<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743576#M1096167</link>
    <description>&lt;P&gt;An ASA's public IP address on the outside interface only accepts incoming connections destined for it if there is a service explicitly configured to allow it. You can check for any listening service with the command "show asp sockets". Common services are remote access VPN on tcp/443. Some people will allow incoming ssh although this is not usually a good idea unless it is tightly restricted.&lt;/P&gt;
&lt;P&gt;FYI ACLs on an ASA generally affect traffic though an interface, not traffic to it. Only the special and seldom used control plane ACLs do the latter.&lt;/P&gt;</description>
    <pubDate>Wed, 21 Dec 2022 18:51:49 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2022-12-21T18:51:49Z</dc:date>
    <item>
      <title>Enterprise public IP add on outside of ASA has no ACL. Is this normal?</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743530#M1096160</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;On an enterprise ASA There exists at least 1 active outside int with a public IP address, that has zero restrictions on its attached ACL. I expect this interface is not advertised at all, but still, is this normal (if not best) security practice??&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 17:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743530#M1096160</guid>
      <dc:creator>MicJameson1</dc:creator>
      <dc:date>2022-12-21T17:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743536#M1096161</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1443661"&gt;@MicJameson1&lt;/a&gt; on the ASA the outside interface has a security level of 0 and the inside interface has a security level of 100. Traffic from a lower security level (outside) to a higher level (inside) is by default denied, without an ACL. To explictly permit traffic you need to configure an ACL and attached it to the outside interface. If you have an ACL configured then by default at the end of the ACL there is an implict deny (not visible in the configuration until you explictly configure at the end). You don't need an ACL on the outside interface as long as it's security level is lower than the inside interface.&lt;/P&gt;
&lt;P&gt;Traffic initiated from inside to outside will be permitted, including the return traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743536#M1096161</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-21T18:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743539#M1096162</link>
      <description>&lt;P&gt;&lt;SPAN&gt;""not advertised at all""&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;can you more elaborate ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743539#M1096162</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T18:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743540#M1096163</link>
      <description>&lt;P&gt;Thank you, Rob, for your helpful reply.&lt;/P&gt;&lt;P&gt;The ACL attached to the outside, in the "in" direction, only has the ACE-- "permit IP any any". Does that change your assessment?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743540#M1096163</guid>
      <dc:creator>MicJameson1</dc:creator>
      <dc:date>2022-12-21T18:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743544#M1096164</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1443661"&gt;@MicJameson1&lt;/a&gt; that's not normal and not advised. Do you need to explictly permit inbound traffic from the internet via the outside interface? If you do, create specific rules and deny the rest of the traffic. Or if you have no inbound traffic, you can remove that ACL.&lt;/P&gt;
&lt;P&gt;Outbound traffic (inside to outside) should not be affected, as per the security levels permitting traffic from higher security level to lower.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743544#M1096164</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-21T18:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743549#M1096165</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtaImage.png" style="width: 795px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171675iF41892BB4F7C5650/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtaImage.png" alt="rtaImage.png" /&gt;&lt;/span&gt;&lt;BR /&gt;this must you remember always when you deal with ASA,&amp;nbsp;&lt;BR /&gt;the most important think is bypass ACL when there is existing Conn.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;so your ACL apply to OUT side not effect any traffic initiate INside&amp;nbsp;&lt;BR /&gt;but it effect traffic initiate from OUTside (access to server in DMZ or INside).&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743549#M1096165</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T18:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743559#M1096166</link>
      <description>&lt;P&gt;&lt;SPAN&gt;""not advertised at all"" meaning there are no routing protocols implemented on the connection, and no public DNS entry. The interface is undocumented to the public, but it does have a public IP address and is open to the LAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I will now lock down this attached ACL.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743559#M1096166</guid>
      <dc:creator>MicJameson1</dc:creator>
      <dc:date>2022-12-21T18:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise public IP add on outside of ASA has no ACL. Is this nor</title>
      <link>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743576#M1096167</link>
      <description>&lt;P&gt;An ASA's public IP address on the outside interface only accepts incoming connections destined for it if there is a service explicitly configured to allow it. You can check for any listening service with the command "show asp sockets". Common services are remote access VPN on tcp/443. Some people will allow incoming ssh although this is not usually a good idea unless it is tightly restricted.&lt;/P&gt;
&lt;P&gt;FYI ACLs on an ASA generally affect traffic though an interface, not traffic to it. Only the special and seldom used control plane ACLs do the latter.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enterprise-public-ip-add-on-outside-of-asa-has-no-acl-is-this/m-p/4743576#M1096167</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-12-21T18:51:49Z</dc:date>
    </item>
  </channel>
</rss>

