<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco IOS firewall SDM rules issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428024#M681212</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest using "ip inspect log drop" and checking the logs to see the dropped packets reason for your lost email traffic.&lt;/P&gt;&lt;P&gt;Also, posting your config would helps us check if there is something wrong with it right off the bat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 May 2010 15:15:24 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-05-07T15:15:24Z</dc:date>
    <item>
      <title>Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428023#M681211</link>
      <description>&lt;P&gt;Someone out there mu st have had this issue before. we have just configured our 3825 router with the IOS firewall application using the SDM defaults to start with but have hit a few issuses with being able to access webmail applications. we are using NAT to get from a private to public network. All applications are getting through and returning as they should. However we are having issues with webmail ie Yahoo google and hotmail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if we use the SDM_Medium, Yahoo mail works but hotmail and googlemail fail. if we use SDM_high then hotmail and googlemail work and Yahoo mail fail. i must not be the first person to encounter this. does any ideas on how to resolve our issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds PaulC&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428023#M681211</guid>
      <dc:creator>paulc6512</dc:creator>
      <dc:date>2019-03-11T17:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428024#M681212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest using "ip inspect log drop" and checking the logs to see the dropped packets reason for your lost email traffic.&lt;/P&gt;&lt;P&gt;Also, posting your config would helps us check if there is something wrong with it right off the bat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 15:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428024#M681212</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-07T15:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428025#M681213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the reply. we are not loosing any emails at the moment.&lt;/P&gt;&lt;P&gt;the issue is we are not able to get to see the logon page for the webmail applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paulc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 15:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428025#M681213</guid>
      <dc:creator>paulc6512</dc:creator>
      <dc:date>2010-05-07T15:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428026#M681214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see. Still if the firewall is causing that to fail you should see drop logs and the reason which could help getting close to the root.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 15:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428026#M681214</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-07T15:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428027#M681215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output from the router.&lt;/P&gt;&lt;P&gt;still looking into the firewall log.&lt;/P&gt;&lt;P&gt;!This is the running config of the router: &lt;BR /&gt;!----------------------------------------------------------------------------&lt;BR /&gt;!version 12.4&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;no service dhcp&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash c3825-adventerprisek9-mz.124-9.T1.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 5&lt;BR /&gt;logging buffered 32000 debugging&lt;BR /&gt;enable secret 5 $1$1.dE$PFMCY../kcK8CZhZypXDx0&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default group tacacs+ local&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;resource policy&lt;BR /&gt;!&lt;BR /&gt;no ip source-route&lt;BR /&gt;no ip gratuitous-arps&lt;BR /&gt;ip icmp rate-limit unreachable 1000&lt;BR /&gt;ip cef&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain name cappella.net&lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip name-server 195.184.228.7&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;ip inspect log drop-pkt&lt;BR /&gt;ip inspect name SDM_MEDIUM appfw SDM_MEDIUM&lt;BR /&gt;ip inspect name SDM_MEDIUM cuseeme&lt;BR /&gt;ip inspect name SDM_MEDIUM dns&lt;BR /&gt;ip inspect name SDM_MEDIUM ftp&lt;BR /&gt;ip inspect name SDM_MEDIUM h323&lt;BR /&gt;ip inspect name SDM_MEDIUM https&lt;BR /&gt;ip inspect name SDM_MEDIUM icmp&lt;BR /&gt;ip inspect name SDM_MEDIUM imap reset&lt;BR /&gt;ip inspect name SDM_MEDIUM pop3 reset&lt;BR /&gt;ip inspect name SDM_MEDIUM netshow&lt;BR /&gt;ip inspect name SDM_MEDIUM rcmd&lt;BR /&gt;ip inspect name SDM_MEDIUM realaudio&lt;BR /&gt;ip inspect name SDM_MEDIUM rtsp&lt;BR /&gt;ip inspect name SDM_MEDIUM esmtp&lt;BR /&gt;ip inspect name SDM_MEDIUM sqlnet&lt;BR /&gt;ip inspect name SDM_MEDIUM streamworks&lt;BR /&gt;ip inspect name SDM_MEDIUM tftp&lt;BR /&gt;ip inspect name SDM_MEDIUM tcp&lt;BR /&gt;ip inspect name SDM_MEDIUM udp&lt;BR /&gt;ip inspect name SDM_MEDIUM vdolive&lt;BR /&gt;ip inspect name SDM_MEDIUM tacacs&lt;BR /&gt;ip ips notify SDEE&lt;BR /&gt;!