<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS ACL Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864668#M489078</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. Looks as if it is functioning as expected then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect name Corp tcp&lt;/P&gt;&lt;P&gt;ip inspect name Corp udp&lt;/P&gt;&lt;P&gt;ip inspect name Corp ftp&lt;/P&gt;&lt;P&gt;ip inspect name Corp icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect Corp out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip inspect seession&lt;/P&gt;&lt;P&gt;(Result below is traffic before going through VPN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session 49F9DB08 (192.168.10.163:161)=&amp;gt;(192.168.7.108:1796) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F983E8 (192.168.10.3:161)=&amp;gt;(192.168.7.108:1825) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD35E4 (192.168.10.83:161)=&amp;gt;(192.168.7.108:2092) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD4084 (192.168.10.82:161)=&amp;gt;(192.168.7.108:2089) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F9C188 (192.168.10.106:58020)=&amp;gt;(192.168.7.61:5723) tcp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD2704 (192.168.10.163:161)=&amp;gt;(192.168.7.108:2118) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F961E8 (192.168.10.3:161)=&amp;gt;(192.168.7.108:1948) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jan 2012 22:28:26 GMT</pubDate>
    <dc:creator>pdvcisco</dc:creator>
    <dc:date>2012-01-06T22:28:26Z</dc:date>
    <item>
      <title>IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864662#M489071</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On a 2821 Router with 15.1(3)T1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an IPSec VPN and NAT configured.&amp;nbsp; Return traffic from an internal NAT host seems to be blocked by the WAN inbound ACL. What is the proper way to allow return traffic from the Internet for this internat NAT host?&amp;nbsp; Note: As a test, removing the deny entry on the WAN ACL allows return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is config detail and a console log entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0.2&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 2&lt;/P&gt;&lt;P&gt; ip address 192.168.10.252 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description WAN$ETH-WAN$&lt;/P&gt;&lt;P&gt; ip address 207.xx.xx.02 255.255.255.240 secondary&lt;/P&gt;&lt;P&gt; ip address 207.xx.xx.xx 255.255.255.240&lt;/P&gt;&lt;P&gt; ip access-group WAN in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; crypto map 3377&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat pool Corp 207.xx.xx.02 207.xx.xx.02 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 pool Corp overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended WAN&lt;/P&gt;&lt;P&gt; permit ahp host 66.xx.xx.xx host 207.xx.xx.xx&lt;/P&gt;&lt;P&gt; permit esp host 66.xx.xx.xx host 207.xx.xx.xx&lt;/P&gt;&lt;P&gt; permit udp host 66.xx.xx.xx host 207.xx.xx.xx eq isakmp&lt;/P&gt;&lt;P&gt; permit udp host 66.xx.xx.xx host 207.xx.xx.xx eq non500-isakmp&lt;/P&gt;&lt;P&gt; permit ip 192.168.7.0 0.0.0.255 192.168.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.10.0 0.0.0.255 192.168.7.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_1 permit 1&lt;/P&gt;&lt;P&gt; match ip address 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Console Log Entry:&lt;/P&gt;&lt;P&gt;SEC-6-IPACCESSLOGP: list WAN denied tcp 173.223.52.34(80) -&amp;gt; 207.xx.xx.xx.02(4974), 1 packet&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864662#M489071</guid>
      <dc:creator>pdvcisco</dc:creator>
      <dc:date>2019-03-11T22:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864663#M489072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure Reflexive ACLs, CBAC or ZBFW so the connections being innitiated on the inside can be inspected and allowed ( return traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The easiest to configure is CBAC, but the most flexible is ZBFW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CBAC:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://docwiki.cisco.com/wiki/CBAC"&gt;http://docwiki.cisco.com/wiki/CBAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZBF:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blogg.kvistofta.nu/cisco-ios-zone-based-policy-firewall/"&gt;http://blogg.kvistofta.nu/cisco-ios-zone-based-policy-firewall/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reflexive ACL:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.orbit-computer-solutions.com/Reflexive-ACLs.php"&gt;http://www.orbit-computer-solutions.com/Reflexive-ACLs.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 18:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864663#M489072</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T18:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864664#M489073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. I went with CBAC. Yes, it was more simple to configure.&amp;nbsp; Traffic is now returning!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see the VPN traffic is getting inpsected (I put the CBAC on the Outside Interface - Outbound).&amp;nbsp; Is there a way to skip the inspecting of VPN traffic, assuming it is using CPU cycles unnessarily to inpsect this traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 19:54:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864664#M489073</guid>
      <dc:creator>pdvcisco</dc:creator>
      <dc:date>2012-01-06T19:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864665#M489074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear that is working, CBAC is not going to inspect the VPN traffic due to encryption..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 20:22:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864665#M489074</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T20:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864666#M489075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see it is inspecting VPN traffic before it goes to the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 21:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864666#M489075</guid>
      <dc:creator>pdvcisco</dc:creator>
      <dc:date>2012-01-06T21:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864667#M489076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your CBAC configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing with CBAC is that its not flexible at all, so or you inpect x traffic or not.&lt;/P&gt;&lt;P&gt;So lets see the following example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have a VPN established, and on the remote site there is a HTTP server. &lt;/P&gt;&lt;P&gt;On your CBAC config you are inspecting HTTP, so that traffic will be inspected no matter what, there is such an option to avoid that, in fact that is the whole purpose of ZBFW ( Flexible).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:18:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864667#M489076</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T22:18:28Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864668#M489078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. Looks as if it is functioning as expected then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect name Corp tcp&lt;/P&gt;&lt;P&gt;ip inspect name Corp udp&lt;/P&gt;&lt;P&gt;ip inspect name Corp ftp&lt;/P&gt;&lt;P&gt;ip inspect name Corp icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect Corp out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show ip inspect seession&lt;/P&gt;&lt;P&gt;(Result below is traffic before going through VPN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session 49F9DB08 (192.168.10.163:161)=&amp;gt;(192.168.7.108:1796) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F983E8 (192.168.10.3:161)=&amp;gt;(192.168.7.108:1825) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD35E4 (192.168.10.83:161)=&amp;gt;(192.168.7.108:2092) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD4084 (192.168.10.82:161)=&amp;gt;(192.168.7.108:2089) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F9C188 (192.168.10.106:58020)=&amp;gt;(192.168.7.61:5723) tcp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 4CCD2704 (192.168.10.163:161)=&amp;gt;(192.168.7.108:2118) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;Session 49F961E8 (192.168.10.3:161)=&amp;gt;(192.168.7.108:1948) udp SIS_OPEN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:28:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864668#M489078</guid>
      <dc:creator>pdvcisco</dc:creator>
      <dc:date>2012-01-06T22:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: IOS ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864669#M489080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeap, that is the thing with CBAC, In fact is working as it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great weekend, any other question just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 22:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-acl-help/m-p/1864669#M489080</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-06T22:32:18Z</dc:date>
    </item>
  </channel>
</rss>

