<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IP NAT INSIDE RULES and ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899519#M457757</link>
    <description>&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;Thank you for taking the time to read this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;I am trying to achieve the following scenario. I would like the below IP NAT rules to only be usable on an external basis from a handful of hosts then implcitly deny all other traffic Inbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;The IP NAT rules are for portforwarding to an internal server, these rules all work fine I can access them from any host but as said I would like to lock this down to only a couple of hosts on the internet and then to deny the rest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ INTERFACES ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; description +++ CIRCUIT ID +++&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 79.x.x.x 255.255.255.252&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip nat outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; duplex auto&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;&lt;EM&gt; speed auto &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; description +++ LAN +++&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.1.254 255.255.255.0 secondary&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.1.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip nat inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; duplex auto&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;&lt;EM&gt; speed auto&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ IP NAT RULES * ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8819 79.x.x.x 8819 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8819 &lt;EM&gt;79.x.x.x &lt;/EM&gt;8819 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8845 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8845 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8845 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8845 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8989 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8989 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8989 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8989 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ ACCESS LIST ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 remark Allowed IP NAT HOSTS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit tcp host 195.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit udp host 195.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit tcp host 79.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit udp host 79.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 deny ip any host 255.255.255.255 log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide some advise on how I can achieve this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you all very much for taking the time to assist me with this.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;- Ashley &lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:46:47 GMT</pubDate>
    <dc:creator>ashley.cotter</dc:creator>
    <dc:date>2019-03-11T22:46:47Z</dc:date>
    <item>
      <title>IP NAT INSIDE RULES and ACL</title>
      <link>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899519#M457757</link>
      <description>&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;Thank you for taking the time to read this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;I am trying to achieve the following scenario. I would like the below IP NAT rules to only be usable on an external basis from a handful of hosts then implcitly deny all other traffic Inbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 0cm; margin-right: 0cm; margin-left: 0cm; margin-bottom: 0.0001pt;"&gt;The IP NAT rules are for portforwarding to an internal server, these rules all work fine I can access them from any host but as said I would like to lock this down to only a couple of hosts on the internet and then to deny the rest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ INTERFACES ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; description +++ CIRCUIT ID +++&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 79.x.x.x 255.255.255.252&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip nat outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; duplex auto&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;&lt;EM&gt; speed auto &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; description +++ LAN +++&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.1.254 255.255.255.0 secondary&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.1.1 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip nat inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; duplex auto&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin: 0cm; margin-bottom: .0001pt;"&gt;&lt;EM&gt; speed auto&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ IP NAT RULES * ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8819 79.x.x.x 8819 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8819 &lt;EM&gt;79.x.x.x &lt;/EM&gt;8819 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8845 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8845 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8845 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8845 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.15 8989 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8989 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static udp 192.168.1.15 8989 &lt;EM&gt;&lt;EM&gt;79.x.x.x &lt;/EM&gt;&lt;/EM&gt;8989 extendable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;++++ ACCESS LIST ++++&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 remark Allowed IP NAT HOSTS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit tcp host 195.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit udp host 195.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit tcp host 79.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 permit udp host 79.x.x.x any log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list 101 deny ip any host 255.255.255.255 log&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide some advise on how I can achieve this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you all very much for taking the time to assist me with this.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;- Ashley &lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899519#M457757</guid>
      <dc:creator>ashley.cotter</dc:creator>
      <dc:date>2019-03-11T22:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE RULES and ACL</title>
      <link>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899520#M457758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm rusty reagards the NAT/ACL configurations on routers/L3 switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems in the configurations that you havent attached the access-list to the interface yet. I think you still need to add some statements/ACEs to the ACL you have there. As were dealing with a router, you will have to take into consideration the return traffic to your connections from the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL would to my understanding block all return traffic for normal web browsing etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the ACE that you needed to add to the top of the ACL was "access-list 101 permit tcp any any established" so it permits return traffic for already established TCP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if the ACL is meant to be an access-list attached to the outside interface for traffic entering the interface I think you could specify the service ports in the permit statements instead of permitting the whole port range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All this would be much easier though if you handled the firewall/NAT with an actual firewall appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will leave the more specific answer and suggestions to someone who has more expirience with routers as I probably have missed something. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 12:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899520#M457758</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-26T12:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE RULES and ACL</title>
      <link>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899521#M457759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ashley,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An ACL will do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# object-group network obj-allowhosts&lt;BR /&gt;Router(config-network-group)# host 209.165.200.237&lt;BR /&gt;Router(config-network-group)# host 209.165.200.238&lt;BR /&gt;Router(config-network-group)# range 209.165.200.239 209.165.200.240&lt;BR /&gt;Router(config-network-group)# 209.165.200.241 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Router(config)# object-group service obj-allowports&lt;BR /&gt;Router(config-service-group)# tcp 8819 &lt;BR /&gt;Router(config-service-group)# udp 8819 &lt;BR /&gt;Router(config-service-group)# tcp 8845 &lt;BR /&gt;Router(config-service-group)# udp 8845 &lt;BR /&gt;Router(config-service-group)# tcp 8989 &lt;BR /&gt;Router(config-service-group)# udp 8989 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# ip access-list extended acl-allowinside&lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# permit object-group obj-allowports object-group obj-allowhosts host 79.x.x.x &lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# deny object-group obj-allowports any host 79.x.x.x &lt;/P&gt;&lt;P&gt;Router(config-ext-nacl)# permit any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have CBAC setup on your router you can also change very last entry "permit any any" to deny any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you have do not have a CBAC then you require permit "any any" at the end of the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at last do not forget to apply the ACL on the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;ip access-group acl-allowinside in&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 13:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-nat-inside-rules-and-acl/m-p/1899521#M457759</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-03-26T13:09:13Z</dc:date>
    </item>
  </channel>
</rss>

