<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Rules - ASA5508-X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040861#M1067388</link>
    <description>&lt;P&gt;Not sure if this will help, but here is what I am trying to do:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source&amp;nbsp; &amp;nbsp; Destination&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SOURCE PORT&amp;nbsp;&amp;nbsp;&amp;nbsp; DEST PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALLOW/DENY&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com&amp;nbsp; &amp;nbsp;http80&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Deny&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com &amp;nbsp; https443&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Deny&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com&amp;nbsp; &amp;nbsp;https444 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; https443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;</description>
    <pubDate>Thu, 05 Mar 2020 13:03:52 GMT</pubDate>
    <dc:creator>wynneitmgr</dc:creator>
    <dc:date>2020-03-05T13:03:52Z</dc:date>
    <item>
      <title>Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4038527#M1067193</link>
      <description>&lt;P&gt;I am new to managing Cisco Firewalls, so any help would be appreciated. We have a Cisco ASA5508-X that I manage with Cisco ADSM 7.9. We have a few locally hosted web applications on our web server. I would like to make most of the applications private (viewable only on our network) and I need a couple of the web applications to be made public so you can view from outside the network. I need help setting up the following rules in Cisco ASDM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall Rules:&lt;/P&gt;&lt;P&gt;Public: http: port 81, https: 444 allow ports 81/444 to WAN&lt;BR /&gt;Private: http: port 80, https: 443, block ports 80/443 to WAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 13:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4038527#M1067193</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-03-02T13:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4038956#M1067214</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Are the web applications new or already existing?&lt;BR /&gt;When you say accessible from your internal network, do you have multiple zones or everything is sitting behind the same zone (users and servers).&lt;BR /&gt;Can you share your config in order to help you with the correct acl to put in place?&lt;BR /&gt;&lt;BR /&gt;For allowing outside hosts (internet) to access your internal web apps, it's quite straightforward. If you share your config and tell us on which zone are your web apps sitting, i can help you with the correct cli commands to setup to achieve it.</description>
      <pubDate>Tue, 03 Mar 2020 00:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4038956#M1067214</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-03-03T00:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040861#M1067388</link>
      <description>&lt;P&gt;Not sure if this will help, but here is what I am trying to do:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source&amp;nbsp; &amp;nbsp; Destination&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SOURCE PORT&amp;nbsp;&amp;nbsp;&amp;nbsp; DEST PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ALLOW/DENY&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com&amp;nbsp; &amp;nbsp;http80&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Deny&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com &amp;nbsp; https443&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Deny&lt;/P&gt;&lt;P&gt;WAN&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;myserver.domain.com&amp;nbsp; &amp;nbsp;https444 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; https443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 13:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040861#M1067388</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-03-05T13:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040927#M1067394</link>
      <description>We would not normally expect to know the source port of a tcp connection.
Do you mean the original destination ports could be 80 or 443 (block) or 444 (allow and translate to 443 on the server itself)?
If so a NAT rule and ACL entry in an access-list applied to the outside interface would suffice.</description>
      <pubDate>Thu, 05 Mar 2020 14:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040927#M1067394</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-03-05T14:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040934#M1067395</link>
      <description>&lt;P&gt;Yes, that is what I need to do. However, I have played around with NAT rules and Access Rules but just not sure if I am doing them correctly. Thanks for any assistance.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 14:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040934#M1067395</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-03-05T14:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040969#M1067398</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Use these documents for guidance:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/118996-config-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/118996-config-asa-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html?referring_site=RE&amp;amp;pos=1&amp;amp;page=https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/118996-config-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html?referring_site=RE&amp;amp;pos=1&amp;amp;page=https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/118996-config-asa-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 15:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4040969#M1067398</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-05T15:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Rules - ASA5508-X</title>
      <link>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4041212#M1067417</link>
      <description>By default, if you don't open ports on your outside acl, these ports won't be accessible. So you'll need to open for allowed nat.&lt;BR /&gt;Is the public IP the one sitting on ASA interface or a dedicated IP? After that, we can give you a config sample on how to do nat.&lt;BR /&gt;However, without your config, you'll need to place it at the right place to not be overlapped by another nat.</description>
      <pubDate>Thu, 05 Mar 2020 19:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-rules-asa5508-x/m-p/4041212#M1067417</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-03-05T19:53:38Z</dc:date>
    </item>
  </channel>
</rss>

