<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic help config cisco firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728143#M561450</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Am new to cisco but able to learn new things very fast,pls help on conf router as a firewall,below is my conf of router and switch and all vlans are able to browse,i want my router to be secured pls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//cisco router 1921&lt;BR /&gt;version 15.0&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1921&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$mhnT$R2weEBZ4l3mQI7W5Q80xr1&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;clock timezone EST 3&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;no ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip name-server 196.46.k.t&lt;BR /&gt;ip name-server 196.46.d.t&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description connection to LAN&lt;BR /&gt;ip address 10.10.10.1 255.255.255.252&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;duplex full&lt;BR /&gt;speed 1000&lt;BR /&gt;ntp disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description connection to INTERNET&lt;BR /&gt;ip address 196.43.x.p 255.255.255.128&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;ntp disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip flow-export source GigabitEthernet0/1&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list NAT interface GigabitEthernet0/1 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 196.43.x.y&lt;BR /&gt;ip route 192.168.3.0 255.255.255.0 10.10.10.2&lt;BR /&gt;ip route 192.168.5.0 255.255.255.0 10.10.10.2&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT&lt;BR /&gt;permit ip 10.0.0.0 0.0.0.3 any&lt;BR /&gt;permit ip 192.168.3.0 0.0.0.255 any&lt;BR /&gt;permit ip 192.168.5.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner motd ^CThis is an official computer system and is the property of the ORGANIZATION. It is for authorized users only. Unauthorized users are prohibited. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;password 7 09594C000B0C101B1105426063&lt;BR /&gt;login&lt;BR /&gt;line vty 5 15&lt;BR /&gt;password 7 09594C000B0C101B1105426063&lt;BR /&gt;login local&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//switch switch 3560G conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.0 &lt;BR /&gt;Switch-A&amp;gt; en&lt;BR /&gt;Switch-A#hostname Switch-A&lt;BR /&gt;Switch-A# conf t&lt;BR /&gt;Switch-A(config)#banner motd $This is an official computer system and is the property of the ORGANIZATION. It is for authorized users only. Unauthorized users are prohibited. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system may be subject to one or more of the following actions: interception, monitoring, recording, auditing, inspection and disclosing to security personnel and law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign. By using this system, the user consents to these actions. Unauthorized or improper use of this system may result in administrative disciplinary action and civil and criminal penalties. By accessing this system you indicate your awareness of and consent to these terms and conditions of use. Discontinue access immediately if you do not agree to the conditions stated in this notice. &lt;BR /&gt;$&lt;BR /&gt;Switch-A(config)# ip routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# enable secret $$$$$$$&lt;BR /&gt;Switch-A(config)#service password-encription&lt;BR /&gt;Switch-A(config)#no service tcp-small-servers&lt;BR /&gt;Switch-A(config)#no service udp-small-servers&lt;BR /&gt;Switch-A(config)#no ip bootp server&lt;BR /&gt;Switch-A(config)#no ip finger&lt;BR /&gt;Switch-A(config)#no service finger&lt;BR /&gt;Switch-A(config)#no service config&lt;BR /&gt;Switch-A(config)#no boot host&lt;BR /&gt;Switch-A(config)#no boot network&lt;BR /&gt;Switch-A(config)#no boot system&lt;BR /&gt;Switch-A(config)#no service pad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)#ip name-server 196.46.k.t&lt;BR /&gt;Switch-A(config)#ip name-server 196.46.d.t&lt;BR /&gt;Switch-A(config)#no ip domain-lookup&lt;BR /&gt;Switch-A(config)#no ip http server&lt;BR /&gt;Switch-A(config)#no snmp-server community&lt;BR /&gt;Switch-A(config)#no snmp-server enable traps&lt;BR /&gt;Switch-A(config)#no snmp-server system-shutdown&lt;BR /&gt;Switch-A(config)#no snmp-server&lt;BR /&gt;Switch-A(config)#no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(vlan)# vlan 4&lt;BR /&gt;Switch-A(vlan)# vlan 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A# conf t&lt;BR /&gt;Switch-A(config)#no cdp run&lt;BR /&gt;Switch-A(config)# interface vlan1&lt;BR /&gt;Switch-A(config)# description *** DEFAULT VLAN - Do NOT Use! ***&lt;BR /&gt;Switch-A(config-if)# no ip address&lt;BR /&gt;Switch-A(config-if)# shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface vlan4&lt;BR /&gt;Switch-A(config-if)#description server's farm&lt;BR /&gt;Switch-A(config-if)# ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;Switch-A(config-if)#ip access group vlan4&lt;BR /&gt;Switch-A(config-if)# no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface vlan6&lt;BR /&gt;Switch-A(config-if)#description&amp;nbsp; SECURITY&lt;BR /&gt;Switch-A(config-if)# ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;Switch-A(config-if)#ip access group vlan6&lt;BR /&gt;Switch-A(config-if)# no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# ip route 0.0.0.0 0.0.0.0 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface&amp;nbsp; G0/1&lt;BR /&gt;Switch-A(config)#description connection to router&lt;BR /&gt;Switch-A(config-if)# no switchport &lt;BR /&gt;Switch-A(config-if)# 10.10.10.2 255.255.255.252&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Switch-A(config)# interface range G0/6-8&lt;BR /&gt;Switch-A(config)#description security&lt;BR /&gt;Switch-A(config-if)# switchport mode access&lt;BR /&gt;Switch-A(config-if)# switchport access vlan 6&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface range G0/10-24&lt;BR /&gt;Switch-A(config)#description SERVER'S FARM&lt;BR /&gt;Switch-A(config-if)# switchport mode access&lt;BR /&gt;Switch-A(config-if)# switchport access vlan 4&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;BR /&gt;Switch-A(config)#wr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;joe&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:41:03 GMT</pubDate>
    <dc:creator>malai.joseph</dc:creator>
    <dc:date>2019-03-11T20:41:03Z</dc:date>
    <item>
      <title>help config cisco firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728143#M561450</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Am new to cisco but able to learn new things very fast,pls help on conf router as a firewall,below is my conf of router and switch and all vlans are able to browse,i want my router to be secured pls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//cisco router 1921&lt;BR /&gt;version 15.0&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname R1921&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 $1$mhnT$R2weEBZ4l3mQI7W5Q80xr1&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;clock timezone EST 3&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;no ip source-route&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip name-server 196.46.k.t&lt;BR /&gt;ip name-server 196.46.d.t&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description connection to LAN&lt;BR /&gt;ip address 10.10.10.1 255.255.255.252&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;duplex full&lt;BR /&gt;speed 1000&lt;BR /&gt;ntp disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description connection to INTERNET&lt;BR /&gt;ip address 196.43.x.p 255.255.255.128&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;ntp disable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip flow-export source GigabitEthernet0/1&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list NAT interface GigabitEthernet0/1 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 196.43.x.y&lt;BR /&gt;ip route 192.168.3.0 255.255.255.0 10.10.10.2&lt;BR /&gt;ip route 192.168.5.0 255.255.255.0 10.10.10.2&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT&lt;BR /&gt;permit ip 10.0.0.0 0.0.0.3 any&lt;BR /&gt;permit ip 192.168.3.0 0.0.0.255 any&lt;BR /&gt;permit ip 192.168.5.0 0.0.0.255 any&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner motd ^CThis is an official computer system and is the property of the ORGANIZATION. It is for authorized users only. Unauthorized users are prohibited. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or&lt;BR /&gt;^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;password 7 09594C000B0C101B1105426063&lt;BR /&gt;login&lt;BR /&gt;line vty 5 15&lt;BR /&gt;password 7 09594C000B0C101B1105426063&lt;BR /&gt;login local&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//switch switch 3560G conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.0 &lt;BR /&gt;Switch-A&amp;gt; en&lt;BR /&gt;Switch-A#hostname Switch-A&lt;BR /&gt;Switch-A# conf t&lt;BR /&gt;Switch-A(config)#banner motd $This is an official computer system and is the property of the ORGANIZATION. It is for authorized users only. Unauthorized users are prohibited. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system may be subject to one or more of the following actions: interception, monitoring, recording, auditing, inspection and disclosing to security personnel and law enforcement personnel, as well as authorized officials of other agencies, both domestic and foreign. By using this system, the user consents to these actions. Unauthorized or improper use of this system may result in administrative disciplinary action and civil and criminal penalties. By accessing this system you indicate your awareness of and consent to these terms and conditions of use. Discontinue access immediately if you do not agree to the conditions stated in this notice. &lt;BR /&gt;$&lt;BR /&gt;Switch-A(config)# ip routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# enable secret $$$$$$$&lt;BR /&gt;Switch-A(config)#service password-encription&lt;BR /&gt;Switch-A(config)#no service tcp-small-servers&lt;BR /&gt;Switch-A(config)#no service udp-small-servers&lt;BR /&gt;Switch-A(config)#no ip bootp server&lt;BR /&gt;Switch-A(config)#no ip finger&lt;BR /&gt;Switch-A(config)#no service finger&lt;BR /&gt;Switch-A(config)#no service config&lt;BR /&gt;Switch-A(config)#no boot host&lt;BR /&gt;Switch-A(config)#no boot network&lt;BR /&gt;Switch-A(config)#no boot system&lt;BR /&gt;Switch-A(config)#no service pad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)#ip name-server 196.46.k.t&lt;BR /&gt;Switch-A(config)#ip name-server 196.46.d.t&lt;BR /&gt;Switch-A(config)#no ip domain-lookup&lt;BR /&gt;Switch-A(config)#no ip http server&lt;BR /&gt;Switch-A(config)#no snmp-server community&lt;BR /&gt;Switch-A(config)#no snmp-server enable traps&lt;BR /&gt;Switch-A(config)#no snmp-server system-shutdown&lt;BR /&gt;Switch-A(config)#no snmp-server&lt;BR /&gt;Switch-A(config)#no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(vlan)# vlan 4&lt;BR /&gt;Switch-A(vlan)# vlan 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A# conf t&lt;BR /&gt;Switch-A(config)#no cdp run&lt;BR /&gt;Switch-A(config)# interface vlan1&lt;BR /&gt;Switch-A(config)# description *** DEFAULT VLAN - Do NOT Use! ***&lt;BR /&gt;Switch-A(config-if)# no ip address&lt;BR /&gt;Switch-A(config-if)# shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface vlan4&lt;BR /&gt;Switch-A(config-if)#description server's farm&lt;BR /&gt;Switch-A(config-if)# ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;Switch-A(config-if)#ip access group vlan4&lt;BR /&gt;Switch-A(config-if)# no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface vlan6&lt;BR /&gt;Switch-A(config-if)#description&amp;nbsp; SECURITY&lt;BR /&gt;Switch-A(config-if)# ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;Switch-A(config-if)#ip access group vlan6&lt;BR /&gt;Switch-A(config-if)# no shutdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# ip route 0.0.0.0 0.0.0.0 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface&amp;nbsp; G0/1&lt;BR /&gt;Switch-A(config)#description connection to router&lt;BR /&gt;Switch-A(config-if)# no switchport &lt;BR /&gt;Switch-A(config-if)# 10.10.10.2 255.255.255.252&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Switch-A(config)# interface range G0/6-8&lt;BR /&gt;Switch-A(config)#description security&lt;BR /&gt;Switch-A(config-if)# switchport mode access&lt;BR /&gt;Switch-A(config-if)# switchport access vlan 6&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch-A(config)# interface range G0/10-24&lt;BR /&gt;Switch-A(config)#description SERVER'S FARM&lt;BR /&gt;Switch-A(config-if)# switchport mode access&lt;BR /&gt;Switch-A(config-if)# switchport access vlan 4&lt;BR /&gt;Switch-A(config-if)# no shutdown &lt;BR /&gt;Switch-A(config-if)# exit&lt;BR /&gt;Switch-A(config)#wr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;joe&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728143#M561450</guid>
      <dc:creator>malai.joseph</dc:creator>
      <dc:date>2019-03-11T20:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: help config cisco firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728144#M561451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no really a method to say that the router is secure, first, we need to know which traffic is going to be allowed in/out meaning, if you are going to have incoming traffic to this router or if it is just going to be for internet access, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basic firewall would be like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name fw tcp&lt;/P&gt;&lt;P&gt;ip inspect name fw udp&lt;/P&gt;&lt;P&gt;Ip inspect name fw icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list 170 deny IP any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;ip inspect fw out&lt;/P&gt;&lt;P&gt;ip access-group 170 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would deny any traffic to go inside your network while having packet inspection at layer 4, if you want to be more granular, you can use the specific protocol you want to inspect at the application layer, such as smtp, that way, you should add a protocol to the inspection rule already define:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name fw smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Document for reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094e8b.shtml"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094e8b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jun 2011 03:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728144#M561451</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-02T03:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: help config cisco firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728145#M561452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks very much Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jun 2011 08:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-config-cisco-firewall/m-p/1728145#M561452</guid>
      <dc:creator>malai.joseph</dc:creator>
      <dc:date>2011-06-02T08:34:26Z</dc:date>
    </item>
  </channel>
</rss>

