<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: deny all traffic to 53 from outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033913#M398094</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;karsten, I've applied your settings.. it works like charm! &lt;span class="lia-unicode-emoji" title=":grinning_squinting_face:"&gt;😆&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyway in ACL list i had to use my static outside IP.. and not the internal NAT one &lt;span class="lia-unicode-emoji" title=":grinning_squinting_face:"&gt;😆&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've deleted nat forwarding of port 53 to dummy address... now when I do portscan from outside.. 53 seems closed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is config:&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET-IN&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 22&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 80&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 443&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;MY_STATIC_OUTSIDE_IP&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 07 Oct 2012 00:06:23 GMT</pubDate>
    <dc:creator>ilukeberry</dc:creator>
    <dc:date>2012-10-07T00:06:23Z</dc:date>
    <item>
      <title>deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033905#M398086</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've setup Cisco router's DNS server... via "ip dns server" which in need for inside use.. however now if I do portscan from outside it shows port 53 opened. How do I block all traffic to that 53 port from outside since i need this DNS only inside my NAT/Overload network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using 1900 series.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033905#M398086</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2019-03-12T00:05:00Z</dc:date>
    </item>
    <item>
      <title>deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033906#M398087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Luka,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have an ACL on the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could add one &lt;/P&gt;&lt;P&gt;ip access-list extended outside_in &lt;/P&gt;&lt;P&gt;deny udp any any eq 53&lt;/P&gt;&lt;P&gt;permit ip any any ( if this is what you have right now)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fast 0/0 ( interface connecting to internet)&lt;/P&gt;&lt;P&gt;ip access-group outside_in in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of our answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 17:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033906#M398087</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-05T17:07:35Z</dc:date>
    </item>
    <item>
      <title>deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033907#M398088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If that system is connected to the internet, you should activate at least the IOS-Firewall (SEC-License needed) to control the traffic that flows to your network. With that by default all ports are closed and only return-traffic can enter your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 17:46:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033907#M398088</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-05T17:46:23Z</dc:date>
    </item>
    <item>
      <title>deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033908#M398089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by default with ZBF traffic destined to self-zone or coming from self-zone is permitted so he'll have to configure a policy for traffic coming to self-zone from outside zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 20:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033908#M398089</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-10-05T20:54:26Z</dc:date>
    </item>
    <item>
      <title>deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033909#M398090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wouldn't reccomend ZBF in that case because it's too complicated. CBAC would be more then enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 21:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033909#M398090</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-05T21:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033910#M398091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my current running config.&lt;/P&gt;&lt;P&gt;What do you suggest to do.. for now i've forwarded 53 port to dummy IP address.&lt;/P&gt;&lt;P&gt;I have SEC license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Technology Package License Information for Module:'c1900'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Technology&amp;nbsp;&amp;nbsp;&amp;nbsp; Technology-package&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Technology-package&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Current&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Next reboot&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ipbase&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipbasek9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permanent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ipbasek9&lt;/P&gt;&lt;P&gt;security&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; securityk9&amp;nbsp;&amp;nbsp;&amp;nbsp; Permanent&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; securityk9&lt;/P&gt;&lt;P&gt;data&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; None&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Last configuration change at 23:47:03 CEST Fri Oct 5 2012 by admin&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 23:47:04 CEST Fri Oct 5 2012 by admin&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 23:47:04 CEST Fri Oct 5 2012 by admin&lt;/P&gt;&lt;P&gt;version 15.1&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname r0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot system flash:c1900-universalk9-mz.spa.151-4.m5.bin&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 4 g0rpmgGc.WRIwoCfStjriwwUU8l80hSfH.a65o75m0g&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;clock timezone CET 1 0&lt;/P&gt;&lt;P&gt;clock summer-time CEST recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip gratuitous-arps&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.10.1 192.168.10.100&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.10.254&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool vlan10&lt;/P&gt;&lt;P&gt; network 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; dns-server 192.168.10.1&lt;/P&gt;&lt;P&gt; default-router 192.168.10.1&lt;/P&gt;&lt;P&gt; lease 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;ip host &lt;A href="https://community.cisco.com/www.mydomain.net" target="_blank"&gt;www.mydomain.net&lt;/A&gt; 192.168.20.2&lt;/P&gt;&lt;P&gt;ip name-server 84.255.209.79&lt;/P&gt;&lt;P&gt;ip name-server 84.255.210.79&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki token default removal timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;license udi pid CISCO1921/K9 sn FCZ1606C28X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin secret 4 g0rpmgGc.WRIwoCfStjriwwUU8l80hSfH.a65o75m0g&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;redundancy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Embedded-Service-Engine0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; ip address &lt;OUTSIDE ip=""&gt; 255.255.0.0&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.10&lt;/P&gt;&lt;P&gt; description HOME VLAN&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 10&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.20&lt;/P&gt;&lt;P&gt; description SERVERS VLAN&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 20&lt;/P&gt;&lt;P&gt; ip address 192.168.