&lt;BR /&gt;appfw policy-name SDM_MEDIUM&lt;BR /&gt;&amp;nbsp; application im aol&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name login.oscar.aol.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name toc.oscar.aol.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name oam-d09a.blue.aol.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;BR /&gt;&amp;nbsp; application im msn&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name messenger.hotmail.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name gateway.messenger.hotmail.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name webmessenger.msn.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;BR /&gt;&amp;nbsp; application http&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; strict-http action allow alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse im action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse p2p action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse tunneling action allow alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;BR /&gt;&amp;nbsp; application im yahoo&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action reset alarm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name scs.msg.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name scsa.msg.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name scsb.msg.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name scsc.msg.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name scsd.msg.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name messenger.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name cs16.msg.dcn.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name cs19.msg.dcn.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name cs42.msg.dcn.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name cs53.msg.dcn.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name cs54.msg.dcn.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name ads1.vip.scd.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name radio1.launch.vip.dal.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name in1.msg.vip.re2.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name data1.my.vip.sc5.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name address1.pim.vip.mud.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name edit.messenger.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name http.pager.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name privacy.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name csa.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name csb.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server deny name csc.yahoo.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;voice-card 0&lt;BR /&gt; no dspfarm&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;key chain capella&lt;BR /&gt; key 10101010&lt;BR /&gt;&amp;nbsp; key-string 7 0508071F244042080C0E&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-2280701403&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-2280701403&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-2280701403&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-2280701403&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 30820252 308201BB A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;BR /&gt;&amp;nbsp; 69666963 6174652D 32323830 37303134 3033301E 170D3130 30343136 31343330 &lt;BR /&gt;&amp;nbsp; 31345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32383037 &lt;BR /&gt;&amp;nbsp; 30313430 3330819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;BR /&gt;&amp;nbsp; 8100CAC6 5832BDE4 37431250 CD80A402 F752F245 28403353 1B71614A 02BF57B1 &lt;BR /&gt;&amp;nbsp; C47B620C 0CC883DE 42CA8D42 74E8AA0D 28A896A2 DABC330E 886F0B6E A16B0598 &lt;BR /&gt;&amp;nbsp; CC946390 87916614 86443A21 8B1F004D 6D268A25 4E9D3C1D 91D54B44 4645A3C7 &lt;BR /&gt;&amp;nbsp; 1BCBBDEA 73C7FBAE AD1BE130 338BAE21 A989AF73 0E999849 53E52FC1 76F2D9A9 &lt;BR /&gt;&amp;nbsp; 8B6B0203 010001A3 7A307830 0F060355 1D130101 FF040530 030101FF 30250603 &lt;BR /&gt;&amp;nbsp; 551D1104 1E301C82 1A52435F 706F7041 5F626C61 636B2E63 61707065 6C6C612E &lt;BR /&gt;&amp;nbsp; 6E657430 1F060355 1D230418 30168014 D35F92EA 5986B7F8 1E630DA3 188A1B99 &lt;BR /&gt;&amp;nbsp; 683CDE85 301D0603 551D0E04 160414D3 5F92EA59 86B7F81E 630DA318 8A1B9968 &lt;BR /&gt;&amp;nbsp; 3CDE8530 0D06092A 864886F7 0D010104 05000381 81009969 