<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAT on 2851 router in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775479#M965095</link>
    <description>&lt;P&gt;Hello, I have PAT configured on a 2851 router, I have to create an access list that restricts the "outside world". I allowed HTTP to come into my network, but since this interface has PAT configured it is using dynamic ports for conversations and the ACL is blocking incoming HTTP traffic, I tried using the established command but that still does not work. Can anyone help me out with this? Any help would be greatly appreciated. Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 10:57:40 GMT</pubDate>
    <dc:creator>bsudol79p</dc:creator>
    <dc:date>2019-03-11T10:57:40Z</dc:date>
    <item>
      <title>PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775479#M965095</link>
      <description>&lt;P&gt;Hello, I have PAT configured on a 2851 router, I have to create an access list that restricts the "outside world". I allowed HTTP to come into my network, but since this interface has PAT configured it is using dynamic ports for conversations and the ACL is blocking incoming HTTP traffic, I tried using the established command but that still does not work. Can anyone help me out with this? Any help would be greatly appreciated. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775479#M965095</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2019-03-11T10:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775480#M965098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 14:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775480#M965098</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T14:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775481#M965104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are you using http incoming for all the systems or for only 1 particular server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 14:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775481#M965104</guid>
      <dc:creator>4mdvoters</dc:creator>
      <dc:date>2007-08-14T14:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775482#M965107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is the interface to the INternet That has PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Serial0/0/0.165 point-to-point&lt;/P&gt;&lt;P&gt; bandwidth 1536&lt;/P&gt;&lt;P&gt; ip address x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt; ip access-group 104 in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; frame-relay interface-dlci 165 IETF   &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the access list that is on the S 0/0/0.165 inbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp any gt 1023 any established&lt;/P&gt;&lt;P&gt;access-list 104 deny   tcp any any eq telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 15:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775482#M965107</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2007-08-14T15:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775483#M965115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the T1 is used for browsing and nothing else&lt;/P&gt;&lt;P&gt;I want to allow all http from anywhere, PAT uses the dynamic ports so I don't know how to configure the ACL to allow the HTTP conversations. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 15:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775483#M965115</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2007-08-14T15:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775484#M965118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, you don't block ports with PAT. Can you post your NAT/PAT config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the mean time try this ACL config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Serial0/0/0.165 point-to-point&lt;/P&gt;&lt;P&gt;ip access-group 104 out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp "Your Network" any eq www&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp "Your Network" any eq 443&lt;/P&gt;&lt;P&gt;access-list 104 permit tcp "Your Network" gt 1023 any established&lt;/P&gt;&lt;P&gt;access-list 104 deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 16:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775484#M965118</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T16:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775485#M965121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the PAT statement&lt;/P&gt;&lt;P&gt;ip nat inside source list 103 interface Serial0/0/0.165 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the access list to identify network for the PAT&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 172.23.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The HTTP traffic is blocked when I apply the access list 104 which is the access-list to block the outside world. Once I remore the access list traffic goes through, that is why I am pointing the problem to the access-list. Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 17:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775485#M965121</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2007-08-14T17:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775486#M965123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT is good. Since you are using NAT the outside world won't have access to the inside network. That's how NAT works. If you want restrict what the clients in your inside can access in the Outside you can use acl applied to the serial interface outbound or to the fastethernet inbound. You can use acl's to restrict traffic from the outside towards the inside with something like these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Serial0/0/0.165 point-to-point&lt;/P&gt;&lt;P&gt;bandwidth 1536&lt;/P&gt;&lt;P&gt;ip address x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;ip access-group 107 in&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;frame-relay interface-dlci 165 IETF &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 42 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 95 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 5730 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   udp any any eq 5800 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 5900 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 6101 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any range 6661 6669 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any range 6711 6712 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 6776 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 7000 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any range 12345 12346 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 16660 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   udp any any eq 27444 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 27665 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 31027&lt;/P&gt;&lt;P&gt;access-list 107 deny   udp any any eq 31335 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any range 31337 31338 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any range 32700 32900 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 33270 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 39168 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 47017 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 65000 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   tcp any any eq 65301 log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 0.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip host 255.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 127.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 10.0.0.0 0.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 172.16.0.0 0.15.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 192.168.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 169.254.0.0 0.0.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 192.0.2.0 0.0.0.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 224.0.0.0 15.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 240.0.0.0 7.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip 248.0.0.0 7.255.255.255 any log&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip X.X.X.X X.X.X.X any log&lt;/P&gt;&lt;P&gt;access-list 107 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 107 permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list 107 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 107 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 107 permit ip any x.x.x.x x.x.x.x &amp;lt;------Your Public Address&lt;/P&gt;&lt;P&gt;access-list 107 deny   ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use these on premise routers for anti-spoofing deny port that are require by a the security policy. But since you are using the outside don't have access to the inside unless you to do a static nat or port forwarding.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775486#M965123</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T18:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775487#M965124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot!!!! So you are saying that since this is a NAT interface I do not have to apply an access-list to block the Outside World to my internal network since the NAT will block it anyway. And I should just&lt;/P&gt;&lt;P&gt;use the acl 107 you provided for spoofing right? Thanks for all the help!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775487#M965124</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2007-08-14T18:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775488#M965125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty much, you can change the ACL anyway you want.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775488#M965125</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T18:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775489#M965129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's nothing wrong with blocking incoming traffic from spoofed addresses, even if NAT is in use.  However, I would argue that you don't need to enable logging on all those ACE's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775489#M965129</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-08-14T18:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775490#M965132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to know more about NAT check these links:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6640/products_ios_protocol_group_home.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6640/products_ios_protocol_group_home.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a0080091cb9.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a0080091cb9.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775490#M965132</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T18:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775491#M965134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for all of your help. I learned a lot for you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:57:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775491#M965134</guid>
      <dc:creator>bsudol79p</dc:creator>
      <dc:date>2007-08-14T18:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: PAT on 2851 router</title>
      <link>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775492#M965136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know, it's just a required evil in my job.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 18:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-on-2851-router/m-p/775492#M965136</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T18:59:10Z</dc:date>
    </item>
  </channel>
</rss>