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.30&lt;/P&gt;&lt;P&gt; description VM VLAN&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 30&lt;/P&gt;&lt;P&gt; ip address 192.168.30.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.40&lt;/P&gt;&lt;P&gt; description MANAGEMENT VLAN&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 40&lt;/P&gt;&lt;P&gt; ip address 192.168.40.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dns server&lt;/P&gt;&lt;P&gt;ip nat inside source list 100 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.20.2 22 &lt;OUTSIDE ip=""&gt; 22 extendable&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 1.1.1.1 53 &lt;OUTSIDE ip=""&gt; 53 extendable&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.20.2 80 &lt;OUTSIDE ip=""&gt; 80 extendable&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.20.2 443 &lt;OUTSIDE ip=""&gt; 443 extendable&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 &lt;GATEWAY&gt;&lt;/GATEWAY&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.20.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.30.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.40.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt;line 2&lt;/P&gt;&lt;P&gt; no activation-character&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt; transport preferred none&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt; transport output pad telnet rlogin lapb-ta mop udptn v120 ssh&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler allocate 20000 1000&lt;/P&gt;&lt;P&gt;ntp server 193.2.1.117&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 12:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033910#M398091</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-06T12:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033911#M398092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It all starts with the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="border-collapse: collapse; list-style: none; padding: 0px 0px 3px; overflow-x: auto; overflow-y: hidden; position: relative; min-height: 45px; width: 597px;"&gt;&lt;DIV style="border-collapse: collapse; list-style: none; margin: 0px 0px 20px; padding: 2px; overflow: visible; position: relative; zoom: 1; width: 591px;"&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW tcp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW udp router-trtaffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW icmp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip access-list extended INTERNET-IN&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;int gig 0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; descr Connection to internet&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip access-group INTERNET-IN in&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style: none;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip inspect FW out&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that the typical internet-traffic will work; only answers to your own traffic will flow back to your router or your network.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 13:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033911#M398092</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-06T13:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033912#M398093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do i incorporate that into my config i need 22, 80 and 443 forwarded to 192.168.20.2 ? i mean opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i do:&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET-IN&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.20.2 eq 22&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.20.2 eq 80&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.20.2 eq 443&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that make those ports open from outside to server on inside which has IP 192.168.20.2?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2012 15:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033912#M398093</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-06T15:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033913#M398094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;karsten, I've applied your settings.. it works like charm! &lt;span class="lia-unicode-emoji" title=":grinning_squinting_face:"&gt;😆&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyway in ACL list i had to use my static outside IP.. and not the internal NAT one &lt;span class="lia-unicode-emoji" title=":grinning_squinting_face:"&gt;😆&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've deleted nat forwarding of port 53 to dummy address... now when I do portscan from outside.. 53 seems closed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is config:&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET-IN&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 22&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 80&lt;/P&gt;&lt;P&gt;permit tcp any host MY_STATIC_OUTSIDE_IP eq 443&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;MY_STATIC_OUTSIDE_IP&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2012 00:06:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033913#M398094</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-07T00:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033914#M398095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;anyway in ACL list i had to use my static outside IP.. and not the internal NAT one&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, that's caused by the order of operation in IOS:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/tech/tk648/tk361/technologies_tech_note09186a0080133ddd.shtml"&gt;http://www.cisco.com/en/US/partner/tech/tk648/tk361/technologies_tech_note09186a0080133ddd.