<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block port on external ASA interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093475#M1070525</link>
    <description>&lt;P&gt;Are you natting to a device on the inside? The name of your ACL implies this.&lt;/P&gt;
&lt;P&gt;If not and your want to block traffic destined to the ASA itself, then you’ll need a control-plane ACL applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide more information on this “task” in context, it would help understand the requirement easier.&lt;/P&gt;</description>
    <pubDate>Thu, 28 May 2020 10:45:44 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-05-28T10:45:44Z</dc:date>
    <item>
      <title>block port on external ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093436#M1070521</link>
      <description>&lt;P&gt;Hello for everybody.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to allow tcp and udp 123 port on external asa interface from two external ntp servers and block from any other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following acl is currently applied on the external interface&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_NAT extended permit icmp any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT extended permit ip any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT extended permit udp any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT extended permit gre any4 any4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;access-group OUTSIDE_NAT in interface &amp;lt;name_outside_int&amp;gt;&lt;/U&gt;&lt;BR /&gt;access-group OUTSIDE_NAT out interface &amp;lt;name_outside_int&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To block port tcp/udp 123 from external side, i need to create new acl&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_NAT_EXT permit udp host &amp;lt;ip_first_ntp_srv&amp;gt; host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT permit tcp host &amp;lt;ip_first_ntp_srv&amp;gt; host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT permit udp host &amp;lt;ip_second_ntp_srv&amp;gt; host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT permit tcp host &amp;lt;ip_second_ntp_srv&amp;gt; host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT deny udp any4 host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT deny tcp any4 host &amp;lt;asa_ip_outside&amp;gt; eq 123&lt;BR /&gt;access-list OUTSIDE_NAT_EXT extended permit icmp any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT_EXT extended permit ip any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT_EXT extended permit udp any4 any4&lt;BR /&gt;access-list OUTSIDE_NAT_EXT extended permit gre any4 any4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And implement it in "in" direction of external asa interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;access-group OUTSIDE_NAT_EXT in interface &amp;lt;name_outside_int&amp;gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this correct?&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 09:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093436#M1070521</guid>
      <dc:creator>kapydan88</dc:creator>
      <dc:date>2020-05-28T09:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: block port on external ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093459#M1070522</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;I assume this ACL for traffic "through" the ASA and not "to" the ASA?&lt;BR /&gt;If traffic is going through the ASA and being NATTED, then you need to reference the real (private) ip address of the host, not the ASA's outside interface.&lt;BR /&gt;&lt;BR /&gt;As you've defined a new ACL, you can only have 1 ACL applied to an interface in 1 direction, the existing ACL will no longer be applied "in" on the outside interface. &lt;BR /&gt;Yes, the direction will be "in"&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 10:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093459#M1070522</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-28T10:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: block port on external ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093468#M1070524</link>
      <description>&lt;P&gt;Thanks for answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current task sounds like "block tcp 123 and udp 123 for the external ip address of the asa and allow it only from two external ntp servers"...&amp;nbsp;&amp;nbsp;May be im wrong, but this is implemented through the acl on external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"As you've defined a new ACL, you can only have 1 ACL applied to an interface in 1 direction, the existing ACL will no longer be applied "in" on the outside interface" - yes off course, asa works like router "only one acl in one direction".&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 10:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093468#M1070524</guid>
      <dc:creator>kapydan88</dc:creator>
      <dc:date>2020-05-28T10:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: block port on external ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093475#M1070525</link>
      <description>&lt;P&gt;Are you natting to a device on the inside? The name of your ACL implies this.&lt;/P&gt;
&lt;P&gt;If not and your want to block traffic destined to the ASA itself, then you’ll need a control-plane ACL applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Provide more information on this “task” in context, it would help understand the requirement easier.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 10:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093475#M1070525</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-28T10:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: block port on external ASA interface</title>
      <link>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093490#M1070526</link>
      <description>&lt;P&gt;In this particular case outside_nat - name of external asa interface. Thats why&amp;nbsp;this acl that exists on it is called OUTSIDE_NAT. Yes, it has NAT implemented on it for pc/users/servers in inside part.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case if you use the control-plane acl, you must add "control-plane" in the and of access-group?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_NAT_EXT in interface &amp;lt;name_outside_int&amp;gt; &lt;U&gt;control-plane&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2020 10:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-port-on-external-asa-interface/m-p/4093490#M1070526</guid>
      <dc:creator>kapydan88</dc:creator>
      <dc:date>2020-05-28T10:50:45Z</dc:date>
    </item>
  </channel>
</rss>

