<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL, Allowing and Denying in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162788#M1115197</link>
    <description>&lt;P&gt;There is no topology that illustrates what has been mentioned because there are no interfaces that I can assign as S &amp;amp; D. The idea is that there are servers hosted in the cloud, and I want to create Denying between them.&lt;/P&gt;&lt;P&gt;Do I need to add:&lt;/P&gt;&lt;P&gt;Deny 20.200.108.10/32 as the source &amp;amp; 20.200.92.20/32 as the destination&lt;/P&gt;&lt;P&gt;along with the following line&lt;/P&gt;&lt;P&gt;Deny 20.200.92.20/32 as the source &amp;amp; 20.200.108.10/32 as the destination&lt;/P&gt;&lt;P&gt;According to my understanding of Policing, it should be sufficient to block from one side only, but this scenario has caused confusion for me. Are there scenarios that require blocking from both sides in the same way?&lt;/P&gt;</description>
    <pubDate>Mon, 19 Aug 2024 18:48:38 GMT</pubDate>
    <dc:creator>Eng-Ruthless</dc:creator>
    <dc:date>2024-08-19T18:48:38Z</dc:date>
    <item>
      <title>ACL, Allowing and Denying</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162783#M1115195</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;I hope to help you clarify the concept of (ACL, Allowing and Denying).&lt;/P&gt;&lt;P&gt;I have a Cloud portal where I hosted Two Servers, and the support team added a section for me (Firewall), which is just an ACL.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;SRV1 IP: 20.200.92.20&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;SRV2 IP: 20.200.108.10&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;However, I discovered that if I enter SRV2, I can access SRV1 through it.&lt;/P&gt;&lt;P&gt;So, from the Firewall section, I added a policy in the first place:&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Deny 20.200.108.10/32 as the source &amp;amp; 20.200.92.20/32 as the destination&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;But the connection is still active. The most important question is: do I need to add the following line?&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Deny 20.200.92.20/32 as the source &amp;amp; 20.200.108.10/32 as the destination&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Please clarify, if possible.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 18:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162783#M1115195</guid>
      <dc:creator>Eng-Ruthless</dc:creator>
      <dc:date>2024-08-19T18:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACL, Allowing and Denying</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162785#M1115196</link>
      <description>&lt;P&gt;Can you share topolgy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 18:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162785#M1115196</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-19T18:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: ACL, Allowing and Denying</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162788#M1115197</link>
      <description>&lt;P&gt;There is no topology that illustrates what has been mentioned because there are no interfaces that I can assign as S &amp;amp; D. The idea is that there are servers hosted in the cloud, and I want to create Denying between them.&lt;/P&gt;&lt;P&gt;Do I need to add:&lt;/P&gt;&lt;P&gt;Deny 20.200.108.10/32 as the source &amp;amp; 20.200.92.20/32 as the destination&lt;/P&gt;&lt;P&gt;along with the following line&lt;/P&gt;&lt;P&gt;Deny 20.200.92.20/32 as the source &amp;amp; 20.200.108.10/32 as the destination&lt;/P&gt;&lt;P&gt;According to my understanding of Policing, it should be sufficient to block from one side only, but this scenario has caused confusion for me. Are there scenarios that require blocking from both sides in the same way?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 18:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5162788#M1115197</guid>
      <dc:creator>Eng-Ruthless</dc:creator>
      <dc:date>2024-08-19T18:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: ACL, Allowing and Denying</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5164695#M1115276</link>
      <description>&lt;P&gt;&lt;SPAN&gt;""However, I discovered that if I enter SRV2, I can access SRV1 through it.""&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How that can happened?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The only thing make this allow is both server use GW different than FW' in such traffic between two server not filter by FW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 20:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-and-denying/m-p/5164695#M1115276</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-22T20:37:50Z</dc:date>
    </item>
  </channel>
</rss>

