<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Statefull Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657589#M1092163</link>
    <description>&lt;P&gt;IN-FW-OUT&lt;BR /&gt;TCP initiate from OUT to server in IN&amp;nbsp;&lt;BR /&gt;mandatory you need here ACL in OUT&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;TCP initiate from IN to server in OUT&lt;/P&gt;&lt;P&gt;optional to make IN only can access Server in OUT other traffic will deny&lt;/P&gt;</description>
    <pubDate>Tue, 26 Jul 2022 13:50:14 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2022-07-26T13:50:14Z</dc:date>
    <item>
      <title>Statefull Firewall</title>
      <link>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657584#M1092162</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Dear all &amp;nbsp; I am new to Firewall Technologies and I want to ask Regardless of statefull Firewall feature. A statefull firewall maintains the tcp state and knows a user session so why do we need to allow a user to allow in both direction incoming and outgoing for same traffic if the state is already known when the user requests the session is known and the firewall knows for the returning also&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 13:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657584#M1092162</guid>
      <dc:creator>henockk</dc:creator>
      <dc:date>2022-07-26T13:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657589#M1092163</link>
      <description>&lt;P&gt;IN-FW-OUT&lt;BR /&gt;TCP initiate from OUT to server in IN&amp;nbsp;&lt;BR /&gt;mandatory you need here ACL in OUT&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;TCP initiate from IN to server in OUT&lt;/P&gt;&lt;P&gt;optional to make IN only can access Server in OUT other traffic will deny&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 13:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657589#M1092163</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-07-26T13:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657590#M1092164</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1383183"&gt;@henockk&lt;/a&gt; with a stateful firewall, permitting inside to outside traffic is sufficient to allow traffic initiated from the inside network to outside. The firewall would permit the return traffic.&lt;/P&gt;
&lt;P&gt;By default traffic from outside to inside is usually denied, unless explictly permitted. You'd only permit traffic from outside to inside if the traffic is initiated on the outside. On a perimeter firewall this is used when accessing a website in the DMZ or when bi-directional traffic is required in a WAN scenario.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 17:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657590#M1092164</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-07-26T17:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657833#M1092172</link>
      <description>&lt;P&gt;What are you asking?&amp;nbsp; Do you mean if a user is already allowed from inside to outside, then if the user moves to the outside network that user should already be allowed access from the outside to inside?&lt;/P&gt;
&lt;P&gt;The issue here is where the user traffic is generated from.&amp;nbsp; When the traffic is generated from the inside network usually there is an access-list statement, or in some cases a security level, that permits the user access to the outside network.&amp;nbsp; In this case the connection is entered into the state table and return traffic will be allowed.&lt;/P&gt;
&lt;P&gt;If that user was to move to the outside network and initiates a connection towards the inside the traffic will be denied by default as the user has now initiated a new connection which there is no access-list for.&amp;nbsp; So, in short, what gets added to the state table depends on where the traffic is being initiated from and if there are access rules that allow the connection (and possibly NAT statements)&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 19:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/statefull-firewall/m-p/4657833#M1092172</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-07-26T19:59:53Z</dc:date>
    </item>
  </channel>
</rss>

