<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic Allow from Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743591#M1096170</link>
    <description>&lt;P&gt;I take this FW as ASA - then Look at the below ACL for reference ,&amp;nbsp; if you have asdm then its easy to allow.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/cisco-asa-create-acl-for-dns/td-p/3063461" target="_blank"&gt;https://community.cisco.com/t5/network-security/cisco-asa-create-acl-for-dns/td-p/3063461&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Dec 2022 19:12:56 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2022-12-21T19:12:56Z</dc:date>
    <item>
      <title>Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743580#M1096168</link>
      <description>&lt;P&gt;When commissioning the two new Windows VMs. We have a problem with the deployment&lt;/P&gt;&lt;P&gt;There, the servers to be installed can not reach the DNS server and it looks as if it does not go on in your customer network.&lt;/P&gt;&lt;P&gt;It seems traffic needs to be allow from Firewall. I have very basic understanding with Firewalls. I guess i need to create a ACL to allow traffic from&amp;nbsp; Source 172.31.200.0/24 and 172.16.1.93 and&amp;nbsp; 172.16.1.93 Destination. Correct me if i am wrong? What the command i should use to allow the traffic for&amp;nbsp; 172.31.200.0/24?&lt;/P&gt;&lt;P&gt;I need to allow the complete subnet&amp;nbsp;172.31.200.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The server has the following IP configuration:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Warshad_0-1671648186045.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171680iA1076AC4A6C5272B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Warshad_0-1671648186045.png" alt="Warshad_0-1671648186045.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NSLOOKUP ends with each request in a timeout:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Warshad_1-1671648186047.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171681i7536B5387195845D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Warshad_1-1671648186047.png" alt="Warshad_1-1671648186047.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tracert:&lt;/P&gt;&lt;P&gt;Here we get to the customer network and then it's over.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Warshad_2-1671648186051.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171682iA37D931CDCE9A00C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Warshad_2-1671648186051.png" alt="Warshad_2-1671648186051.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;A server in the same subnet (SAP-GBN-102-W) can reach the DNS and the queries are answered!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arshad&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 18:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743580#M1096168</guid>
      <dc:creator>Warshad</dc:creator>
      <dc:date>2022-12-21T18:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743591#M1096170</link>
      <description>&lt;P&gt;I take this FW as ASA - then Look at the below ACL for reference ,&amp;nbsp; if you have asdm then its easy to allow.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/cisco-asa-create-acl-for-dns/td-p/3063461" target="_blank"&gt;https://community.cisco.com/t5/network-security/cisco-asa-create-acl-for-dns/td-p/3063461&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743591#M1096170</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-12-21T19:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743594#M1096172</link>
      <description>&lt;P&gt;Thank you for reply. Yes, Its a Cisco ASA.&amp;nbsp; We also have ASDM. Could you please provide any reference guide for ASDM.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743594#M1096172</guid>
      <dc:creator>Warshad</dc:creator>
      <dc:date>2022-12-21T19:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743599#M1096174</link>
      <description>&lt;P&gt;traceroute show many hops without success ?&lt;BR /&gt;what is 172.31.255.10 ?&lt;BR /&gt;from there start your troubleshooting.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743599#M1096174</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T19:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743606#M1096175</link>
      <description>&lt;P&gt;Not sure how is your topology of you network : if you looking to allowed your Local network to reach DNS Server, that was failing (may resolve your issue).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=so0ExziTt2A" target="_blank"&gt;https://www.youtube.com/watch?v=so0ExziTt2A&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743606#M1096175</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-12-21T19:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743608#M1096176</link>
      <description>&lt;P&gt;&lt;SPAN&gt;172.31.255.10&amp;nbsp; is a dmz switch and there is Cisco ASA after this switch. so it means i have to allow the traffic from that firewall. could you please provide me any guide for Cisco ASDM?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 19:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743608#M1096176</guid>
      <dc:creator>Warshad</dc:creator>
      <dc:date>2022-12-21T19:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Allow from Firewall</title>
      <link>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743613#M1096177</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112925-acl-asdm-00.html" target="_blank"&gt;ASA 8.X and later: Add or Modify an Access List through the ASDM GUI Configuration Example - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;your DNS server is&amp;nbsp;&lt;SPAN&gt;172.16.1.93&amp;nbsp; ? and I think this Server connect to other DMZ or to INside ?&lt;BR /&gt;if yes then you need to&amp;nbsp;&lt;BR /&gt;1-if DNS server in DMZ/IN that have same security level then you need&amp;nbsp;&lt;BR /&gt;same security traffic permit inter-interface&amp;nbsp;&lt;BR /&gt;2- if the DNS server in DMZ/IN with different security level you need&amp;nbsp;&lt;BR /&gt;acl permit udp any host x.x.x.x 53&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 20:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-allow-from-firewall/m-p/4743613#M1096177</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T20:01:51Z</dc:date>
    </item>
  </channel>
</rss>

