Configure Inspection Rules; Apply Access Lists And Inspection Rules To Interfaces - Cisco 520-T1 - Small Business Pro SR Secure Router Software Configuration Manual

Software guide
Table of Contents

Configure Inspection Rules

Configure Inspection Rules
Perform these steps to configure firewall inspection rules for all TCP and UDP traffic, as well as specific
application protocols as defined by the security policy, beginning in global configuration mode:
Command or Action
Step 1
ip inspect name inspection-name protocol
Example:
Router(config)# ip inspect name firewall tcp
Router(config)#
Step 2
ip inspect name inspection-name protocol
Example:
Router(config)# ip inspect name firewall rtsp
Router(config)# ip inspect name firewall h323
Router(config)# ip inspect name firewall
netshow
Router(config)# ip inspect name firewall ftp
Router(config)# ip inspect name firewall
sqlnet
Router(config)#

Apply Access Lists and Inspection Rules to Interfaces

Perform these steps to apply the ACLs and inspection rules to the network interfaces, beginning in global
configuration mode:
Command
Step 1
interface type number
Example:
Router(config)# interface vlan 1
Router(config-if)#
Step 2
ip inspect inspection-name {in | out}
Example:
Router(config-if)# ip inspect firewall in
Router(config-if)#
Step 3
exit
Example:
Router(config-if)# exit
Router(config)#
Cisco Secure Router 520 Series Software Configuration Guide
8-4
Chapter 8
Configuring a Simple Firewall
Purpose
Defines an inspection rule for a particular
protocol.
Repeat this command for each inspection rule
that you wish to use.
Purpose
Enters interface configuration mode for the
inside network interface on your router.
Assigns the set of firewall inspection rules to the
inside interface on the router.
Returns to global configuration mode.
OL-14210-01
Table of Contents
loading

Table of Contents