<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ip inspect and blocking in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859739#M490338</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the answers to your questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Incoming TCP SYN packet arrives on fa0/1 and TCP session is built. I assume that this session will not be inspected ?&lt;/P&gt;&lt;P&gt;2. TCP session is initiated from fa0/2 interface. Such session will be inspected - and after 10 seconds of idle:&lt;/P&gt;&lt;P&gt;a) when packet within this session will be received on fa0/1 it will be accepted ?&lt;/P&gt;&lt;P&gt;b) when packet within this session will be received on fa0/2 it will be dropped ?&lt;/P&gt;&lt;P&gt;3. When TCP ACK packet is received on fa0/2 - but there is no session which matches this packet - will it be dropped ?&lt;/P&gt;&lt;P&gt;4. Only 100 half-opened session are accepted but only when initiated from fa0/2, when initiated from fa0/1 - there is no limit ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Yes this session will not be inspected.&lt;/P&gt;&lt;P&gt;2. a) No, after the session has gone idle. it will be removed and the next packet should have the Syn Flag not ACK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Yes, they will not be dropped. &lt;/P&gt;&lt;P&gt;3. Yes.&lt;/P&gt;&lt;P&gt;4. This value is defined globally , not interface wise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Puneet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Dec 2011 22:05:15 GMT</pubDate>
    <dc:creator>puseth</dc:creator>
    <dc:date>2011-12-22T22:05:15Z</dc:date>
    <item>
      <title>ip inspect and blocking</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859738#M490337</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config:&lt;/P&gt;&lt;P&gt;ip inspect name CBAC tcp timeout 10&lt;/P&gt;&lt;P&gt;ip inspect max-incomplete high 100&lt;/P&gt;&lt;P&gt;int fa0/1&lt;/P&gt;&lt;P&gt;ip access_group permit_all in&lt;/P&gt;&lt;P&gt;int fa 0/2&lt;/P&gt;&lt;P&gt;ip access_group permit_all in&lt;/P&gt;&lt;P&gt;ip inspect CBAC in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list on both interfaces accept all ip traffic.&lt;/P&gt;&lt;P&gt;What happens when:&lt;/P&gt;&lt;P&gt;1. Incoming TCP SYN packet arrives on fa0/1 and TCP session is built. I assume that this session will not be inspected ?&lt;/P&gt;&lt;P&gt;2. TCP session is initiated from fa0/2 interface. Such session will be inspected - and after 10 seconds of idle:&lt;/P&gt;&lt;P&gt;a) when&amp;nbsp; packet within this session will be received on fa0/1 it will be accepted ?&lt;/P&gt;&lt;P&gt;b) when&amp;nbsp; packet within this session will be received on fa0/2 it will be dropped ?&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; When TCP ACK packet is received on fa0/2 - but there is no session which matches this packet - will it be dropped ?&lt;/P&gt;&lt;P&gt;4. Only 100 half-opened session are accepted but only when initiated from fa0/2, when initiated from fa0/1 - there is no limit ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:05:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859738#M490337</guid>
      <dc:creator>mlopacinski</dc:creator>
      <dc:date>2019-03-11T22:05:37Z</dc:date>
    </item>
    <item>
      <title>ip inspect and blocking</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859739#M490338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the answers to your questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Incoming TCP SYN packet arrives on fa0/1 and TCP session is built. I assume that this session will not be inspected ?&lt;/P&gt;&lt;P&gt;2. TCP session is initiated from fa0/2 interface. Such session will be inspected - and after 10 seconds of idle:&lt;/P&gt;&lt;P&gt;a) when packet within this session will be received on fa0/1 it will be accepted ?&lt;/P&gt;&lt;P&gt;b) when packet within this session will be received on fa0/2 it will be dropped ?&lt;/P&gt;&lt;P&gt;3. When TCP ACK packet is received on fa0/2 - but there is no session which matches this packet - will it be dropped ?&lt;/P&gt;&lt;P&gt;4. Only 100 half-opened session are accepted but only when initiated from fa0/2, when initiated from fa0/1 - there is no limit ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Yes this session will not be inspected.&lt;/P&gt;&lt;P&gt;2. a) No, after the session has gone idle. it will be removed and the next packet should have the Syn Flag not ACK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b) Yes, they will not be dropped. &lt;/P&gt;&lt;P&gt;3. Yes.&lt;/P&gt;&lt;P&gt;4. This value is defined globally , not interface wise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Puneet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 22:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859739#M490338</guid>
      <dc:creator>puseth</dc:creator>
      <dc:date>2011-12-22T22:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: ip inspect and blocking</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859740#M490339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx for the answers. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 07:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859740#M490339</guid>
      <dc:creator>mlopacinski</dc:creator>
      <dc:date>2011-12-23T07:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: ip inspect and blocking</title>
      <link>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859741#M490340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx for the answers.&lt;/P&gt;&lt;P&gt;2. a) Next packet should have SYN only for new session. There might be network stale or application problems and, application resend ACK segment which will arrive after the router has cleared connection (both endpoints of this connection belives it's still alive). But it will arrive on interface which is not inspected. Should not "yes" (packet permitted) be answer to my question ?&lt;/P&gt;&lt;P&gt;4. Value is defined globally but the inspection is enabled only on fa0/2, so i am correct in point4 or not ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 07:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ip-inspect-and-blocking/m-p/1859741#M490340</guid>
      <dc:creator>mlopacinski</dc:creator>
      <dc:date>2011-12-23T07:10:54Z</dc:date>
    </item>
  </channel>
</rss>

