<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [ASA] How does a control-plane ACL treat interface NAT traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019297#M1109191</link>
    <description>&lt;P&gt;Technically, control-plane ACL programs accelerated security path table to control traffic between "outside" and "identity" interface as shown below, while regular ACL programs it between "outside" and "any" (all) interfaces, where "any" doesn't include identity. Hence, those two ACLs are independent from each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;ASA# sh run access-group&lt;BR /&gt;access-group outside_in in interface outside control-plane&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;&lt;BR /&gt;ASA# show access-list outside_in&lt;BR /&gt;access-list outside_in; 10 elements; name hash: 0xc5896c24&lt;BR /&gt;access-list outside_in line 2 extended permit tcp xxx.xxx.147.0 255.255.255.0 host yyy.yyy.98.134 eq https (hitcnt=52) 0x567d10d1&lt;BR /&gt;&lt;BR /&gt;ASA# show asp table classify domain permit match xxx.xxx.147.0&lt;BR /&gt;Input Table&lt;BR /&gt;in&amp;nbsp; id=0x7fc45a1bdba0, priority=120, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=52, user_data=0x7fc14c8dac80, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=xxx.xxx.147.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=yyy.yyy.98.134, mask=255.255.255.255, port=443, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=identity&lt;BR /&gt;in&amp;nbsp; id=0x7fc14c75a950, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x7fc14e36c880, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=xxx.xxx.147.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;dst ip/id=yyy.yyy.98.134, mask=255.255.255.255, port=443, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Feb 2024 13:15:07 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-02-16T13:15:07Z</dc:date>
    <item>
      <title>[ASA] How does a control-plane ACL treat interface NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019056#M1109186</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In the documentation, I can see a control-plane ACL&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;will permit/deny traffic towards the ASA itself&lt;/EM&gt;&lt;SPAN&gt;, which is typically control plane, will this extend to nat traffic towards the device?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit: What would the security risks be if this was opened up to any any? I presume your device could easily be ddos'd, ssh tunneled, and compromised in many other ways.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 15:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019056#M1109186</guid>
      <dc:creator>guacamoley</dc:creator>
      <dc:date>2024-02-27T15:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019092#M1109187</link>
      <description>&lt;P&gt;The NAT in router or in ASA need traffic pass boundary&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This boundary is between two Interface&lt;/P&gt;
&lt;P&gt;In case of ACL control plane the traffic direct to ASA interface so it not pass any ASA boundary.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 05:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019092#M1109187</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-16T05:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019297#M1109191</link>
      <description>&lt;P&gt;Technically, control-plane ACL programs accelerated security path table to control traffic between "outside" and "identity" interface as shown below, while regular ACL programs it between "outside" and "any" (all) interfaces, where "any" doesn't include identity. Hence, those two ACLs are independent from each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;ASA# sh run access-group&lt;BR /&gt;access-group outside_in in interface outside control-plane&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;&lt;BR /&gt;ASA# show access-list outside_in&lt;BR /&gt;access-list outside_in; 10 elements; name hash: 0xc5896c24&lt;BR /&gt;access-list outside_in line 2 extended permit tcp xxx.xxx.147.0 255.255.255.0 host yyy.yyy.98.134 eq https (hitcnt=52) 0x567d10d1&lt;BR /&gt;&lt;BR /&gt;ASA# show asp table classify domain permit match xxx.xxx.147.0&lt;BR /&gt;Input Table&lt;BR /&gt;in&amp;nbsp; id=0x7fc45a1bdba0, priority=120, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=52, user_data=0x7fc14c8dac80, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=xxx.xxx.147.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=yyy.yyy.98.134, mask=255.255.255.255, port=443, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=identity&lt;BR /&gt;in&amp;nbsp; id=0x7fc14c75a950, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x7fc14e36c880, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=xxx.xxx.147.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;dst ip/id=yyy.yyy.98.134, mask=255.255.255.255, port=443, tag=any, dscp=0x0, nsg_id=none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 13:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019297#M1109191</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-16T13:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019309#M1109192</link>
      <description>&lt;P&gt;that's really helpful actually - so there is a logical interface called "identity" in the ASA. Will that always match the IP that is specified in the initial command? (in your case it was "in interface&amp;nbsp;&lt;STRONG&gt;outside&lt;/STRONG&gt; control-plane". So I imagine the .98.134 address was the outside's interface?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 13:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019309#M1109192</guid>
      <dc:creator>guacamoley</dc:creator>
      <dc:date>2024-02-16T13:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019321#M1109194</link>
      <description>&lt;P&gt;Why we need to know NAT IP if we want to config ACL?&lt;/P&gt;
&lt;P&gt;To know which one we use real IP or mapped IP&lt;/P&gt;
&lt;P&gt;In acl control the traffic not hit NAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So we always use real IP.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;identity is not related to NAT traffic' it use only for service policy.&lt;/P&gt;
&lt;P&gt;Why you misleading him?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 13:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019321#M1109194</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-16T13:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019355#M1109197</link>
      <description>&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 14:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019355#M1109197</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-16T14:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019357#M1109198</link>
      <description>&lt;P&gt;You're wrong or don't understand what I'm talking about.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 14:39:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019357#M1109198</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-02-16T14:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: [ASA] How does a control-plane ACL treat interface NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019360#M1109199</link>
      <description>&lt;P&gt;Yes please share how we can use identity logical interface for NAT,&amp;nbsp;&lt;BR /&gt;I will so surprise to see this new config&amp;nbsp;&lt;BR /&gt;waiting your reply&amp;nbsp;&lt;BR /&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 14:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-how-does-a-control-plane-acl-treat-interface-nat/m-p/5019360#M1109199</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-16T14:45:48Z</dc:date>
    </item>
  </channel>
</rss>

