<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problems removing ip inspect and it breaking Internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511552#M601810</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rudresh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See Below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended NAT_Pool&lt;BR /&gt; permit ip 192.168.2.0 0.0.0.255 any &lt;BR /&gt; permit ip 192.168.3.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Internet_Filter&lt;BR /&gt; remark ### ANTI-SPOOFING RULES&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt; remark ### ALLOW ACCESS TO SERVICES&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 443&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq smtp&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq www&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 22&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq ftp&lt;BR /&gt; permit tcp any host yyy.yyy.yyy.yyy eq 444&lt;BR /&gt; permit tcp any host yyy.yyy.yyy.yyy eq 443&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 1494&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 27063&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 2598&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 27048&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq lpd&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 3389&lt;BR /&gt; permit udp any host xxx.xxx.xxx.xxx eq 515&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 1723&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 25017&lt;BR /&gt; remark ### ALLOW ICMP&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx echo-reply&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx time-exceeded&lt;BR /&gt; permit gre any host xxx.xxx.xxx.xxx&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx unreachable&lt;BR /&gt; remark ### DENY ALL OTHER AND LOG&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from what you are saying by removing all traces of the ip inspect from the configuration it leaves an implicit deny in place which then means we need to setup an access list to allow outbound traffic? The access list Internet_Filter is only applied inbound on the Internet facing Fast Ethernet adapater.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aaron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 06 Oct 2010 00:37:43 GMT</pubDate>
    <dc:creator>aaron-fisher</dc:creator>
    <dc:date>2010-10-06T00:37:43Z</dc:date>
    <item>
      <title>Problems removing ip inspect and it breaking Internet</title>
      <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511548#M601806</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have 2 2800 series routers here that are at either of our sites. They had been setup with ip inspect statements for various traffic types however when we try and remove them completley they break various different protocols inlcuding web browsing, email etc. The reason for us wanting to remove these statements is to allow our users access to a one of our suppliers websites that its running on a non standard TCP port. Currently we cannot access it from our Head office location that runs a Fibre connection however our secondary site which has a Satelite internet connection can access this fine after modifying access lists in place on that router. With our Head office router there are no such access lists in place which is making this difficult to work out why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can post up configs with critical information removed if required and would appreciate any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aaron&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511548#M601806</guid>
      <dc:creator>aaron-fisher</dc:creator>
      <dc:date>2019-03-11T18:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Problems removing ip inspect and it breaking Internet</title>
      <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511549#M601807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: justify;"&gt;Hi Aaron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Please provide me with the configuation with the ip inspect still in place, so that i can analyze what the ip inspect was doing and how we can acheive this without ip inspect. A simple network diagram depicting the connection flow would also help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Cheers,&lt;/P&gt;&lt;P style="text-align: justify;"&gt;Rudresh V&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 06:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511549#M601807</guid>
      <dc:creator>Rudresh Veerappaji</dc:creator>
      <dc:date>2010-10-05T06:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Problems removing ip inspect and it breaking Internet</title>
      <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511550#M601808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rudresh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see below for config info minus certain details, if you need more details regarding config let me know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.4&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname HO-C2811&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 6&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;logging buffered 4096 warnings&lt;BR /&gt;logging console critical&lt;BR /&gt;enable secret&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login local_authen local&lt;BR /&gt;aaa authorization exec local_author local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone Perth 8&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-4024331455&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-4024331455&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-4024331455&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-4024331455&lt;BR /&gt; certificate self-signed 01 nvram:IOS-Self-Sig#1.cer&lt;BR /&gt;dot11 syslog&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain name magmetals.com&lt;BR /&gt;ip name-server 203.161.127.1&lt;BR /&gt;ip name-server 203.153.224.42&lt;BR /&gt;ip ips name sdm_ips_rule&lt;BR /&gt;ip inspect name SDM_LOW cuseeme&lt;BR /&gt;ip inspect name SDM_LOW dns&lt;BR /&gt;ip inspect name SDM_LOW ftp&lt;BR /&gt;ip inspect name SDM_LOW h323&lt;BR /&gt;ip inspect name SDM_LOW https&lt;BR /&gt;ip inspect name SDM_LOW icmp&lt;BR /&gt;ip inspect name SDM_LOW imap&lt;BR /&gt;ip inspect name SDM_LOW pop3&lt;BR /&gt;ip inspect name SDM_LOW netshow&lt;BR /&gt;ip inspect name SDM_LOW rcmd&lt;BR /&gt;ip inspect name SDM_LOW realaudio&lt;BR /&gt;ip inspect name SDM_LOW rtsp&lt;BR /&gt;ip inspect name SDM_LOW esmtp&lt;BR /&gt;ip inspect name SDM_LOW sqlnet&lt;BR /&gt;ip inspect name SDM_LOW streamworks&lt;BR /&gt;ip inspect name SDM_LOW tftp&lt;BR /&gt;ip inspect name SDM_LOW tcp router-traffic&lt;BR /&gt;ip inspect name SDM_LOW udp router-traffic&lt;BR /&gt;ip inspect name SDM_LOW vdolive&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;ntp update-calendar&lt;BR /&gt;ntp server 203.31.84.4&lt;BR /&gt;ntp server 192.189.54.17 prefer source FastEthernet0/1&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;voice-card 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Null0&lt;BR /&gt; no ip unreachables&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt; description Internal Corporate Lan$FW_INSIDE$$ETH-LAN$&lt;BR /&gt; ip address 192.168.3.254 255.255.255.0&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex full&lt;BR /&gt; speed 100&lt;BR /&gt; no mop enabled&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt; bandwidth 163840&lt;BR /&gt; ip address &lt;INSERT public="" ip="" here=""&gt; &lt;INSERT subnet="" mask="" here=""&gt;&lt;BR /&gt; ip access-group Internet_Filter in&lt;BR /&gt; ip verify unicast reverse-path&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip inspect SDM_LOW out&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex full&lt;BR /&gt; speed 100&lt;BR /&gt; no mop enabled&lt;BR /&gt;!&lt;BR /&gt;interface ATM0/0/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/0&lt;BR /&gt; ip address 10.3.3.2 255.255.255.252&lt;BR /&gt; ip verify unicast reverse-path&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex full&lt;BR /&gt; speed 100&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/1&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 gateway&lt;BR /&gt;ip route 10.3.3.4 255.255.255.252 10.3.3.1&lt;BR /&gt;ip route 192.168.2.0 255.255.255.0 10.3.3.1&lt;BR /&gt;no ip http server&lt;BR /&gt;ip http access-class 1&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list NAT_Pool interface FastEthernet0/1 overload&lt;/INSERT&gt;&lt;/INSERT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also attached a brief network digram explaining traffic flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Aaron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 06:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511550#M601808</guid>
      <dc:creator>aaron-fisher</dc:creator>
      <dc:date>2010-10-05T06:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problems removing ip inspect and it breaking Internet</title>
      <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511551#M601809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Aaron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what kind of addresses are allowed in the following two access-lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet_Filter&amp;nbsp;&amp;nbsp;&amp;nbsp; ----&amp;gt; controls access to packets coming from out to inside.&lt;/P&gt;&lt;P&gt;NAT_Pool&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&amp;gt;controls nating for certain traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What inspection does when its in place is that, as an example, when a http packet (web traffic) comes from inside and leaves to outside, the router would create a temorary connection entry in its internal tables, to allow return traffic. In this case the access-list on the outside interface (Internet_Filter) is bypassed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when you remove the inspect for http, you need to explicitly allow required traffic (TCP- HTTP) from outside to inside. Similarily for other protocols like ESMTP (mail), FTP,etc that you use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you need to identify such traffic and append entries in the access-list Internet_Filter to allow&amp;nbsp; traffic from out to inside. If possible please let me know how the above requested access-lists look like (probably you can mask certain octets).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Rudresh V&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2010 10:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511551#M601809</guid>
      <dc:creator>Rudresh Veerappaji</dc:creator>
      <dc:date>2010-10-05T10:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problems removing ip inspect and it breaking Internet</title>
      <link>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511552#M601810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rudresh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See Below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended NAT_Pool&lt;BR /&gt; permit ip 192.168.2.0 0.0.0.255 any &lt;BR /&gt; permit ip 192.168.3.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended Internet_Filter&lt;BR /&gt; remark ### ANTI-SPOOFING RULES&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt; remark ### ALLOW ACCESS TO SERVICES&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 443&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq smtp&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq www&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 22&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq ftp&lt;BR /&gt; permit tcp any host yyy.yyy.yyy.yyy eq 444&lt;BR /&gt; permit tcp any host yyy.yyy.yyy.yyy eq 443&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 1494&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 27063&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 2598&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 27048&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq lpd&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 3389&lt;BR /&gt; permit udp any host xxx.xxx.xxx.xxx eq 515&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 1723&lt;BR /&gt; permit tcp any host xxx.xxx.xxx.xxx eq 25017&lt;BR /&gt; remark ### ALLOW ICMP&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx echo-reply&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx time-exceeded&lt;BR /&gt; permit gre any host xxx.xxx.xxx.xxx&lt;BR /&gt; permit icmp any host xxx.xxx.xxx.xxx unreachable&lt;BR /&gt; remark ### DENY ALL OTHER AND LOG&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from what you are saying by removing all traces of the ip inspect from the configuration it leaves an implicit deny in place which then means we need to setup an access list to allow outbound traffic? The access list Internet_Filter is only applied inbound on the Internet facing Fast Ethernet adapater.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aaron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Oct 2010 00:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-removing-ip-inspect-and-it-breaking-internet/m-p/1511552#M601810</guid>
      <dc:creator>aaron-fisher</dc:creator>
      <dc:date>2010-10-06T00:37:43Z</dc:date>
    </item>
  </channel>
</rss>

