Because the Cisco IOS Firewall uses Cisco IOS access control lists (ACLs) as the first line of defense on packets entering the router, if logging is enabled on an interface ACL entry that is permitting packets to get to the firewall, you may see that a packet is logged as being allowed. This log message can be ignored and for the disposition of the packet by the firewall, you should look for a subsequent log message displayed by the firewall.
To see the packets that are dropped by the firewall, the ip inspect log drop-pkt command must be enabled.
I'm working on a project that includes basic router configurations. I configurated everything including: line console 0, line vty 0 15 and secret passwords. There are 3 routers in the network and every LAN is going t...
Desire to create Terminal Server ("TS" in this document) out of 2811 Cisco Router with HWIC-16A card (with Octal cables)
Desire to use SSH over Telnet
TS is ip'ed, SSH access configured (to the TS)
Python based Script to BULK Import/Delete devices using Cisco Prime API
Check my Repo on GitHub for all the details ( see below link )