<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Locking down PAT to a few External addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991702#M922106</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should use access-list and apply it to the outside interface (gig0/0) and only allow specific access.&lt;/P&gt;&lt;P&gt;Remember to configure CBAC if you don't already have one and apply it on the outbound direction on gig0/0 to allow return traffic if traffic is initiated from the internal network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 09 Jun 2012 08:42:28 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-06-09T08:42:28Z</dc:date>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991701#M922105</link>
      <description>&lt;P&gt;Might sound silly..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought I would just apply an ACL to the NAT rule, but the bugger says no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying to lock this :&amp;nbsp; &lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.3.10 3389 interface GigabitEthernet0/0 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Down to only permitted external addresses (for obvious reasons)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Been a long day, so might just be missing the obvious.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991701#M922105</guid>
      <dc:creator>vetsnowit1</dc:creator>
      <dc:date>2020-02-21T12:40:02Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991702#M922106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should use access-list and apply it to the outside interface (gig0/0) and only allow specific access.&lt;/P&gt;&lt;P&gt;Remember to configure CBAC if you don't already have one and apply it on the outbound direction on gig0/0 to allow return traffic if traffic is initiated from the internal network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 08:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991702#M922106</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-09T08:42:28Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991703#M922107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am a bit nervous of the ZBFW and CBAC at the mo as both broke the L2L VPNs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router is only a branch office, and should only be letting in one or 2 services. I would rather stop the other services than break the live config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would this do the trick?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; ip address 146.255.x.x&amp;nbsp; 255.255.x.x&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; ip access-group 199 in&lt;BR /&gt; crypto map l2l&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; ip address 192.168.3.254 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ip nat inside source list 175 interface GigabitEthernet0/0 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.3.10 1723 interface GigabitEthernet0/0 1723&lt;BR /&gt;ip nat inside source static tcp 192.168.3.10 3389 interface GigabitEthernet0/0 3389&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 146.255.x.x&lt;BR /&gt;!&lt;BR /&gt;ip access-list 199&lt;BR /&gt; permit tcp host 92.236.x.x eq 3339 host 192.168.3.10 eq 3389 &lt;BR /&gt; permit tcp host 80.229.x.x eq 3339 host 192.168.3.10 eq 3389&lt;BR /&gt; permit tcp host 208.67.x.x eq 3339 host 192.168.3.10 eq 3389&lt;BR /&gt; permit tcp host 24.234.x.x eq 3339 host 192.168.3.10 eq 3389&lt;BR /&gt; permit tcp host 203.143.x.xeq 3339 host 192.168.3.10 eq 3389&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; permit tcp host 192.168.3.10 eq 3339 any eq 3389&lt;BR /&gt; &lt;BR /&gt; permit ahp any any&lt;BR /&gt; permit esp any any&lt;BR /&gt; permit gre any any&lt;BR /&gt; permit tcp any any eq 443&lt;BR /&gt; permit tcp any any eq cmd&lt;BR /&gt; permit tcp any any eq 22&lt;BR /&gt; Remark PPTP IN&lt;BR /&gt; permit tcp any eq 1723 host 192.168.3.10 eq 1723 log&lt;BR /&gt; remark pptp out&lt;BR /&gt; permit tcp host 192.168.3.10 eq 1723 any eq 1723 log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;REMARK IPSEC L2L Traffic&lt;BR /&gt;access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.100.0 0.0.0.255&lt;BR /&gt;access-list 102 permit ip 192.168.3.0 0.0.0.255 172.16.20.0 0.0.0.255&lt;BR /&gt;access-list 103 permit ip 192.168.3.0 0.0.0.255 192.168.0.0 0.0.0.255&lt;/P&gt;&lt;P&gt;REMARK Stop IPSEC from USING NAT&lt;BR /&gt;access-list 175 deny&amp;nbsp;&amp;nbsp; ip 192.168.3.0 0.0.0.255 192.168.100.0 0.0.0.255&lt;BR /&gt;access-list 175 deny&amp;nbsp;&amp;nbsp; ip 192.168.3.0 0.0.0.255 192.168.0.0 0.0.0.255&lt;BR /&gt;access-list 175 deny&amp;nbsp;&amp;nbsp; ip 192.168.3.0 0.0.0.255 172.16.20.0 0.0.0.255&lt;/P&gt;&lt;P&gt;REMARK Allow outbound LAN traffic for all other traffic VIA NAT&lt;BR /&gt;access-list 175 permit ip 192.168.3.0 0.0.0.255 any&lt;BR /&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 19:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991703#M922107</guid>
      <dc:creator>vetsnowit1</dc:creator>
      <dc:date>2012-06-10T19:08:48Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991704#M922108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the correct syntax for ACL 199:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list 199&lt;/P&gt;&lt;P&gt; permit tcp host 92.236.x.x host 146.255.x.x eq 3389 &lt;/P&gt;&lt;P&gt; permit tcp host 80.229.x.x host 146.255.x.x eq 3389&lt;/P&gt;&lt;P&gt; permit tcp host 208.67.x.x host 146.255.x.x eq 3389&lt;/P&gt;&lt;P&gt; permit tcp host 24.234.x.x host 146.255.x.x eq 3389&lt;/P&gt;&lt;P&gt; permit tcp host 203.143.x.x host 146.255.x.x eq 3389&lt;/P&gt;&lt;P&gt;permit udp any any eq 500&lt;/P&gt;&lt;P&gt;permit udp any any eq 4500&lt;/P&gt;&lt;P&gt;permit esp any any&lt;/P&gt;&lt;P&gt;permit ah any any&lt;/P&gt;&lt;P&gt;permit gre any any&lt;/P&gt;&lt;P&gt;permit tcp any host 146.255.x.x eq 1723&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name out-traffic tcp&lt;/P&gt;&lt;P&gt;ip inspect name out-traffic udp&lt;/P&gt;&lt;P&gt;ip inspect name out-traffic icmp&lt;/P&gt;&lt;P&gt;ip inspect name out-traffic ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; ip inspect out-traffic out&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 03:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991704#M922108</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-11T03:10:18Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991705#M922109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I understand outbound inspection. Seems to work fine. But are you saying I should apply the ACL to the interface inbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I want filter on the ingress traffic and for now let all traffic on the egress &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to allow port 1723, external management and rdp from those IPs. The problem with the CCP tool is for even the basic firewall it adds loads of extra, and adds a deny all traffic outbound at the end for egress..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So should be enough to allow egress&lt;/P&gt;&lt;P&gt;access-list 175 permit ip 192.168.3.0 0.0.0.255 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess I would need an access list of 174 or less for that to work correctly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers again &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2012 17:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991705#M922109</guid>
      <dc:creator>vetsnowit1</dc:creator>
      <dc:date>2012-06-11T17:15:14Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991706#M922110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you don't care about egress traffic, then you don't need to apply any access-list and it would allow everything going outbound.&lt;/P&gt;&lt;P&gt;However, you can configure ACL that only permit 192.168.3.0/24 to go outbound and apply it on gig0/0 on the outbound/egress direction. Use any unique ACL number (174 is OK) as 175 has been used for NAT statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 02:07:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991706#M922110</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-12T02:07:10Z</dc:date>
    </item>
    <item>
      <title>Locking down PAT to a few External addresses</title>
      <link>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991707#M922111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I will have a play with ZBFW, just not on a live system &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2012 07:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/locking-down-pat-to-a-few-external-addresses/m-p/1991707#M922111</guid>
      <dc:creator>vetsnowit1</dc:creator>
      <dc:date>2012-06-12T07:27:11Z</dc:date>
    </item>
  </channel>
</rss>

