<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic IOS firewall configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433098#M733909</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Junaid,&lt;/P&gt;&lt;P&gt;Inspection in ASA firewall works a little bit differently. It is configured under policy-map.&lt;/P&gt;&lt;P&gt;Access-list needs to be applied to the interface using the access-group command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 May 2010 10:42:09 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-05-09T10:42:09Z</dc:date>
    <item>
      <title>Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433089#M733900</link>
      <description>&lt;P&gt;Hi Guys,&amp;nbsp; I have always trusted NAT as my firewall solutions but in the back of my head I've know this is unsecure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I don't want to restrict my users access to the Internet, I would like to make ports hidden on the Internet and secure the Internet connection as much as possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also a quick explanation of the configuration would be much appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS. It is unfortunate and a lacking area in the CCNA to cover ip inspect rules and simple adsl configurations&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433089#M733900</guid>
      <dc:creator>jamesitsolutions</dc:creator>
      <dc:date>2019-03-11T17:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433090#M733901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct.&lt;/P&gt;&lt;P&gt;Many people misinterpret NAT as a security feature. NAT indeed hides the real IPs but it is not a security measure.&lt;/P&gt;&lt;P&gt;The IOS Firewall provides with a lot of security features like ACLs, inspection rules, IPS (although not recommended in software), content filtering, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check most of you need here:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/product_data_sheet09186a0080117962.html"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/product_data_sheet09186a0080117962.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 May 2010 20:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433090#M733901</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-08T20:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433091#M733902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry the forum lost my formatting (paragraphs) on my first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway so far I have created the following and it appears to be working but I would like to confirm it is by what you guys can comment on, the configuration should block any incoming connections except those I allow but allow any outgoing connections and allow any incoming connections initated by a outgoing connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name FIREWALL tcp&lt;/P&gt;&lt;P&gt;ip inspect name FIREWALL udp&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Dialer1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip access-group FIREWALL in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ip inspect FIREWALL out&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended FIREWALL&lt;/P&gt;&lt;P&gt; permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt; permit tcp any any eq 22&lt;/P&gt;&lt;P&gt; permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt; permit tcp any any eq www&lt;/P&gt;&lt;P&gt; permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt; permit tcp any any eq 443&lt;/P&gt;&lt;P&gt; permit tcp any any eq 1723&lt;/P&gt;&lt;P&gt; permit tcp any any eq 3390&lt;/P&gt;&lt;P&gt; permit tcp any any eq 4125&lt;/P&gt;&lt;P&gt; permit esp any any&lt;/P&gt;&lt;P&gt; permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt; permit gre any any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; tcp any any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; udp any any&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 08:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433091#M733902</guid>
      <dc:creator>jamesitsolutions</dc:creator>
      <dc:date>2010-05-09T08:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433092#M733903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are absolutely correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 09:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433092#M733903</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-09T09:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433093#M733904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for confirming &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; would hate to apply it to one of my clients and find it blocks something... problem with small businesses is they don't want things blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any improvements you would make to make it more secure, with out blocking users from doing anything on the Internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 09:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433093#M733904</guid>
      <dc:creator>jamesitsolutions</dc:creator>
      <dc:date>2010-05-09T09:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433094#M733905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the configuration posted, basically you are allowing all outbound traffic, however, restrict inbound traffic to the following: RDP, SSH, mail, web, PPTP, so I would assume that either you have a public ip address range for those servers' services, or you have configured static port address redirection to your Dialer interface ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a static public ip address, I would recommend that instead of configuring "permit tcp any any" on specific ports, I would tighten it even down as follows (assuming your public ip address is 200.1.1.1):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host 200.1.1.1 eq 3389&lt;/P&gt;&lt;P&gt;permit tcp any host 200.1.1.1 eq 22&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 09:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433094#M733905</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-09T09:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433095#M733906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;halijenn wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base on the configuration posted, basically you are allowing all outbound traffic, however, restrict inbound traffic to the following: RDP, SSH, mail, web, PPTP, so I would assume that either you have a public ip address range for those servers' services, or you have configured static port address redirection to your Dialer interface ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a static public ip address, I would recommend that instead of configuring "permit tcp any any" on specific ports, I would tighten it even down as follows (assuming your public ip address is 200.1.1.1):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host 200.1.1.1 eq 3389&lt;/P&gt;&lt;P&gt;permit tcp any host 200.1.1.1 eq 22&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;You are correct those ports are open and I use static NATs to route the ports to the correct devices behind the router. I also use a static public IP address, albit only 1 static IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the benefits of not using 'any' in the ACLs and using the static public IP address instead? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also is there anyway on a 877 running 12.4 to detect port scans and other malicious activity?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help aswell &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 10:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433095#M733906</guid>
      <dc:creator>jamesitsolutions</dc:creator>
      <dc:date>2010-05-09T10:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433096#M733907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ip inspect name FIREWALL tcp&lt;/P&gt;&lt;P&gt;ip inspect name FIREWALL udp&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;P&gt;interface Dialer1&lt;/P&gt;&lt;P&gt;ip access-group FIREWALL in&lt;/P&gt;&lt;P&gt;ip inspect FIREWALL out&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;P&gt;ip access-list extended FIREWALL&lt;/P&gt;&lt;P&gt;permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;permit tcp any any eq www&lt;/P&gt;&lt;P&gt;permit tcp any any eq pop3&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;permit tcp any any eq 1723&lt;/P&gt;&lt;P&gt;permit tcp any any eq 3390&lt;/P&gt;&lt;P&gt;permit tcp any any eq 4125&lt;/P&gt;&lt;P&gt;permit esp any any&lt;/P&gt;&lt;P&gt;permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt;permit gre any any&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; tcp any any&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; udp any any&lt;/P&gt;&lt;P&gt;deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will it work on ASA 5510 ? .. it is not getting the command ip inspect....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 10:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433096#M733907</guid>
      <dc:creator>junshah22</dc:creator>
      <dc:date>2010-05-09T10:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433097#M733908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The benefit would be to only allow connection towards the public ip address instead of towards any ip addresses in your internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;For example&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;An attacker from the outside can go directly to your private ip address on those ports that you have opened if the attacker knows the private ip address range of your internal network. It's just an added security that you can implement to make it a little bit more secure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With port scan, you would need to configure the IOS IPS feature set on your 877 router. Here is a bit more information on IOS IPS for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/product_data_sheet0900aecd803137cf.html"&gt;http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/product_data_sheet0900aecd803137cf.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 10:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433097#M733908</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-09T10:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: Basic IOS firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433098#M733909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Junaid,&lt;/P&gt;&lt;P&gt;Inspection in ASA firewall works a little bit differently. It is configured under policy-map.&lt;/P&gt;&lt;P&gt;Access-list needs to be applied to the interface using the access-group command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 10:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-ios-firewall-configuration/m-p/1433098#M733909</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-09T10:42:09Z</dc:date>
    </item>
  </channel>
</rss>

