<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you very much for your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086783#M134062</link>
    <description>&lt;P&gt;Thank you very much for your reply Aditya, I am really in need of some assistance here. I've done two packet traces as below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The first one is showing ALLOW and this is good as this is the one access that I want to allow. The second also looks fine as I want it to drop all other traffic.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;packet-tracer input Inside tcp 10.154.246.115 80 165.2.111.17 80&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;packet-tracer input Inside tcp 10.154.246.115 80 10.80.70.241 ftp&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In summary, I want to allow all traffic to 165.2 subnets specified and drop the rest. Does this look ok to you?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;----------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 165.2.111.17 80&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended permit tcp object-group BLADEInternal object-group DM_INLINE_NETWORK_5&lt;BR /&gt;object-group network BLADEInternal&lt;BR /&gt; network-object 10.55.246.0 255.255.255.0&lt;BR /&gt; network-object host 10.154.246.77&lt;BR /&gt; network-object host 10.154.246.12&lt;BR /&gt; network-object host 10.154.246.115&lt;BR /&gt; network-object host 10.154.246.72&lt;BR /&gt; network-object host 10.154.246.93&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt; network-object 165.2.109.0 255.255.255.0&lt;BR /&gt; network-object 165.2.111.0 255.255.255.0&lt;BR /&gt; network-object 165.2.122.0 255.255.255.0&lt;BR /&gt; network-object 165.2.177.0 255.255.255.0&lt;BR /&gt; network-object 165.2.187.0 255.255.255.0&lt;BR /&gt; network-object 165.2.58.0 255.255.255.0&lt;BR /&gt; network-object 165.2.60.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.154.246.115/80 to 59.201.39.98/114&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 636183438, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;----------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 10.56.40.127 23&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended deny ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 10.80.70.241 ftp&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended deny ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jul 2017 05:16:05 GMT</pubDate>
    <dc:creator>BHconsultants88</dc:creator>
    <dc:date>2017-07-17T05:16:05Z</dc:date>
    <item>
      <title>ASA - Security Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086779#M134057</link>
      <description>&lt;P&gt;Hi all, I hope someone can help. I have a small network at a remote site that has suffered a security breach. I need to block all incoming and outgoing internet traffic. The only thing I want to allow is incoming and outgoing traffic for certain IP's on the internal LAN and&amp;nbsp;DM_INLINE_NETWORK_5.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could someone check the attached the configuration and verify what I've done is correct please?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks so much for any suggestions, it's very much appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:42:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086779#M134057</guid>
      <dc:creator>BHconsultants88</dc:creator>
      <dc:date>2019-03-12T09:42:15Z</dc:date>
    </item>
    <item>
      <title>If you want to block</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086780#M134059</link>
      <description>&lt;P&gt;If you want to block everything ; then just shut down the outside interface, or unplug the Internet cable.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2017 22:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086780#M134059</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2017-07-16T22:14:39Z</dc:date>
    </item>
    <item>
      <title>Hi Philip, thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086781#M134060</link>
      <description>&lt;P&gt;Hi Philip, thanks for the reply. Unfortunately, I'm unable to do that as the site requires the following access&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;access-list Inside_access_in extended permit tcp object-group BLADEInternal object-group DM_INLINE_NETWORK_5&lt;/P&gt;
&lt;P&gt;access-list Inside_access_in extended permit ip object-group BLADEInternal object-group DM_INLINE_NETWORK_5&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there anything else I need to configure on the ASA as they are still not able to connect.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2017 22:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086781#M134060</guid>
      <dc:creator>BHconsultants88</dc:creator>
      <dc:date>2017-07-16T22:47:50Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086782#M134061</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please share the packet tracer output for the concerned traffic?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 03:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086782#M134061</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-07-17T03:55:14Z</dc:date>
    </item>
    <item>
      <title>Thank you very much for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086783#M134062</link>
      <description>&lt;P&gt;Thank you very much for your reply Aditya, I am really in need of some assistance here. I've done two packet traces as below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The first one is showing ALLOW and this is good as this is the one access that I want to allow. The second also looks fine as I want it to drop all other traffic.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;packet-tracer input Inside tcp 10.154.246.115 80 165.2.111.17 80&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;packet-tracer input Inside tcp 10.154.246.115 80 10.80.70.241 ftp&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In summary, I want to allow all traffic to 165.2 subnets specified and drop the rest. Does this look ok to you?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;----------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 165.2.111.17 80&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended permit tcp object-group BLADEInternal object-group DM_INLINE_NETWORK_5&lt;BR /&gt;object-group network BLADEInternal&lt;BR /&gt; network-object 10.55.246.0 255.255.255.0&lt;BR /&gt; network-object host 10.154.246.77&lt;BR /&gt; network-object host 10.154.246.12&lt;BR /&gt; network-object host 10.154.246.115&lt;BR /&gt; network-object host 10.154.246.72&lt;BR /&gt; network-object host 10.154.246.93&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt; network-object 165.2.109.0 255.255.255.0&lt;BR /&gt; network-object 165.2.111.0 255.255.255.0&lt;BR /&gt; network-object 165.2.122.0 255.255.255.0&lt;BR /&gt; network-object 165.2.177.0 255.255.255.0&lt;BR /&gt; network-object 165.2.187.0 255.255.255.0&lt;BR /&gt; network-object 165.2.58.0 255.255.255.0&lt;BR /&gt; network-object 165.2.60.0 255.255.255.0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Inside,Outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.154.246.115/80 to 59.201.39.98/114&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 636183438, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;----------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 10.56.40.127 23&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended deny ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;F47366-BLADE# packet-tracer input Inside tcp 10.154.246.115 80 10.80.70.241 ftp&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-list Inside_access_in extended deny ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2017 05:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-configuration/m-p/3086783#M134062</guid>
      <dc:creator>BHconsultants88</dc:creator>
      <dc:date>2017-07-17T05:16:05Z</dc:date>
    </item>
  </channel>
</rss>

