<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny connection from specific ouside IP to specific inside IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329136#M1064120</link>
    <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the reply but I do not want to use NAT and our IOS is 8.0 so no chance of adding the objects required. I have resorted to modifying the individual inside servers' firewalls to block the outside IP ranges.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Vlad&lt;/P&gt;</description>
    <pubDate>Mon, 12 Feb 2018 05:45:48 GMT</pubDate>
    <dc:creator>vladimirguan</dc:creator>
    <dc:date>2018-02-12T05:45:48Z</dc:date>
    <item>
      <title>Deny connection from specific ouside IP to specific inside IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329099#M1064118</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an ASA 5540 which I want to block certain outside IPs say, 10.190.1.0/24 to access certain inside IP, say 10.199.10.5. Can I achieve this with an ACL? I can do it with the firewall at 10.199.10.5 but prefer for it to be all done inside the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TIA,&lt;/P&gt;
&lt;P&gt;Vlad&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:19:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329099#M1064118</guid>
      <dc:creator>vladimirguan</dc:creator>
      <dc:date>2020-02-21T15:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Deny connection from specific ouside IP to specific inside IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329110#M1064119</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, to allow outside subnets (from internet?) To access inside, you have to Nat your inside host to a public ip to allow remote public hosts to find the route to access your network.&lt;/P&gt;
&lt;P&gt;Once done, you can then add an ace into your outside acl to allow specific public subnet to access your internal host.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is that explanation clear?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In terms of config example, let's say you will nat your host to public ip 1.1.1.1 and your outside acl is called outside_in&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Object network InsideHost&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.199.10.5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;nat (inside,outside) static 1.1.1.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;object group PublicAuthzInsideHost&lt;/P&gt;
&lt;P&gt;&amp;nbsp;subnet 10.190.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_in extended permit ip object&amp;nbsp;PublicAuthzInsideHost object&amp;nbsp;InsideHost&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 03:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329110#M1064119</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-02-12T03:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Deny connection from specific ouside IP to specific inside IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329136#M1064120</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the reply but I do not want to use NAT and our IOS is 8.0 so no chance of adding the objects required. I have resorted to modifying the individual inside servers' firewalls to block the outside IP ranges.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Vlad&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 05:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329136#M1064120</guid>
      <dc:creator>vladimirguan</dc:creator>
      <dc:date>2018-02-12T05:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: Deny connection from specific ouside IP to specific inside IP</title>
      <link>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329144#M1064121</link>
      <description>&lt;P&gt;I just realised there was a way to do this which is via routes. So basically, create a route for the outside interface to route specific IP addresses to 0.0.0.0.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 06:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-connection-from-specific-ouside-ip-to-specific-inside-ip/m-p/3329144#M1064121</guid>
      <dc:creator>vladimirguan</dc:creator>
      <dc:date>2018-02-12T06:12:29Z</dc:date>
    </item>
  </channel>
</rss>

