<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about capability of 2921 running 15.0(1)M5 with security and ipbase in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079288#M395923</link>
    <description>&lt;P&gt;I have a 2921 acting as the HUB of a DMVPN deployment.&amp;nbsp; I would like to apply an inbound acl to the tunnel interface to only allow the minimum ports necessary for the remote sites to communicate back to the data center.&amp;nbsp; This includes Active Directory traffic.&amp;nbsp; I'm very green with security, especially on this 2921.&amp;nbsp; I've done limited research on getting AD traffic through a firewall and my understanding of this is that the host communicates with the AD controller over a well-known port (mapper service) which then instructs the client to use a randomly generated port in a very large range for future communication with the AD controller.&amp;nbsp; This would then mean that the 2921 would need to be able to inspect this first traffic flow and then dynamically open up just the minimum&amp;nbsp; port(s) required to allow the host to talk to the AD controller.&amp;nbsp; Is my 2921 with the version/feature set its running capable of doing this?&amp;nbsp; If not, can it be made capable to do this with additional hw and/or licensing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steven&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:20:08 GMT</pubDate>
    <dc:creator>sdavids5670</dc:creator>
    <dc:date>2019-03-12T00:20:08Z</dc:date>
    <item>
      <title>Question about capability of 2921 running 15.0(1)M5 with security and ipbase</title>
      <link>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079288#M395923</link>
      <description>&lt;P&gt;I have a 2921 acting as the HUB of a DMVPN deployment.&amp;nbsp; I would like to apply an inbound acl to the tunnel interface to only allow the minimum ports necessary for the remote sites to communicate back to the data center.&amp;nbsp; This includes Active Directory traffic.&amp;nbsp; I'm very green with security, especially on this 2921.&amp;nbsp; I've done limited research on getting AD traffic through a firewall and my understanding of this is that the host communicates with the AD controller over a well-known port (mapper service) which then instructs the client to use a randomly generated port in a very large range for future communication with the AD controller.&amp;nbsp; This would then mean that the 2921 would need to be able to inspect this first traffic flow and then dynamically open up just the minimum&amp;nbsp; port(s) required to allow the host to talk to the AD controller.&amp;nbsp; Is my 2921 with the version/feature set its running capable of doing this?&amp;nbsp; If not, can it be made capable to do this with additional hw and/or licensing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steven&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079288#M395923</guid>
      <dc:creator>sdavids5670</dc:creator>
      <dc:date>2019-03-12T00:20:08Z</dc:date>
    </item>
    <item>
      <title>Question about capability of 2921 running 15.0(1)M5 with securit</title>
      <link>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079289#M395924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mean to be able to inpect trafffic and open the required pinholes?&lt;/P&gt;&lt;P&gt;It is, you can run the ZBFW in this box with not a problem at all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2012 21:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079289#M395924</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-07T21:08:17Z</dc:date>
    </item>
    <item>
      <title>Question about capability of 2921 running 15.0(1)M5 with securit</title>
      <link>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079290#M395927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I've been playing around with the "ip inspect" command and I've got things working partially.&amp;nbsp; There's a large list of well-known protocols available with the ip inspect command.&amp;nbsp; However, I cannot find the one for endpoint mapper (tcp/135).&amp;nbsp; How do I define endpoint mapper in an ip inspect profile?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 18:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079290#M395927</guid>
      <dc:creator>sdavids5670</dc:creator>
      <dc:date>2012-11-08T18:56:40Z</dc:date>
    </item>
    <item>
      <title>Question about capability of 2921 running 15.0(1)M5 with securit</title>
      <link>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079291#M395930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So running CBAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how to create a port-map definition to inspect traffic:&lt;/P&gt;&lt;P&gt;The example will use RDP:&lt;/P&gt;&lt;P&gt;ip port-map user-rdp3389 port tcp 3389&lt;/P&gt;&lt;P&gt;Then you could match the traffic and inspected!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case just use tcp 135&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 21:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-capability-of-2921-running-15-0-1-m5-with/m-p/2079291#M395930</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-08T21:29:23Z</dc:date>
    </item>
  </channel>
</rss>

