.3.254 0.0.0.0 eq www&lt;BR /&gt;permit tcp any 10.0.3.254 0.0.0.0 eq 3389&lt;BR /&gt;permit tcp any 10.0.3.254 0.0.0.0 eq 5060&lt;BR /&gt;permit tcp any 10.0.3.254 0.0.0.0 eq 5061&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all OUTSIDE-INSIDE-CLASS&lt;BR /&gt;match access-group name inside OUTSIDE-TO-INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect OUTSIDE-TO-INSIDE-POLICY&lt;BR /&gt;class-type inspect OUTSIDE-T0-INSIDE-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;zone-pair security OUT-IN source out-zone destination in-zone&lt;BR /&gt;service-policy type inspect OUTSIDE-TO-INSIDE-POLICY&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Dec 2012 03:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-advanced-firewall-on-2911-router-using-ccp/m-p/2119864#M393604</guid>
      <dc:creator>orahman99</dc:creator>
      <dc:date>2012-12-31T03:30:37Z</dc:date>
    </item>
  </channel>
</rss>

