<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS Firewall best practices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968406#M401959</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless Cisco changed it lately what I don't think, then the parameter is needed. Without the parameter, only traffic going through the router was inspected, but not the traffic that was originated by the router. So it is handled pretty much the same as ACLs where outgoing ACLs also don't catch the router-initiated traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Jul 2012 17:02:03 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-07-19T17:02:03Z</dc:date>
    <item>
      <title>IOS Firewall best practices</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968402#M401955</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the best practices when deploying the IOS Firewall feature on routers, especially on the 800 series routers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that a router will never be a true firewall but those features are there to make them simulate...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually what I do is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name IOS_Firewall tcp&lt;/P&gt;&lt;P&gt;ip inspect name IOS_Firewall udp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then I apply this on the Outside firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt; ip inspect IOS_Firewall out&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I've no problems but I was wondering if there is even a better way, which Im sure there is. Like for example, those 2 "inspect" statements will grab all tcp and udp packets, but what about for the other packets that have other protocols?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you in advanced&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968402#M401955</guid>
      <dc:creator>insccisco</dc:creator>
      <dc:date>2019-03-11T23:31:58Z</dc:date>
    </item>
    <item>
      <title>IOS Firewall best practices</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968403#M401956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;The word "best" is very subjective but here's my 2 cents, when deploying IOS Firewall feature on a typical Cisco IOS Routers. This is provided you've the correct IOS FEATURE SET, as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides using the Cisco document as a guide in performing IOS security hardening on your IOS equipment regardless of the Router model as stated in &lt;A href="http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml"&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml&lt;/A&gt; there are other Cisco technologies that you could adopt (with caution, of course!!!) as well as listed below;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Flexible Packet Matching (FPM) or Modular Policy Framework (MPF)&lt;/P&gt;&lt;P&gt;b) Zone-Based Firewall (ZFW)&lt;/P&gt;&lt;P&gt;c) IOS IPS &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I have answered your questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 18:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968403#M401956</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-17T18:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall best practices</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968404#M401957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have a quite simple Firewall-setup (like only two interfaces) it's fine to stay with CBAC (ip inspect). This system probably doesn't have a real future, as all effort on IOS-firewalling is going into ZBF. So don't expect any new fancy features there. But CBAC is still fine in situations where ZBF is just overkill.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For CBAC (as for any Firewall) you must make sure that all your protocols are inspected the right way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only have TCP and UDP, your two staements above are fine. If you use any other protocol it could be needed to add an inspection. The inspections are divided into two classes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Inspections that make your protocol work&lt;/P&gt;&lt;P&gt;2) Inspections that make a protocol more secure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first class would be the inspection for FTP. Without the inspection FTP wont work in every situation because of the dynamic data-channels. In the same class are voip-inspections as SIP, H.323 and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then there are inspections that make your network more secure: I.E. esmtp-inspection. SMTP will work without the inspection, but with the inspection you can limit what a client (or attacker) can talk to your mailserver. Other inspections of this class are IMAP, POP3 and a couple more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A best practice is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- From the first class, only activate the inspections that are really needed for your traffic.&lt;/P&gt;&lt;P&gt;- From the second class, only activate the inspections where you need more control over an application and really understand what the inspection does. Just google for "pix mailguard" and read how many problems an inspection can make if it's used in the wrong way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I typically activate on a simple CBAC-setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW tcp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW udp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW icmp router-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW dns&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip inspect name FW tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The parameter "router-traffic" inspects the traffic that is initiated by the router. So you can do http or dns, ntp etc. from your router to the internet whitout having to allow the return-traffic in your outside-ACL. For this parameter to work it's needed to activate the inspection outgoing on the outside interface the same way you have in your example.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 19:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968404#M401957</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-17T19:26:38Z</dc:date>
    </item>
    <item>
      <title>IOS Firewall best practices</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968405#M401958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the simple approach to these types of questions. And&amp;nbsp; also good to know that Cisco has already ended the CBAC and is only&amp;nbsp; implementing the ZBF. I think I had read something about this before and&amp;nbsp; again very good you brought that up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you said, my current setup is pretty simple. 2&amp;nbsp; interfaces, LAN and WAN, and I just need to make sure that I can make&amp;nbsp; this Cisco 881W that I am currently working with look to be like a&amp;nbsp; firewall as close as possible. I've had too many customers where their&amp;nbsp; IT people had no clue how to deal with these things, specially for&amp;nbsp; applications that have an strange "return" behavior. But again I know&amp;nbsp; that there are more protocols and those questions will come up one day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question&amp;nbsp; though for the syntaxt you have in the "ip inspect" statements. The&amp;nbsp; word "router-traffic" at the end, is that really necessary? You said&amp;nbsp; that this is needed to allow return traffic to the router when the&amp;nbsp; router initiates the connection, but isnt this already allowed by the&amp;nbsp; statements themselves without the "router-traffic" word?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2012 03:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968405#M401958</guid>
      <dc:creator>insccisco</dc:creator>
      <dc:date>2012-07-18T03:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: IOS Firewall best practices</title>
      <link>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968406#M401959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless Cisco changed it lately what I don't think, then the parameter is needed. Without the parameter, only traffic going through the router was inspected, but not the traffic that was originated by the router. So it is handled pretty much the same as ACLs where outgoing ACLs also don't catch the router-initiated traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jul 2012 17:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-firewall-best-practices/m-p/1968406#M401959</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-19T17:02:03Z</dc:date>
    </item>
  </channel>
</rss>