A927A388 39C3D79B &lt;BR /&gt;&amp;nbsp; BD2287D9 84E41B21 C71D9DFB D3E66D37 659C52B4 8E13E504 F5C5C1F2 E345E585 &lt;BR /&gt;&amp;nbsp; 2FAB5007 F0FEFE93 0C8DD881 03D509CA FB8EE244 09BFF3D2 DE024D45 2B69DCCF &lt;BR /&gt;&amp;nbsp; D88ACB0A F0421724 B076862C A4642878 7A5E0356 FE2D5773 C323ACD4 6704E894 &lt;BR /&gt;&amp;nbsp; 2F795B1B CF8ACE8E 2D0A4EBD B3F8CD2B A5A4C9EB 6E08&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;username sdm privilege 15 password 7 02050D480809&lt;BR /&gt;username flaksdm privilege 15 secret 5 $1$WRnW$.NSDX8qqCRUDX3vTLY47l1&lt;BR /&gt;username saic password 7 0822455D0A16&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map match-any sdm_p2p_kazaa&lt;BR /&gt; match protocol fasttrack&lt;BR /&gt; match protocol kazaa2&lt;BR /&gt;class-map match-any sdm_p2p_edonkey&lt;BR /&gt; match protocol edonkey&lt;BR /&gt;class-map match-any sdm_p2p_gnutella&lt;BR /&gt; match protocol gnutella&lt;BR /&gt;class-map match-any sdm_p2p_bittorrent&lt;BR /&gt; match protocol bittorrent&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map sdmappfwp2p_SDM_MEDIUM&lt;BR /&gt; class sdm_p2p_gnutella&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt; class sdm_p2p_bittorrent&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt; class sdm_p2p_edonkey&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt; class sdm_p2p_kazaa&lt;BR /&gt;&amp;nbsp;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 15&lt;BR /&gt; hash md5&lt;BR /&gt; authentication pre-share&lt;BR /&gt; lifetime 28800&lt;BR /&gt;crypto isakmp key MY-SECRET-PASSCODE address 0.0.0.0 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec security-association idle-time 600&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set aes-sha esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set new esp-des esp-md5-hmac &lt;BR /&gt;!&lt;BR /&gt;crypto dynamic-map dyn_internet 15&lt;BR /&gt; set transform-set new &lt;BR /&gt; match address Crypto-list&lt;BR /&gt;!&lt;BR /&gt;crypto dynamic-map dyn_private_network 15&lt;BR /&gt; set transform-set aes-sha &lt;BR /&gt; match address Crypto-list&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map internet 10 ipsec-isakmp dynamic dyn_internet &lt;BR /&gt;!&lt;BR /&gt;crypto map private_network 10 ipsec-isakmp dynamic dyn_private_network &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; description Uplink to Black Core Sw$FW_INSIDE$&lt;BR /&gt; ip address 10.12.5.250 255.255.255.0&lt;BR /&gt; ip access-group 2007 in&lt;BR /&gt; ip authentication mode eigrp 10 md5&lt;BR /&gt; ip authentication key-chain eigrp 10 capella&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; no ip route-cache cef&lt;BR /&gt; no ip route-cache&lt;BR /&gt; no ip split-horizon eigrp 10&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; media-type rj45&lt;BR /&gt; crypto map private_network&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; description Uplink to Internet$FW_OUTSIDE$&lt;BR /&gt; ip address 212.56.55.189 255.255.255.248&lt;BR /&gt; ip access-group 100 in&lt;BR /&gt; ip verify unicast reverse-path&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip inspect SDM_MEDIUM out&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; no ip route-cache cef&lt;BR /&gt; no ip route-cache&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; media-type rj45&lt;BR /&gt; crypto map internet&lt;BR /&gt; service-policy input sdmappfwp2p_SDM_MEDIUM&lt;BR /&gt; service-policy output sdmappfwp2p_SDM_MEDIUM&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/0&lt;BR /&gt; description link to Fixed Site Type-1 encryptor (vlan10)&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/1&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/2&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/3&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/4&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/5&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/6&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/7&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1/8&lt;BR /&gt; switchport access vlan 100&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Serial0/2/0&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; clock rate 2000000&lt;BR /&gt;!&lt;BR /&gt;interface Serial0/2/1&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; clock rate 2000000&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; description &lt;BR /&gt; no ip address&lt;BR /&gt; no ip route-cache cef&lt;BR /&gt; no ip route-cache&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan11&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt; description &lt;BR /&gt; ip address 10.10.10.1 255.255.255.248&lt;BR /&gt; no ip route-cache cef&lt;BR /&gt; no ip route-cache&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;router eigrp 10&lt;BR /&gt; redistribute connected&lt;BR /&gt; passive-interface GigabitEthernet0/1&lt;BR /&gt; network 10.0.0.0&lt;BR /&gt; no auto-summary&lt;BR /&gt; eigrp log-neighbor-warnings 300&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 212.56.55.185&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 600 life 86400 requests 10000&lt;BR /&gt;ip nat inside source list 199 interface GigabitEthernet0/1 overload&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended Crypto-list&lt;BR /&gt; permit ip 10.10.5.0 0.0.0.63 192.168.208.0 0.0.0.7&lt;BR /&gt; permit ip 10.10.5.0 0.0.0.63 192.168.208.8 0.0.0.7&lt;BR /&gt; permit icmp any 192.168.208.0 0.0.0.7 log&lt;BR /&gt; permit ip any 192.168.208.0 0.0.0.7 log&lt;BR /&gt;!