<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FortiGate like session tracking ACL in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/fortigate-like-session-tracking-acl/m-p/4309355#M566240</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been using FortiGate for my firewall choice and would recently like to switch to cisco ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one thing that I noticed from the FortiGate, is that it does not have ACLs, instead, it has something called Policy to filter the IPv4/IPv6 packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, ACLs are straight forward in terms of packet filtering. You specify the condition, bind it towards a certain direction of an interface. it's works like a filter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when digging deeper into understanding the difference between Fortigate Policy and Cisco ACLs (actually ACLs in general, I only see policy on Fortigate). There's a feature called session tracking which I found pretty useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In short, when applying an allow policy, not only does Fortigate allow the packet to pass from the source interface to destination interface (you have to specify 2 interfaces), it also tracks the session so that the reply packet in reverse direction gets allowed as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In user friendly terms, this becomes useful since I can simply put an allow policy from host A (connected to interface A) to host B (connected to interface B), so that host A can initiate network session talks such as SSH, ICMP, etc while host B cannot do the samething backwards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that I'm trying to replace the Fortigate with Cisco ASA, is there a similar feature of which I can utilize and achieve the same effect?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Thu, 18 Mar 2021 02:33:46 GMT</pubDate>
    <dc:creator>shengkangjin</dc:creator>
    <dc:date>2021-03-18T02:33:46Z</dc:date>
    <item>
      <title>FortiGate like session tracking ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-like-session-tracking-acl/m-p/4309355#M566240</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been using FortiGate for my firewall choice and would recently like to switch to cisco ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one thing that I noticed from the FortiGate, is that it does not have ACLs, instead, it has something called Policy to filter the IPv4/IPv6 packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, ACLs are straight forward in terms of packet filtering. You specify the condition, bind it towards a certain direction of an interface. it's works like a filter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when digging deeper into understanding the difference between Fortigate Policy and Cisco ACLs (actually ACLs in general, I only see policy on Fortigate). There's a feature called session tracking which I found pretty useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In short, when applying an allow policy, not only does Fortigate allow the packet to pass from the source interface to destination interface (you have to specify 2 interfaces), it also tracks the session so that the reply packet in reverse direction gets allowed as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In user friendly terms, this becomes useful since I can simply put an allow policy from host A (connected to interface A) to host B (connected to interface B), so that host A can initiate network session talks such as SSH, ICMP, etc while host B cannot do the samething backwards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that I'm trying to replace the Fortigate with Cisco ASA, is there a similar feature of which I can utilize and achieve the same effect?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="ms-editor-squiggler"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Mar 2021 02:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-like-session-tracking-acl/m-p/4309355#M566240</guid>
      <dc:creator>shengkangjin</dc:creator>
      <dc:date>2021-03-18T02:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: FortiGate like session tracking ACL</title>
      <link>https://community.cisco.com/t5/network-access-control/fortigate-like-session-tracking-acl/m-p/4309446#M566244</link>
      <description>&lt;PRE&gt;n user friendly terms, this becomes useful since I can simply put an allow policy from host A (connected to interface A) to host B (connected to interface B), so that host A can initiate network session talks such as SSH, ICMP, etc while host B cannot do the samething backwards.&lt;/PRE&gt;
&lt;P&gt;if i understand correctly same thing works with ASA its stateful firewall,&amp;nbsp; when you enable stateful inspection&amp;nbsp; - it automatically tracks the connection from inside to destination and maintains a state table.(not other way around.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for reference : (hope this what you looking ?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-overview.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 07:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/fortigate-like-session-tracking-acl/m-p/4309446#M566244</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-03-18T07:54:17Z</dc:date>
    </item>
  </channel>
</rss>

