<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replace &amp;quot;permit any any&amp;quot; with more precise rules without in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532648#M1086491</link>
    <description>&lt;P&gt;Thank you so much&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;! This is exactly what I need!&lt;/P&gt;&lt;P&gt;Funny thing is that I already have a couple of ACL with a rule with the "&lt;EM&gt;log&lt;/EM&gt;" option (this is not fully managed by me), but I never found that until now.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jan 2022 13:57:58 GMT</pubDate>
    <dc:creator>MarcoLazzarotto</dc:creator>
    <dc:date>2022-01-17T13:57:58Z</dc:date>
    <item>
      <title>Replace "permit any any" with more precise rules without causing issue</title>
      <link>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532632#M1086489</link>
      <description>&lt;P&gt;On my ASA I have a network interface on a production VLAN, and that network interface has an ACL where the only rules is a "&lt;EM&gt;&lt;STRONG&gt;access-list ...&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt;&lt;EM&gt;permit ip any any&lt;/EM&gt;&lt;/STRONG&gt;" (because of how was implemented in the past).&lt;/P&gt;&lt;P&gt;Now, for some sort of compliance, &lt;U&gt;I have to remove that stupid rule and instead write down a long list of rules&lt;/U&gt; to "segregate" the VLAN.&lt;/P&gt;&lt;P&gt;Since I have the ASA logging to ElasticSearch, &lt;U&gt;I can easily query Elastic to find what rules to apply&lt;/U&gt;, easy.&lt;/P&gt;&lt;P&gt;Hence the question: when I will write down the long list of rules, at the bottom I will keep the&amp;nbsp;"&lt;STRONG&gt;&lt;EM&gt;permit ip any any&lt;/EM&gt;&lt;/STRONG&gt;" to prevent issues with the production, because I may forgot to add some rule.&lt;/P&gt;&lt;P&gt;&lt;U&gt;How do i know which connections the last rule (permit ip any any) in the list has been applied to?&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could check how many &lt;EM&gt;&lt;STRONG&gt;hitcnt&lt;/STRONG&gt;&lt;/EM&gt; I see on the last rule, but I wouldn't be able to determine what rules I'm missing.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 13:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532632#M1086489</guid>
      <dc:creator>MarcoLazzarotto</dc:creator>
      <dc:date>2022-01-17T13:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: Replace "permit any any" with more precise rules without</title>
      <link>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532640#M1086490</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1194793"&gt;@MarcoLazzarotto&lt;/a&gt; log traffic for the "permit ip any any" rule and send these to your syslog server. "When the &lt;STRONG&gt; &lt;SPAN style="font-weight: normal; font-style: italic;"&gt;log&lt;/SPAN&gt; &lt;/STRONG&gt; option is specified, it generates syslog message &lt;TT&gt;106100&lt;/TT&gt; for the ACE to which it is applied. Syslog message &lt;TT&gt;106100&lt;/TT&gt; is generated for every matching permit or deny ACE flow that passes through the ASA Firewall."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can then filter on that rule/syslog message and determine whether you wish to create additional rules to permit that traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 13:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532640#M1086490</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-17T13:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Replace "permit any any" with more precise rules without</title>
      <link>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532648#M1086491</link>
      <description>&lt;P&gt;Thank you so much&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;! This is exactly what I need!&lt;/P&gt;&lt;P&gt;Funny thing is that I already have a couple of ACL with a rule with the "&lt;EM&gt;log&lt;/EM&gt;" option (this is not fully managed by me), but I never found that until now.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 13:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4532648#M1086491</guid>
      <dc:creator>MarcoLazzarotto</dc:creator>
      <dc:date>2022-01-17T13:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Replace "permit any any" with more precise rules without</title>
      <link>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4585367#M1088920</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I did like you suggested, and the ASA is logging &lt;STRONG&gt;all &lt;/STRONG&gt;the connections.&lt;/P&gt;&lt;P&gt;In the following example, I added the &lt;STRONG&gt;log&lt;/STRONG&gt; option on a &lt;STRONG&gt;permit ip 10.1.10.0 255.255.255.0 any&lt;/STRONG&gt; rule at the bottom of the ACL "&lt;STRONG&gt;prod-linux_acl&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can find this on the logs, which is fine:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;access-list prod-linux_acl permitted tcp prod-linux/10.1.10.10(57822) -&amp;gt; prod-vpn/10.3.33.33(&lt;STRONG&gt;3389&lt;/STRONG&gt;) hit-cnt 1 first hit [0x3bd17c0e, 0x00000000]&lt;BR /&gt;                                                    |      SOURCE   |             | DESTINATION  |&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;but I can also find this kind of logs, which are logs for return connections:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;access-list prod-linux_acl permitted tcp prod-linux/10.1.10.10(&lt;STRONG&gt;8443&lt;/STRONG&gt;) -&amp;gt; prod-vpn/10.3.33.33(60409) hit-cnt 1 first hit [0x3bd17c0e, 0x00000000]&lt;BR /&gt;                                                    | DESTINATION  |            |    SOURCE      |&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;As you can imagine, &lt;U&gt;I only need logs from the first type.&lt;/U&gt;&amp;nbsp;&lt;/SPAN&gt;How can I differentiate "straight" connections from "return" connections?&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 15:34:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/replace-quot-permit-any-any-quot-with-more-precise-rules-without/m-p/4585367#M1088920</guid>
      <dc:creator>MarcoLazzarotto</dc:creator>
      <dc:date>2022-04-04T15:34:15Z</dc:date>
    </item>
  </channel>
</rss>