&lt;BR /&gt;access-list 9 permit 10.10.5.253 log&lt;BR /&gt;access-list 12 remark Used for SNMP access&lt;BR /&gt;access-list 12 permit 10.10.5.253 log&lt;BR /&gt;access-list 12 permit 10.10.7.253 log&lt;BR /&gt;access-list 12 permit 10.10.6.253 log&lt;BR /&gt;access-list 12 deny&amp;nbsp;&amp;nbsp; any log&lt;BR /&gt;access-list 100 remark auto generated by SDM firewall configuration&lt;BR /&gt;access-list 100 remark SDM_ACL Category=1&lt;BR /&gt;access-list 100 permit udp host 195.184.228.7 eq domain host 212.56.55.189&lt;BR /&gt;access-list 100 permit udp host 8.8.8.8 eq domain host 212.56.55.189&lt;BR /&gt;access-list 100 permit ahp any host 212.56.55.189&lt;BR /&gt;access-list 100 permit esp any host 212.56.55.189&lt;BR /&gt;access-list 100 permit udp any host 212.56.55.189 eq isakmp&lt;BR /&gt;access-list 100 permit udp any host 212.56.55.189 eq non500-isakmp&lt;BR /&gt;access-list 100 permit ip 192.168.208.0 0.0.0.7 10.10.5.0 0.0.0.63&lt;BR /&gt;access-list 100 permit ip 192.168.208.8 0.0.0.7 10.10.5.0 0.0.0.63&lt;BR /&gt;access-list 100 permit icmp 192.168.208.0 0.0.0.7 any log&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 10.12.5.0 0.0.0.255 any&lt;BR /&gt;access-list 100 permit icmp any host 212.56.55.189 echo-reply&lt;BR /&gt;access-list 100 permit icmp any host 212.56.55.189 time-exceeded&lt;BR /&gt;access-list 100 permit icmp any host 212.56.55.189 unreachable&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;BR /&gt;access-list 100 permit ip 192.168.208.0 0.0.0.7 any log&lt;BR /&gt;access-list 102 remark Permit In-Band Mgt SSH access&lt;BR /&gt;access-list 102 remark **FLAK NMS and NMSVs(Site A,B,C)**&lt;BR /&gt;access-list 102 permit tcp host 10.10.5.253 any log&lt;BR /&gt;access-list 102 remark ** HSRP Lan Access **&lt;BR /&gt;access-list 102 permit tcp host 10.12.5.254 any log&lt;BR /&gt;access-list 102 permit tcp host 10.12.5.252 any log&lt;BR /&gt;access-list 102 permit tcp host 10.12.5.251 any log&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;BR /&gt;access-list 150 permit esp any 212.56.55.184 0.0.0.7 log&lt;BR /&gt;access-list 150 permit udp any 212.56.55.184 0.0.0.7 eq isakmp log&lt;BR /&gt;access-list 150 permit icmp any any log&lt;BR /&gt;access-list 150 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;BR /&gt;access-list 160 permit esp any 10.0.0.0 0.0.0.255 log&lt;BR /&gt;access-list 160 permit udp any 10.0.0.0 0.0.0.255 eq isakmp log&lt;BR /&gt;access-list 160 permit icmp any any log&lt;BR /&gt;access-list 160 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;BR /&gt;access-list 199 permit ip host 10.10.5.250 any log&lt;BR /&gt;access-list 199 permit 53 host 10.10.5.250 any log&lt;BR /&gt;access-list 199 permit ip host 10.10.5.253 any log&lt;BR /&gt;access-list 199 permit ip host 10.10.5.249 any log&lt;BR /&gt;access-list 199 permit udp host 10.10.5.253 any log&lt;BR /&gt;access-list 2007 remark LAN Restrictions&lt;BR /&gt;access-list 2007 remark SDM_ACL Category=17&lt;BR /&gt;access-list 2007 permit ahp any host 10.12.5.250&lt;BR /&gt;access-list 2007 permit esp any host 10.12.5.250&lt;BR /&gt;access-list 2007 permit udp any host 10.12.5.250 eq isakmp&lt;BR /&gt;access-list 2007 permit udp any host 10.12.5.250 eq non500-isakmp&lt;BR /&gt;access-list 2007 permit ip 192.168.208.0 0.0.0.7 10.10.5.0 0.0.0.63&lt;BR /&gt;access-list 2007 permit ip 192.168.208.8 0.0.0.7 10.10.5.0 0.0.0.63&lt;BR /&gt;access-list 2007 permit icmp 192.168.208.0 0.0.0.7 any log&lt;BR /&gt;access-list 2007 permit ip 192.168.208.0 0.0.0.7 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 212.56.55.184 0.0.0.7 any&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.255.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 192.0.2.0 0.0.0.