<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Simple ACL help on Cisco ASA (packet tracer) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198653#M1065514</link>
    <description>&lt;P&gt;I'm learning how to configure a Cisco ASA using packet tracer and I have a very simple set of rules I need to add. I have other rules to add, as well, but I would like to use these to ask for help so I can know how to begin.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Not allow any incoming connections&lt;/LI&gt;
&lt;LI&gt;Not allow any&amp;nbsp;access to the external internet from internal&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Systems be able to ping a particular server outside the&amp;nbsp;firewall&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I think I have my firewall configured correctly thus far. I've included my config below. I'm pretty lost as to how to begin and what order I need to place the rules. I've been doing my research but I'm still confused. Thank you very much!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/3&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/4&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/6&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/7&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 35.32.17.254 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 32.35.17.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list inside extended permit icmp any any&lt;/P&gt;
&lt;P&gt;access-list outside extended permit icmp any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group outside in interface outside&lt;/P&gt;
&lt;P&gt;access-group outside in interface inside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;/P&gt;
&lt;P&gt;ssh timeout 5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd address 35.32.17.50-35.32.17.99 inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 17.35.32.153 interface inside&lt;/P&gt;
&lt;P&gt;dhcpd enable inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:29:45 GMT</pubDate>
    <dc:creator>cisconotdisco</dc:creator>
    <dc:date>2020-02-21T14:29:45Z</dc:date>
    <item>
      <title>Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198653#M1065514</link>
      <description>&lt;P&gt;I'm learning how to configure a Cisco ASA using packet tracer and I have a very simple set of rules I need to add. I have other rules to add, as well, but I would like to use these to ask for help so I can know how to begin.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Not allow any incoming connections&lt;/LI&gt;
&lt;LI&gt;Not allow any&amp;nbsp;access to the external internet from internal&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Systems be able to ping a particular server outside the&amp;nbsp;firewall&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I think I have my firewall configured correctly thus far. I've included my config below. I'm pretty lost as to how to begin and what order I need to place the rules. I've been doing my research but I'm still confused. Thank you very much!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/3&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/4&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/6&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/7&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 35.32.17.254 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 32.35.17.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list inside extended permit icmp any any&lt;/P&gt;
&lt;P&gt;access-list outside extended permit icmp any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group outside in interface outside&lt;/P&gt;
&lt;P&gt;access-group outside in interface inside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;telnet timeout 5&lt;/P&gt;
&lt;P&gt;ssh timeout 5&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd address 35.32.17.50-35.32.17.99 inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 17.35.32.153 interface inside&lt;/P&gt;
&lt;P&gt;dhcpd enable inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198653#M1065514</guid>
      <dc:creator>cisconotdisco</dc:creator>
      <dc:date>2020-02-21T14:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198655#M1065515</link>
      <description>&lt;P&gt;Here are some suggestions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list inside extended permit icmp any any&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list outside extended permit icmp any any&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;!&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-group outside in interface outside&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-group outside in interface inside&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't need the outside ACL and associated access-group command. Since outside is untrusted nothing is allowed in by default unless it is part of an established connection or flow.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You incorrectly refer to the outside ACL in applying an ACL to inside interface. Furthermore that ACL should be more specific since you said you only want to be able to ping a specific server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally you haven't shown us all of the config. There is a service-policy section in which you will need to specify icmp inspect. That will allow the icmp echo replies from your pings (icmp echo requests) to come back in through the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2017 03:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198655#M1065515</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-14T03:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198743#M1065516</link>
      <description>&lt;P&gt;Thank you for your feedback! I have a few&amp;nbsp;quick questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;When I create/add to a list (ex: "access-list inside...."), that adds to the list in the order it was added, correct?&lt;/LI&gt;
&lt;LI&gt;When I create an access group, ex: "&lt;SPAN&gt;access-group outside in interface inside", that applies whatever is in that list (ex. access-list outside), to the inside interface (so everything inside the firewall). Is that correct?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;So, for me to not allow incoming connections from outside, I can just remove the outside ACL because of the implicit deny?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;And, to not allow access to the external internet, I can create a policy in my "access-group inside" to block traffic on port 80 and 443?&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks again!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2017 14:26:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198743#M1065516</guid>
      <dc:creator>cisconotdisco</dc:creator>
      <dc:date>2017-10-14T14:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198751#M1065517</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If you dont want to access anything on the internet you need just not config anything. Firewall will deny by default.&lt;/P&gt;
&lt;P&gt;If you want to ping a host on the Internet you need to add a route on the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I understood that you are using Cisco Packet Tracer right? If does, this is a very simple firewall. You dont have packet inspect, for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2017 15:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198751#M1065517</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-10-14T15:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198759#M1065518</link>
      <description>&lt;P&gt;OK, this is making more sense.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, I'm using packet tracer. So to ping to a specific server I just need to create a rule for inside traffic?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list inside permit icmp &amp;lt;insert IP&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;Then, I need to apply it to the "access-group outside in interface outside".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I need to remove the following, correct?&lt;/P&gt;
&lt;P&gt;"access-list inside extended permit icmp any any&lt;/P&gt;
&lt;P&gt;access-list outside extended permit icmp any any"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!!&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2017 15:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198759#M1065518</guid>
      <dc:creator>cisconotdisco</dc:creator>
      <dc:date>2017-10-14T15:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: Simple ACL help on Cisco ASA (packet tracer)</title>
      <link>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198761#M1065519</link>
      <description>&lt;P&gt;Yeah. That's correct.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, make sure it can route.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;When playing with packet tracer you have the simulation mode where you can see the packet going back and forth and what it is wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Try that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;</description>
      <pubDate>Sat, 14 Oct 2017 15:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-acl-help-on-cisco-asa-packet-tracer/m-p/3198761#M1065519</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-10-14T15:54:56Z</dc:date>
    </item>
  </channel>
</rss>

