<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic port forwarding Cisco 857W + admin page viewable externally in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018010#M400674</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kynan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First lets start with the NAT for the server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.10.10.50 80 interface Dialer0 80&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.10.50 2235 interface Dialer0 2235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then work on the ACL:&lt;/P&gt;&lt;P&gt;ip access-list extended 101&lt;/P&gt;&lt;P&gt;1 permit tcp any host dialer0_ip eq 80&lt;/P&gt;&lt;P&gt;2 permit udp any host dialer0_ip eq 2235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the GUI should not work from the outside world as you are restricting the traffic on the ACL, the Inspect HTTPS is on outbound direction so that should not affect, and there is no ACL for port 443 so the port should be closed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try to access-it from an outside PC and let me know what happens,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 19 Aug 2012 06:34:46 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-08-19T06:34:46Z</dc:date>
    <item>
      <title>port forwarding Cisco 857W + admin page viewable externally</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018009#M400672</link>
      <description>&lt;P&gt;I would like to open UDP port 22335, and TCP port 80 on my local server 10.10.10.50. I've been having a heck of a time getting this to work, as I don't really understand access lists and what is required.. also, for some reason my firewall is open to the outside world on port 443 (you can browse and see the admin access page) I don't recally setting this up!! Can someone help me fix all this? Config is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a million guys!&lt;/P&gt;&lt;P&gt;CiscoMan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the running config of the router: 10.10.10.1&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;!version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname **************&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot system flash c850-advsecurityk9-mz.124-15.T15.bin&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 51200&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret 5 **************&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-2488767310&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-2488767310&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-2488767310&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-2488767310&lt;/P&gt;&lt;P&gt; certificate self-signed 01&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;cert here&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;quit&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dot11 ssid ***********&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; vlan 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication open &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; authentication key-management wpa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; guest-mode&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; wpa-psk ascii 7 ******************&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;no ip dhcp use vrf connected&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.10.10.1 10.10.10.99&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.10.10.201 10.10.10.254&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool ccp-pool1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server *********&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.10.1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM appfw SDM_MEDIUM&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM cuseeme&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM dns&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM ftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM h323&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM https&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM icmp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM imap reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM pop3 reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rcmd&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM realaudio&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rtsp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM esmtp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM sqlnet&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM streamworks&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM tftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM tcp router-traffic&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM udp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM vdolive&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;ip domain name yourdomain.com&lt;/P&gt;&lt;P&gt;ip name-server *******&lt;/P&gt;&lt;P&gt;ip name-server *******&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;appfw policy-name SDM_MEDIUM&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im aol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name login.oscar.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name toc.oscar.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name oam-d09a.blue.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im msn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name messenger.hotmail.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name gateway.messenger.hotmail.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name webmessenger.msn.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im yahoo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scs.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsa.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsb.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsc.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsd.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs16.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs19.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs42.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs53.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs54.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name ads1.vip.scd.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name radio1.launch.vip.dal.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name in1.msg.vip.re2.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name data1.my.vip.sc5.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name address1.pim.vip.mud.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name edit.messenger.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name messenger.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name http.pager.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name privacy.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csa.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csb.