<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block all inbound, allow outbound? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924579#M437629</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice that worked well... Any reason I wouldn't do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW ip&lt;/P&gt;&lt;P&gt;access-list 101 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int Fa0/0&lt;/P&gt;&lt;P&gt;  ip inspect FW out&lt;/P&gt;&lt;P&gt;  ip access-group 101 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just curious. Thanks so much for your help, didn't know about that inspect function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 06 May 2012 05:10:43 GMT</pubDate>
    <dc:creator>mattlager</dc:creator>
    <dc:date>2012-05-06T05:10:43Z</dc:date>
    <item>
      <title>Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924576#M437626</link>
      <description>&lt;P&gt;I've got a simple NAT router. Fa0/0 is outside and Fa0/1 is inside. Inside network is 172.16.1.0/24. Outside network is a single dynamic public IP assigned from the ISP. I'm trying to implement a "Deny by Default" rule set that denies all inbound traffic but allows all outbound traffic, but I can't seem to figure it out. I thought doing something like the following would work but it disables the Internet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp any any&lt;/P&gt;&lt;P&gt;access-list 101 deny up any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then apply it as "in" on Fa0/0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice would be great!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924576#M437626</guid>
      <dc:creator>mattlager</dc:creator>
      <dc:date>2019-03-11T23:02:46Z</dc:date>
    </item>
    <item>
      <title>Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924577#M437627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not going to work. Basically replies are also tcp packets that are going to be potentially be denied by this rule. How to overcome this issue? Make it stateful, meaning, established sessions from the inside, their return packets are going to be allowed, however, sessions that were not initiated on the inside network rather than being accessed from the outside, they are going to be denied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp &lt;/P&gt;&lt;P&gt;ip inspect name FW udp &lt;/P&gt;&lt;P&gt;ip inspect name FW icmp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa 0/0&lt;/P&gt;&lt;P&gt; ip inspect FW out &lt;/P&gt;&lt;P&gt; ip access-group 101 in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 04:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924577#M437627</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-06T04:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924578#M437628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow awesome that makes sense... I'll go give it a shot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924578#M437628</guid>
      <dc:creator>mattlager</dc:creator>
      <dc:date>2012-05-06T05:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924579#M437629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice that worked well... Any reason I wouldn't do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW ip&lt;/P&gt;&lt;P&gt;access-list 101 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int Fa0/0&lt;/P&gt;&lt;P&gt;  ip inspect FW out&lt;/P&gt;&lt;P&gt;  ip access-group 101 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just curious. Thanks so much for your help, didn't know about that inspect function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924579#M437629</guid>
      <dc:creator>mattlager</dc:creator>
      <dc:date>2012-05-06T05:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924580#M437630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I bet your going to say because only tcp, udp, and icmp can be stateful, just a guess this isn't what I'm an expert in &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924580#M437630</guid>
      <dc:creator>mattlager</dc:creator>
      <dc:date>2012-05-06T05:20:04Z</dc:date>
    </item>
    <item>
      <title>Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924581#M437631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well basically because there is no general IP inspection. You see, inspection work checking different information under the layer 3/4 in order to keep track of a session. For example in UDP and tcp you grab the Source IP and destination IP plus source and destination ports, with ICMP you grab the same, source IP destination IP and the code (Echo, echo reply and such) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there was such thing like inspect IP, it would only grab source and destination ip address no matter if the packets belong to a valid session or not. What Cisco wanted to do is just to keep real and good track of each session to avoid attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kinda deep, if you want to check more about inspections, whenever you have time, you can take quick look on the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094e8b.shtml"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094e8b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help a bit. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924581#M437631</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-06T05:21:33Z</dc:date>
    </item>
    <item>
      <title>Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924582#M437632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nahh, its alright... first time I saw it it took me several sleepless nights just to understand it... been there donde that....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924582#M437632</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-06T05:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Block all inbound, allow outbound?</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924583#M437633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again, this community is so supportive, full of people like you who really want to help and educate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 May 2012 05:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924583#M437633</guid>
      <dc:creator>mattlager</dc:creator>
      <dc:date>2012-05-06T05:26:48Z</dc:date>
    </item>
    <item>
      <title>Hi !</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924584#M437634</link>
      <description>&lt;P&gt;Hi !&lt;/P&gt;
&lt;P&gt;Is there any way to archive this WITHOUT using ip inspect and use ONLY access-lists ? I mean to block all inbound traffic but allow all outgoing.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 17:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924584#M437634</guid>
      <dc:creator>momentousltd</dc:creator>
      <dc:date>2016-04-25T17:13:43Z</dc:date>
    </item>
    <item>
      <title>It can be done, however only</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924585#M437635</link>
      <description>&lt;P&gt;It can be done, however only with TCP traffic, using the "established" keyword.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 17:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924585#M437635</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2016-04-25T17:20:28Z</dc:date>
    </item>
    <item>
      <title>I also just found the</title>
      <link>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924586#M437636</link>
      <description>&lt;P&gt;I also just found the solution of reflexive access list !&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/84441/reflexive-access-list-ios"&gt;https://supportforums.cisco.com/document/84441/reflexive-access-list-ios&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Apr 2016 17:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-all-inbound-allow-outbound/m-p/1924586#M437636</guid>
      <dc:creator>momentousltd</dc:creator>
      <dc:date>2016-04-25T17:46:58Z</dc:date>
    </item>
  </channel>
</rss>

