Skip to main content

Firewall Configuration

Configuring a Simple Firewall


The Cisco 1800 integrated services routers support network traffic filtering by means of access lists. The router also supports packet inspection and dynamic temporary access lists by means of Context-Based Access Control (CBAC).
Basic traffic filtering is limited to configured access list implementations that examine packets at the network layer or, at most, the transport layer, permitting or denying the passage of each packet through the firewall. However, the use of inspection rules in CBAC allows the creation and use of dynamic temporary access lists. These dynamic lists allow temporary openings in the configured access lists at firewall interfaces. These openings are created when traffic for a specified user session exits the internal network through the firewall. The openings allow returning traffic for the specified session (that would normally be blocked) back through the firewall.
.

8-1 Router with Firewall Configured
1.    Multiple networked devices—Desktops, laptop PCs, switches.
2.    Fast Ethernet LAN interface (the inside interface for NAT)
3.    PPPoE or PPPoA client and firewall implementation—Cisco 1811/1812 or Cisco 1801/1802/1803 series integrated services router, respectively
4.    Point at which NAT occurs
5.    Protected network
6.    Unprotected network
7.    Fast Ethernet or ATM WAN interface (the outside interface for NAT)
In the configuration example that follows, the firewall is applied to the outside WAN interface (FE0) on the Cisco 1811 or Cisco 1812 and protects the Fast Ethernet LAN on FE2 by filtering and inspecting all traffic entering the router on the Fast Ethernet WAN interface FE1. Note that in this example, the network traffic originating from the corporate network, network address 10.1.1.0, is considered safe traffic and is not filtered.
Configuration Tasks
Perform the following tasks to configure this network scenario:
·                 Configure Access Lists
·                 Configure Inspection Rules
·                 Apply Access Lists and Inspection Rules to Interfaces
More Click on:- http://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/firewall.html


Comments

Popular posts from this blog

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

Tech Purchase Decision Making

  Research Methods for Finding Reliable Product Reviews Start with professional tech review sites like TechRadar, GSMArena, and The Verge for comprehensive tech product analysis. These platforms maintain editorial standards and often conduct hands-on testing before publishing reviews. YouTube channels from established tech reviewers offer visual unboxing videos and real-world usage demonstrations that reveal details traditional written reviews might miss. Cross-reference multiple sources to get a balanced perspective. Reddit communities like r/Android, r/technology, and product-specific subreddits provide unfiltered user experiences. Amazon verified purchase reviews help identify common issues, but focus on detailed reviews rather than single-sentence ratings. Check manufacturer forums and official support pages to understand known issues and firmware update histories. Professional review aggregators like Metacritic compile scores from multiple sources, giving you a consolidated vi...

OSI MODEL (Open Systems Interconnection model )

To Day I Explain OSI MODEL,   Open Systems Interconnection model  ( OSI ) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into  abstraction  layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1. The model groups communication functions into seven logical layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of that path. Two instances at one layer are connected by a horizontal connection on that layer.  The Below Shown Diagram is helpful to understand the OSI seven Layer Model. OSI MODEL EXPLANATION Th...