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csc.yahoo.com&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username ********* privilege 15 secret 5 ************************&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip tcp synwait-time 10&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface ATM0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip route-cache flow&lt;/P&gt;&lt;P&gt; no atm ilmi-keepalive&lt;/P&gt;&lt;P&gt; dsl operating-mode auto &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface ATM0.1 point-to-point&lt;/P&gt;&lt;P&gt; description $ES_WAN$$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; pvc 0/35 &lt;/P&gt;&lt;P&gt;&amp;nbsp; pppoe-client dial-pool-number 1&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption vlan 1 mode ciphers aes-ccm &lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; broadcast-key vlan 1 change 30&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid ********&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/P&gt;&lt;P&gt; station-role root&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt; bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.1&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 1 native&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt; bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; description $FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address negotiated&lt;/P&gt;&lt;P&gt; ip access-group 101 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip mtu 1452&lt;/P&gt;&lt;P&gt; ip inspect SDM_MEDIUM out&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; ip route-cache flow&lt;/P&gt;&lt;P&gt; dialer pool 1&lt;/P&gt;&lt;P&gt; dialer-group 1&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; ppp authentication pap callin&lt;/P&gt;&lt;P&gt; ppp pap sent-username ******** password 7 ********&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; description $ES_LAN$$FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 100 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; ip route-cache flow&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1412&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 interface Dialer0 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;access-list 1 remark INSIDE_IF=BVI1&lt;/P&gt;&lt;P&gt;access-list 1 remark CCP_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.10.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 remark auto generated by SDM firewall configuration##NO_ACES_3##&lt;/P&gt;&lt;P&gt;access-list 100 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 remark auto generated by SDM firewall configuration##NO_ACES_13##&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.10.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host ******* eq domain any&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host ******** eq domain any&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list 101 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge 1 protocol ieee&lt;/P&gt;&lt;P&gt;bridge 1 route ip&lt;/P&gt;&lt;P&gt;banner login ^CAuthorized access only!&lt;/P&gt;&lt;P&gt; Disconnect IMMEDIATELY if you are not an authorized user!^C&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; no modem enable&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; transport output telnet&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler max-task-time 5000&lt;/P&gt;&lt;P&gt;scheduler allocate 4000 1000&lt;/P&gt;&lt;P&gt;scheduler interval 500&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018009#M400672</guid>
      <dc:creator>Kynan Hynes</dc:creator>
      <dc:date>2019-03-11T23:43:45Z</dc:date>
    </item>
    <item>
      <title>port forwarding Cisco 857W + admin page viewable externally</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018010#M400674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kynan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First lets start with the NAT for the server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.10.10.50 80 interface Dialer0 80&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 10.10.10.50 2235 interface Dialer0 2235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then work on the ACL:&lt;/P&gt;&lt;P&gt;ip access-list extended 101&lt;/P&gt;&lt;P&gt;1 permit tcp any host dialer0_ip eq 80&lt;/P&gt;&lt;P&gt;2 permit udp any host dialer0_ip eq 2235&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the GUI should not work from the outside world as you are restricting the traffic on the ACL, the Inspect HTTPS is on outbound direction so that should not affect, and there is no ACL for port 443 so the port should be closed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try to access-it from an outside PC and let me know what happens,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Aug 2012 06:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018010#M400674</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-19T06:34:46Z</dc:date>
    </item>
    <item>
      <title>port forwarding Cisco 857W + admin page viewable externally</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018011#M400675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;As mentioned by jcarvaja above, you’ll need to enable PAT (Port Address Translation) simply because you’ve a single WAN IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the commands that you should insert;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static tcp 10.10.10.50 80 interface Dialer0 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static udp 10.10.10.50 22335 interface Dialer0 22335&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static udp 10.10.10.50 22336 interface Dialer0 22336&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat inside source static udp 10.10.10.50 30175 interface Dialer0 30175&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat translation timeout 600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat translation tcp-timeout 600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat translation udp-timeout 600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat translation syn-timeout 600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip nat translation icmp-timeout 600&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, the reason as to why your Router’s admin page is widely expose to the Internet cloud is simply because you’ve enabled the http services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the commands that you should insert;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip http server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no ip http secure-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;P/S: if you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; and click on the button THIS QUESTION IS ANSWERED.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Aug 2012 22:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018011#M400675</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-19T22:24:27Z</dc:date>
    </item>
    <item>
      <title>port forwarding Cisco 857W + admin page viewable externally</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018012#M400676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree on your post &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; but the problem is that if they take this out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;no ip http server&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;no ip http secure-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will not be able to access the the SDM from the inside and the requirement is from the outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day bro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 01:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018012#M400676</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-20T01:54:17Z</dc:date>
    </item>
    <item>
      <title>port forwarding Cisco 857W + admin page viewable externally</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018013#M400677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right bro, my bad. I guess with the HTTP vulnerability that exists in most of Cisco IOS equipments, the commands should be inserted, are as shown below;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20000514-ios-http-server"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20000514-ios-http-server&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip http authentication local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip http access-class 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 10 remark ### To allow a single host access to the Router via SDM from LAN ###&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 10 permit host 10.10.10.50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;arp 10.10.10.50 0014.f666.aa88 arpa&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 05:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-857w-admin-page-viewable-externally/m-p/2018013#M400677</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-08-20T05:13:55Z</dc:date>
    </item>
  </channel>
</rss>