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 15.255.255.255 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; ip 240.0.0.0 7.255.255.255 any log&lt;BR /&gt;access-list 2007 remark ****&lt;BR /&gt;access-list 2007 permit esp any 10.0.0.0 0.0.0.255 log&lt;BR /&gt;access-list 2007 permit udp any 10.0.0.0 0.0.0.255 eq isakmp log&lt;BR /&gt;access-list 2007 remark ** Local Nets **&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any echo log&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any parameter-problem log&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any source-quench log&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any echo-reply log&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any time-exceeded log&lt;BR /&gt;access-list 2007 permit icmp 10.12.5.0 0.0.0.255 any unreachable log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any echo log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any parameter-problem log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any source-quench log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any echo-reply log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any time-exceeded log&lt;BR /&gt;access-list 2007 permit icmp 10.10.5.0 0.0.0.255 any unreachable log&lt;BR /&gt;access-list 2007 remark **&amp;nbsp; **&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any echo-reply log&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any time-exceeded log&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any unreachable log&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any echo log&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any parameter-problem log&lt;BR /&gt;access-list 2007 permit icmp 10.12.6.0 0.0.0.255 any source-quench log&lt;BR /&gt;access-list 2007 remark **&amp;nbsp; **&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any echo-reply log&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any time-exceeded log&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any unreachable log&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any echo log&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any parameter-problem log&lt;BR /&gt;access-list 2007 permit icmp 10.10.6.0 0.0.0.255 any source-quench log&lt;BR /&gt;access-list 2007 remark ****&lt;BR /&gt;access-list 2007 permit eigrp 10.12.5.0 0.0.0.255 any log&lt;BR /&gt;access-list 2007 remark ** Switch Uplink **&lt;BR /&gt;access-list 2007 permit tcp 10.12.5.0 0.0.0.255 any log&lt;BR /&gt;access-list 2007 permit udp 10.12.5.0 0.0.0.255 any log&lt;BR /&gt;access-list 2007 permit ip 10.12.5.0 0.0.0.255 any log&lt;BR /&gt;access-list 2007 remark ** Hosts (NMS,SW,Rtr,IPP,NMSV) **&lt;BR /&gt;access-list 2007 permit ip host 10.12.5.250 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.5.250 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.5.250 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.5.251 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.5.251 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.5.251 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.5.252 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.5.252 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.5.252 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.5.253 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.5.253 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.5.253 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.5.254 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.5.254 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.5.254 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.250 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.250 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.250 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.253 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.253 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.253 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.254 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.254 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.254 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.6.250 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.6.250 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.6.250 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.6.251 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.6.251 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.6.251 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.6.252 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.6.252 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.6.252 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.6.253 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.6.253 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.6.253 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.12.6.254 any log&lt;BR /&gt;access-list 2007 permit ip host 10.12.6.254 any log&lt;BR /&gt;access-list 2007 permit udp host 10.12.6.254 any log&lt;BR /&gt;access-list 2007 remark **&amp;nbsp; **&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.60 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.60 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.60 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.62 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.62 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.62 any log&lt;BR /&gt;access-list 2007 