<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Karsten, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043198#M145863</link>
    <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;Thank you for the reply!&lt;/P&gt;
&lt;P&gt;Your explanation is how I understand ACLs which is why I'm still a bit confused. I'm &lt;STRONG&gt;not&lt;/STRONG&gt; trying to stop packets that initiate in the server vlan from flowing into the users vlan.&lt;/P&gt;
&lt;P&gt;The initiating packet begins in the users VLAN yet I have to apply the ACL outgoing on the destination (server vlan) for the traffic from users -&amp;gt; servers to be filtered.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 12 Mar 2017 12:52:55 GMT</pubDate>
    <dc:creator>Keef</dc:creator>
    <dc:date>2017-03-12T12:52:55Z</dc:date>
    <item>
      <title>ASA 5505 - ACL Flow on Same Security VLANs</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043196#M145855</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am experiencing some odd behavior (or I'm missing something) with ACLs between 2 same-security-level VLANs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The firewall is an ASA 5505 running IOS 9.2(4).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The VLANs simply separate users from servers and apply some access control. I have it working properly but I'm not sure&amp;nbsp;&lt;EM&gt;why&lt;/EM&gt; it's working. I seem to have to apply the ACL backwards (or what seems to me as backwards). I'm trying to stop nodes in the users VLAN from accessing some ports on the servers vlan. What seems odd to me is that the ACL only works properly if I apply it OUT on the servers VLAN.&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;E.G.&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="font-family: terminal, monaco, monospace;"&gt;&lt;EM&gt;access-group servers_access_out out interface servers&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If I apply it IN on the servers VLAN or OUT on the user VLAN, nothing is filtered. I can reliably test this using nmap.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any insight will&amp;nbsp;be greatly appreciated!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043196#M145855</guid>
      <dc:creator>Keef</dc:creator>
      <dc:date>2019-03-12T09:02:50Z</dc:date>
    </item>
    <item>
      <title>The filter has to be applied</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043197#M145859</link>
      <description>&lt;P&gt;The filter has to be applied in the direction of the initiating packet. That is either:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;outgoing on the server VLAN&lt;/LI&gt;
&lt;LI&gt;incoming on the user VLAN&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The traditional (and proven) way is to apply ACLs incoming on an interface. With that you have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;an incoming ACL on the user VLAN that controls all access from the users to any destination&lt;/LI&gt;
&lt;LI&gt;an incoming ACL on the server VLAN that controls all access to any destination&lt;/LI&gt;
&lt;LI&gt;an incoming ACL on the outside interface that controls access from the internet.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Keep in mind that only the initial packet has to be allowed. All return-packets are automatically allowed by statefull inspection.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 07:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043197#M145859</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-12T07:32:36Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043198#M145863</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;Thank you for the reply!&lt;/P&gt;
&lt;P&gt;Your explanation is how I understand ACLs which is why I'm still a bit confused. I'm &lt;STRONG&gt;not&lt;/STRONG&gt; trying to stop packets that initiate in the server vlan from flowing into the users vlan.&lt;/P&gt;
&lt;P&gt;The initiating packet begins in the users VLAN yet I have to apply the ACL outgoing on the destination (server vlan) for the traffic from users -&amp;gt; servers to be filtered.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 12:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043198#M145863</guid>
      <dc:creator>Keef</dc:creator>
      <dc:date>2017-03-12T12:52:55Z</dc:date>
    </item>
    <item>
      <title>Yes, because that is the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043199#M145866</link>
      <description>&lt;P&gt;Yes, because that is the direction of the initial connection. But you could also apply this ACL (perhaps with some modifications) incoming on the User-VLAN.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 12:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043199#M145866</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-12T12:52:56Z</dc:date>
    </item>
    <item>
      <title>I'm feeling a little thick</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043200#M145870</link>
      <description>&lt;P&gt;I'm feeling a little thick for not understanding. Please bear with me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So you're saying when a node from the Users vlan connects to the Servers vlan, the initial connection is out from servers?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 12:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043200#M145870</guid>
      <dc:creator>Keef</dc:creator>
      <dc:date>2017-03-12T12:58:32Z</dc:date>
    </item>
    <item>
      <title>No, it is initiated then from</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043201#M145875</link>
      <description>&lt;P&gt;No, it is&amp;nbsp;initiated then from the Users-VLAN. When the first packet enters the ASA it does that on the Users-VLAN-interface. An incoming ACL on&amp;nbsp;this VLAN can control the traffic. If the routing-decision is that the packet should leave out of the server VLAN, then you can also have an outgoing ACL there:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;User-PC ---&amp;gt; incoming ACL on User VLAN ---&amp;gt; ASA routing decision ---&amp;gt; outgoing ACL on Server VLAN --&amp;gt; Server&lt;/PRE&gt;</description>
      <pubDate>Sun, 12 Mar 2017 13:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043201#M145875</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-12T13:42:33Z</dc:date>
    </item>
    <item>
      <title>Ah, ha! I understand now.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043202#M145878</link>
      <description>&lt;P&gt;Ah, ha! I understand now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 13:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-flow-on-same-security-vlans/m-p/3043202#M145878</guid>
      <dc:creator>Keef</dc:creator>
      <dc:date>2017-03-12T13:54:58Z</dc:date>
    </item>
  </channel>
</rss>

