<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL issue with Router 2801 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520350#M620045</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need only to allow them on the ACL applied on the outside interface. If the application uses UDP or TCP as transport protocol, they will be allowed back and forth with the Inspect FW. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Oct 2010 17:45:10 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2010-10-26T17:45:10Z</dc:date>
    <item>
      <title>ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520338#M620033</link>
      <description>&lt;P&gt;I have to implement an ACL on my router and have to block all the incoming access except some protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sample ACL is listed below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; font-family: MS PGothic; "&gt;permit tcp any 29.165.175.0 0.0.0.255 eq 443&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; font-family: MS PGothic; "&gt; permit tcp any 29.165.175.0 0.0.0.255 eq 9000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; font-family: MS PGothic; "&gt; permit icmp any any echo-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #1f497d; font-size: 12pt; font-family: MS PGothic; "&gt; deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="color: #1f497d;"&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt;The ACLs will be applied on “in” of the “outside interface”.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt;I just want to know whould it block the inbound request generated in return of the traffic which will be generated from inside, like if I browse cisco.com, would the request be blocked when the website contants try to come in from outside.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt;Do i have to use established statement or reflex access list.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt;Let me know please &lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #1f497d; font-size: 12pt; font-family: Calibri; "&gt;Thanks in Advance&lt;/STRONG&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520338#M620033</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2019-03-11T19:00:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520339#M620034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, return traffic will be blocked. I would suggest using inspect outbound in order to allow return traffic that is in response to an outbound connection (reflexive ACLs used to do it but they are deprecated now).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ip inspect name FW tcp&lt;/P&gt;&lt;P&gt;ip inspect name FW tcp&lt;/P&gt;&lt;P&gt;ip inspect name FW dns&lt;/P&gt;&lt;P&gt;ip inspect name FW &lt;ANY other="" protocols="" you="" want="" to="" inspect=""&gt;&lt;/ANY&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface eth0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; description Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip inspect FW out&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-group xxx in&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520339#M620034</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-26T15:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520340#M620035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you are ok with it you can enable a bsic firewall&lt;/P&gt;&lt;P&gt; on the router thus making it stateful, this will work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;use the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name fw dns&lt;/P&gt;&lt;P&gt;ip inspect name fw tcp&lt;/P&gt;&lt;P&gt;ip inspect name fw udp&lt;/P&gt;&lt;P&gt;ip inspect name fw icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and apply tihs on the outsid einterface in outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fa0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect fw out&lt;/P&gt;&lt;P&gt;ip access-group 100 in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whr acl 100 wiull haev permt for out to in connections and deny for rest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this way you will make your router stateful and secure in to out return traffic is permitted&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520340#M620035</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-10-26T15:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520341#M620036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks its every helpful&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520341#M620036</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2010-10-26T15:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520342#M620037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks it make scence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520342#M620037</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2010-10-26T15:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520343#M620038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about Active and Passive FTP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520343#M620038</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2010-10-26T15:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520344#M620039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;inspect ftp but agian depends&lt;/P&gt;&lt;P&gt;where exactly your server is whether inside or outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520344#M620039</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-10-26T15:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520345#M620040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;ip inspect name FW ftp&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark this as answered if it is, for the benefit of others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520345#M620040</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-26T15:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520346#M620041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;make sure the more specific one like dns,ftp,http etc come first then comes the more generic one's like tcp and udp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 15:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520346#M620041</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-10-26T15:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520347#M620042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to be specific&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule is for all the inbound traffic which is generated in response of the outbound access. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 17:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520347#M620042</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2010-10-26T17:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520348#M620043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, it practically opens pinholes to the ACL that is applied inbound to the outside interface for the return traffic of inside initiated connections.&lt;/P&gt;&lt;P&gt;The inspection would need to be applied outbound of course.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if it solved it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 17:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520348#M620043</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-26T17:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520349#M620044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also we have some custom made apps which normally access few machines outside of our n&lt;/P&gt;&lt;P&gt;etwork and receives response on multiple ports. How can i allow that access from getting&lt;/P&gt;&lt;P&gt;blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 17:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520349#M620044</guid>
      <dc:creator>imranraheel</dc:creator>
      <dc:date>2010-10-26T17:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: ACL issue with Router 2801</title>
      <link>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520350#M620045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need only to allow them on the ACL applied on the outside interface. If the application uses UDP or TCP as transport protocol, they will be allowed back and forth with the Inspect FW. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 17:45:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-issue-with-router-2801/m-p/1520350#M620045</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-26T17:45:10Z</dc:date>
    </item>
  </channel>
</rss>

