<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ok, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083340#M136158</link>
    <description>&lt;P&gt;Ok,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So now i'm facing another issue.&lt;/P&gt;
&lt;P&gt;I configured a remote vpn, cisco anyconnect, but the traffic goes trough my firewall rules, I mean, nothing is dropped, everything passes to my local interface.&lt;/P&gt;
&lt;P&gt;What am I missing?&lt;/P&gt;</description>
    <pubDate>Wed, 26 Apr 2017 15:28:50 GMT</pubDate>
    <dc:creator>mproenca2014</dc:creator>
    <dc:date>2017-04-26T15:28:50Z</dc:date>
    <item>
      <title>Cisco Asa Firepower</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083338#M136152</link>
      <description>&lt;P&gt;Hi you all,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where do I implement firewall rules in a Cisco Asa with Firepower?&lt;/P&gt;
&lt;P&gt;Is it in Asa Module or Firepower Module?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083338#M136152</guid>
      <dc:creator>mproenca2014</dc:creator>
      <dc:date>2019-03-12T09:16:41Z</dc:date>
    </item>
    <item>
      <title>In the ASA.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083339#M136155</link>
      <description>&lt;P&gt;In the ASA.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 14:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083339#M136155</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-04-26T14:46:01Z</dc:date>
    </item>
    <item>
      <title>Ok,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083340#M136158</link>
      <description>&lt;P&gt;Ok,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So now i'm facing another issue.&lt;/P&gt;
&lt;P&gt;I configured a remote vpn, cisco anyconnect, but the traffic goes trough my firewall rules, I mean, nothing is dropped, everything passes to my local interface.&lt;/P&gt;
&lt;P&gt;What am I missing?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 15:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083340#M136158</guid>
      <dc:creator>mproenca2014</dc:creator>
      <dc:date>2017-04-26T15:28:50Z</dc:date>
    </item>
    <item>
      <title>By default that is the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083341#M136162</link>
      <description>&lt;P&gt;By default that is the correct behavior. If you need to restrict access then you will have to create an ACL.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 15:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083341#M136162</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2017-04-26T15:46:58Z</dc:date>
    </item>
    <item>
      <title>That's correct.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083342#M136167</link>
      <description>&lt;P&gt;That's correct.&lt;/P&gt;
&lt;P&gt;And I created a rule for all interfaces denying everything.&lt;/P&gt;
&lt;P&gt;Any to Any Deny.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list INSIDE_access_in extended deny ip any any&lt;/P&gt;
&lt;P&gt;access-list ART_access_in_1 extended deny ip any any&lt;/P&gt;
&lt;P&gt;access-list NOS_access_in extended deny ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But still working. I cannot see what's missing.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 15:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083342#M136167</guid>
      <dc:creator>mproenca2014</dc:creator>
      <dc:date>2017-04-26T15:55:45Z</dc:date>
    </item>
    <item>
      <title>My first comment is that you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083343#M136172</link>
      <description>&lt;P&gt;My first comment is that you show us access list configuration but do not show us how the access lists are applied and how they are applied is critical to whether they work or not.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But the really important comment is that for AnyConnect the normal behavior is that access lists on interfaces do not evaluate or control AnyConnect VPN traffic. The expected behavior is that anything that comes into the ASA via AnyConnect will be allowed to pass through the ASA. If you want to control VPN traffic you should look into using VPN filters.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 20:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-firepower/m-p/3083343#M136172</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2017-04-26T20:52:09Z</dc:date>
    </item>
  </channel>
</rss>

