<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 ACL Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797084#M1008120</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list 8312_out is fine. It allows any host to connect to port 8312 on host x.x.x.x &lt;/P&gt;&lt;P&gt;You need to apply this on the inside interface ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 8312_out in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) access-list 8323_in just needs clarifying. This access-list at present allows host x.x.x.x to talk to any host internally on port 8323. &lt;/P&gt;&lt;P&gt;Is this what you want or do you want to allow the host x.x.x.x with a source port of 8323 to talk to any host on any port inside your network ( hopefully not) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway  you have applied this correctly on the right interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Every access-list has an implicit deny at the end. You need to be aware of this especially on your 8312_out access-list. if you apply as is on the inside interface you have effectivley stopped all outbound traffic except for traffic to host x.x.x.x on 8312 ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Apr 2007 13:48:39 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-04-05T13:48:39Z</dc:date>
    <item>
      <title>PIX 501 ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797083#M1008119</link>
      <description>&lt;P&gt;Here is what I'm trying to accomplish.  I want to permit outgoing connections to host x.x.x.x over UDP port 8312, and I want to permit incoming connections from host x.x.x.x over UDP port 8323.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I implement this correctly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 8312_out permit udp any host x.x.x.x eq 8312&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 8323_in permit udp host x.x.x.x any eq 8323&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 8312_out in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 8323_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797083#M1008119</guid>
      <dc:creator>jstreet555</dc:creator>
      <dc:date>2019-03-11T09:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797084#M1008120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) access-list 8312_out is fine. It allows any host to connect to port 8312 on host x.x.x.x &lt;/P&gt;&lt;P&gt;You need to apply this on the inside interface ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 8312_out in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) access-list 8323_in just needs clarifying. This access-list at present allows host x.x.x.x to talk to any host internally on port 8323. &lt;/P&gt;&lt;P&gt;Is this what you want or do you want to allow the host x.x.x.x with a source port of 8323 to talk to any host on any port inside your network ( hopefully not) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway  you have applied this correctly on the right interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Every access-list has an implicit deny at the end. You need to be aware of this especially on your 8312_out access-list. if you apply as is on the inside interface you have effectivley stopped all outbound traffic except for traffic to host x.x.x.x on 8312 ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 13:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797084#M1008120</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-04-05T13:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797085#M1008121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, this is not correct !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can just have one ACL on the outside interface. The flow from the inside interface to the outside is allowed by default so do not configure an ACL otherwise you need to define all inside to outside traffic rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need also a static NAT or PAT to translate the outside PIX IP to the inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example with PAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-acl permit udp host x.x.x.x interface outside eq 8323 &lt;/P&gt;&lt;P&gt;access-group outside-acl in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 8323 LOCAL-IP 8323 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;wr mem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eample with NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-acl permit udp host x.x.x.x host YourPubIP eq 8323&lt;/P&gt;&lt;P&gt;access-group outside-acl in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) YourPubIP Your-LocalIP netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;wr mem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 13:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797085#M1008121</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2007-04-05T13:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797086#M1008122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Patrick,&lt;/P&gt;&lt;P&gt;Thanks for pointing out I only need one ACL.  I understand why.  Not sure why I made two, actually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why exactly do I need a static NAT / PAT to translate the outside address to the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Jonathan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 15:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797086#M1008122</guid>
      <dc:creator>jstreet555</dc:creator>
      <dc:date>2007-04-05T15:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 ACL Help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797087#M1008123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jonathan &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies for not pointing out you don't actually have to have an access-list on the inside interface. I assumed you were trying to restrict outbound as well as inbound traffic. My mistake. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need a static translation to present the inside server address as a public ip address on the outside or connections initiated from the outside will not be able to contact the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 19:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-acl-help/m-p/797087#M1008123</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-04-05T19:04:08Z</dc:date>
    </item>
  </channel>
</rss>