remark ** **&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.189 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.189 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.189 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.5.190 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.5.190 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.5.190 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.6.189 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.6.189 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.6.189 any log&lt;BR /&gt;access-list 2007 permit tcp host 10.10.6.190 any log&lt;BR /&gt;access-list 2007 permit udp host 10.10.6.190 any log&lt;BR /&gt;access-list 2007 permit ip host 10.10.6.190 any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; icmp any any log&lt;BR /&gt;access-list 2007 deny&amp;nbsp;&amp;nbsp; udp any any range 33400 34400 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no cdp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;tacacs-server host 10.10.5.253&lt;BR /&gt;tacacs-server host 10.10.6.253&lt;BR /&gt;tacacs-server timeout 30&lt;BR /&gt;tacacs-server directed-request&lt;BR /&gt;tacacs-server key 7 110F15041C&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner login ^C&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;Cisco Router and Security Device Manager (SDM) is installed on this device. &lt;BR /&gt;This feature requires the one-time use of the username "cisco" &lt;BR /&gt;with the password "cisco". The default username and password have a privilege level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;of 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please change these publicly known initial credentials using SDM or the IOS CLI. &lt;BR /&gt;Here are the Cisco IOS commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username &lt;MYUSER&gt;&amp;nbsp; privilege 15 secret 0 &lt;MYPASSWORD&gt;&lt;BR /&gt;no username cisco&lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace &lt;MYUSER&gt; and &lt;MYPASSWORD&gt; with the username and password you want to use.&lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information about SDM please follow the instructions in the QUICK START &lt;BR /&gt;&lt;SPAN&gt;GUIDE for your router or go to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/sdm"&gt;http://www.cisco.com/go/sdm&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 15:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428027#M681215</guid>
      <dc:creator>paulc6512</dc:creator>
      <dc:date>2010-05-07T15:45:09Z</dc:date>
    </item>
    <item>
      <title>Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428028#M681216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;webmail and other web application (search engine, etc) are potentially unsecure &lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;cisco security is too restrictive&lt;/P&gt;&lt;P&gt;Check the right answer ...&lt;/P&gt;&lt;P&gt;To let users access yahoo webmail and so on, you must disable ccp-action-app-http as shown in the picture below&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/8/7/87785-Capture.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 18:46:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428028#M681216</guid>
      <dc:creator>mikael.dautrey</dc:creator>
      <dc:date>2012-04-25T18:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428029#M681217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;He have CBAC configured, not ZFW.&lt;/P&gt;&lt;P&gt;What version of SDM do you have? SDM v2.5 should install ZFW which is much more powerfull. Or you could use Cisco's new CCP which is the replacement of SDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I think if you remove these lines everything should work.&lt;/P&gt;&lt;P&gt;no appfw policy-name SDM_MEDIUM&lt;/P&gt;&lt;P&gt;no application im msn&lt;/P&gt;&lt;P&gt;no application http&lt;/P&gt;&lt;P&gt;no application im yahoo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe not the ultimate solution, but it needs testing if you don't want to remove to much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 21:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428029#M681217</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2012-04-25T21:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco IOS firewall SDM rules issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428030#M681218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right. Implementation differs but principles are the same as in ZFW : deactivate http application layer filtering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2012 06:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ios-firewall-sdm-rules-issues/m-p/1428030#M681218</guid>
      <dc:creator>mikael.dautrey</dc:creator>
      <dc:date>2012-04-26T06:38:29Z</dc:date>
    </item>
  </channel>
</rss>

