If from what you describe, you only want communication between your internet pool devices attached to fe0/0 and your internal LAN devices connected to fe0/1, you can define an ACL to only permit traffic between your IP pool and your internal addresses (don't exclude traffic between your Internet pool and the Internet). Doing this will protect your internal LAN from direct attacks from the Internet, but if someone "captures" one of your Internet pool hosts, they would have access to your LAN.
The latter is harder to control, but the ACL can be expanded to what type of traffic is permitted between your Internet pool devices and the LAN.
Many Cisco routers support a "firewall" feature set, that within their software, allows them to control traffic much like a dedicated firewall appliance.
I'm assuming from your description you have a separate Internet device network segment, but if you mean you have just a pool of Internet addresses and intend for your internal LAN to use those, i.e. the internal LAN desires to communicate with the Internet, things differ.
If this is the case, you NAT between the Internet and your internal LAN. Again, an ACL would be used to control what traffic is allowed to flow in or out. One helpful rule is to allow most TCP outbound, but only accept TCP inbound with the established bit set.
Here too, you would benefit more from having the firewall feature set.
Cisco has some free configuration tools that are provided with some of their routers. They make some of these common complex configuration simple to implement.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...