<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outgoing ACL on OUTSIDE kills IPSec traffic ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552903#M1087461</link>
    <description>&lt;P&gt;You mean you lost connectivity from inside to those remote endpoints?, if so I would think this is expected. The ACL you applied would only allow the traffic from the servers defined into the object group INTERNAL-SERVERS to go out of the OUTSIDE interface. As there is an implicit deny rule on the ACL, any other traffic will be denied.&lt;/P&gt;
&lt;P&gt;The way how I would deal with this scenario would be to create a couple of ACEs and apply them in inbound direction on the interface where those servers are connected. If you have already an ACL applied in the inbound you can just add the rules at the top, if not you would need to create something similar to this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 10.0.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 172.16.0.0 255.240.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 192.168.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended deny ip object-group INTERNAL-SERVERS any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group INSIDE_IN in interface INSIDE&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That way you are allowing the INTERNAL-SERVERS traffic to reach the whole RFC1918 ranges but nothing else. So those servers won't be able to reach any public IP address on the internet. The permit ip any any rule at the end is needed to allow the other traffic to pass through. It is always a best practice to apply any deny rule closer to the source, that will save the firewall in this case from process further any traffic that would be denied.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 15 Feb 2022 17:02:39 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2022-02-15T17:02:39Z</dc:date>
    <item>
      <title>Outgoing ACL on OUTSIDE kills IPSec traffic ASA</title>
      <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552626#M1087437</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just the other day I created an outgoing ACL on my OUTSIDE interface on the ASA. The source is a couple of internal servers which I need to deny internet access to. The servers will have to exit other interfaces on the ASA so I thought that instead of creating 5 - 10 ACEs on the TRANSIT interface, I would stop the traffic when the servers tries to reach ANY destination via OUTSIDE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did the ACL like so (PERMIT for testing):&lt;BR /&gt;access-list OUTSIDE_access_out_2 line 1 extended permit ip object-group INTERNAL-SERVERS any&lt;BR /&gt;access-group OUTSIDE_access_out_2 out interface OUTSIDE&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Right after applying the ACL, I lost reachability to a couple of endpoints reached via IPSec. I didn't validate if every IPSec was impacted. Removed the ACL - IPSec back to OK. Did it once again to verify if it was due to the ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't find any clues to this behavior, either by googling or the config guides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone here who has seen this before?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA is running 9.14(2)15 code&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 11:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552626#M1087437</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-02-15T11:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Outgoing ACL on OUTSIDE kills IPSec traffic ASA</title>
      <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552649#M1087441</link>
      <description>&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 16:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552649#M1087441</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-15T16:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Outgoing ACL on OUTSIDE kills IPSec traffic ASA</title>
      <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552877#M1087460</link>
      <description>&lt;P&gt;Sysopt connection permit-vpn,&lt;/P&gt;&lt;P&gt;This is by defualt enable, disable it to make asa not allow outside to inside traffic even if it come from vpn.&lt;/P&gt;&lt;P&gt;Now config acl that make only vpn can access to internal,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aplly this acl to outside ìnterfacr with in direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For acl you mention, why you need internal only access to vpn? By default the asa allow traffic from high to low secuirty level.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 16:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552877#M1087460</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-15T16:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Outgoing ACL on OUTSIDE kills IPSec traffic ASA</title>
      <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552903#M1087461</link>
      <description>&lt;P&gt;You mean you lost connectivity from inside to those remote endpoints?, if so I would think this is expected. The ACL you applied would only allow the traffic from the servers defined into the object group INTERNAL-SERVERS to go out of the OUTSIDE interface. As there is an implicit deny rule on the ACL, any other traffic will be denied.&lt;/P&gt;
&lt;P&gt;The way how I would deal with this scenario would be to create a couple of ACEs and apply them in inbound direction on the interface where those servers are connected. If you have already an ACL applied in the inbound you can just add the rules at the top, if not you would need to create something similar to this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 10.0.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 172.16.0.0 255.240.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip object-group INTERNAL-SERVERS 192.168.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended deny ip object-group INTERNAL-SERVERS any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group INSIDE_IN in interface INSIDE&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That way you are allowing the INTERNAL-SERVERS traffic to reach the whole RFC1918 ranges but nothing else. So those servers won't be able to reach any public IP address on the internet. The permit ip any any rule at the end is needed to allow the other traffic to pass through. It is always a best practice to apply any deny rule closer to the source, that will save the firewall in this case from process further any traffic that would be denied.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 17:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4552903#M1087461</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-15T17:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Outgoing ACL on OUTSIDE kills IPSec traffic ASA</title>
      <link>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4553306#M1087473</link>
      <description>&lt;P&gt;You're right, and I didn't pay attention as the ASA creates a new OUTGOING ACL for the new ACE. After all these year, this shouldn't have slipped - rookie mistake!&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outgoing-acl-on-outside-kills-ipsec-traffic-asa/m-p/4553306#M1087473</guid>
      <dc:creator>Michael Bartholomæussen</dc:creator>
      <dc:date>2022-02-16T07:28:36Z</dc:date>
    </item>
  </channel>
</rss>