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the packet enters the router, then the ACL is inspected before the NAT is done on the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have fun with your new firewall ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Oct 2012 07:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033914#M398095</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-07T07:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033915#M398096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have another question.. now i've added to inspect incoming http, https, ssh traffic... but i'm not really sure do i get any benefit of doing so? Is it worth it? &lt;span class="lia-unicode-emoji" title=":grinning_squinting_face:"&gt;😆&lt;/span&gt; Below is the current running config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip inspect name CBAC-OUT tcp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip inspect name CBAC-OUT udp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip inspect name CBAC-OUT icmp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip inspect name CBAC-OUT ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #ff0000;"&gt;ip inspect name CBAC-IN http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #ff0000;"&gt;ip inspect name CBAC-IN https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #ff0000;"&gt;ip inspect name CBAC-IN ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; !&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip address &lt;OUTSIDE_IP&gt; 255.255.0.0&lt;/OUTSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip access-group INBOUND in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; no ip redirects&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; no ip unreachables&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; no ip proxy-arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip nat outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #ff0000;"&gt; ip inspect CBAC-IN in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip inspect CBAC-OUT out&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip virtual-reassembly in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; duplex auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; speed auto&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip access-list extended INBOUND&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; permit tcp any host &lt;OUTSIDE_IP&gt; eq 22&lt;/OUTSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; permit tcp any host &lt;OUTSIDE_IP&gt; eq www&lt;/OUTSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; permit tcp any host &lt;OUTSIDE_IP&gt; eq 443&lt;/OUTSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 06:51:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033915#M398096</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-12T06:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033916#M398097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two reasons for activating the inspections:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Make the traffic work. Thats the case for FTP or other multi-channel protocols. The router must look into the traffic to find the ports on which the data-channel will be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Apply an extra protection for the traffic. Thats the caes with http, pop3, imap,&amp;nbsp; and so on. These are only needed if you want to filter your traffic based on upper-layer information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if your traffic works, you don't need any more inspections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 10:37:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033916#M398097</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-12T10:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033917#M398098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So basically I'm not gaining anything by inspecting incoming traffic to my HTTPS server? &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 10:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033917#M398098</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-12T10:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033918#M398099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not with https, but if you look at http, you could attach a L7-policy where you restrict your traffic based on HTTP-Headers. You could for example only allow specific methods, deny the sessions from IE6 or search for keywords in the HTTP-payload.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 11:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033918#M398099</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-12T11:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033919#M398100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for clarifying things up.. i've removed that inbound inspection rules marked with red. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 12:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033919#M398100</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-12T12:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033920#M398101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But if you plan to give internet-users access to an internal FTP-server in the future, then you also need the FTP-inspection in the inbound direction. But for that you could use the same rule as for your outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 12:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033920#M398101</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-12T12:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033921#M398102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding port 21 to ACL INBOUND and nat forwarding wouldn't be enough?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;ip nat inside source static tcp 192.168.20.2 21 &lt;OUTSIDE ip=""&gt; 21 extendable&lt;/OUTSIDE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;permit tcp any host &lt;OUTSIDE_IP&gt; eq 21&lt;/OUTSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 13:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033921#M398102</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-12T13:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033922#M398103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No it would only be enough for the FTP-control-channel. But if the client wants to do passive FTP, the server tells the client on which dynamic port these data is available. And because this session is initiated from the outside to the inside, the FTP-inspection has to be also done in the same direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 19:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033922#M398103</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-10-12T19:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: deny all traffic to 53 from outside</title>
      <link>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033923#M398104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay i get it.. Thanks for helping out! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Oct 2012 12:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-all-traffic-to-53-from-outside/m-p/2033923#M398104</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2012-10-14T12:59:26Z</dc:date>
    </item>
  </channel>
</rss>

