[nsp] IOS Firewall Issues

rpcbind at speakeasy.net rpcbind at speakeasy.net
Tue Apr 8 14:44:39 EDT 2003


> In addition, you will want to limit the amount of traffic you inspect.
> If you inspect to much, you can actually trick the router to thinking it
> is under attack and it will deny that traffic access.

Short of limiting protocol inspection, is anyone aware of a way (or future 
feature) to apply an acl to inspected traffic? There's atleast a couple of 
instances when due to traffic volume, etc it was desirable to have ip inspect 
skip a set of addresses altogether, relying on traditional acl'ing instead..

  ip inspect name <name> list <acl>

On the subject, it'd be handy if ranges for 'ip inspect name <name> <service>
timeout' matched 'ip nat translation timeout'. 12 hours is alot for an idle
session, but being able to do 72 hour timeouts would be nice for things left 
doing nothing over a weekend..





More information about the cisco-nsp mailing list