<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Shalendra, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pen-test-from-outside-the-firewall/m-p/2966390#M149924</link>
    <description>&lt;P&gt;Shalendra,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ideally the penetration test should fail as per the default behavior of the ASA itself.&lt;/P&gt;
&lt;P&gt;Since outside interface is on the lowest security level, no packet should be allowed to go through unless it has been allowed in the ACL (also keeping NAT in mind).&lt;/P&gt;
&lt;P&gt;Please check the ACL's that you have in inbound direction on the outside interface of the ASA.&lt;/P&gt;
&lt;P&gt;In regards to the syslog's that you should be ideally seeing are :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no connection entry:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-6-106015: Deny TCP (no connection) from IP_address/port to&lt;BR /&gt; IP_address/port flags tcp_flags on interface interface_name&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when the packet is denied by an ACL:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-4-106023: Deny protocol src [interface_name:source_address/source_port]&lt;BR /&gt; dst interface_name:dest_address/dest_port by access_group acl_ID&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no translation rule found:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-3-305005: No translation group found for protocol src interface_name:&lt;BR /&gt; source_address/source_port dst interface_name:dest_address/dest_port&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when a packet is denied by Security Inspection:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-4-405104: H225 message received from outside_address/outside_port to&lt;BR /&gt; inside_address/inside_port before SETUP&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no route information:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-6-110003: Routing failed to locate next-hop for protocol from src&lt;BR /&gt; interface:src IP/src port to dest interface:dest IP/dest port&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Above mentioned are the most commonly seen syslog messages on a perimeter firewall when traffic is denied by the firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
    <pubDate>Sat, 17 Sep 2016 06:04:41 GMT</pubDate>
    <dc:creator>Pulkit Saxena</dc:creator>
    <dc:date>2016-09-17T06:04:41Z</dc:date>
    <item>
      <title>Pen test from outside the firewall</title>
      <link>https://community.cisco.com/t5/network-security/pen-test-from-outside-the-firewall/m-p/2966389#M149923</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If somebody is trying to pen test from outside to inside network. In Cisco ASA which feature i have to enable to stop that. After enabling this, what event is generated and what is the message id for it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please suggest on this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Shalendra&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pen-test-from-outside-the-firewall/m-p/2966389#M149923</guid>
      <dc:creator>shalendra2</dc:creator>
      <dc:date>2019-03-12T08:16:54Z</dc:date>
    </item>
    <item>
      <title>Shalendra,</title>
      <link>https://community.cisco.com/t5/network-security/pen-test-from-outside-the-firewall/m-p/2966390#M149924</link>
      <description>&lt;P&gt;Shalendra,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ideally the penetration test should fail as per the default behavior of the ASA itself.&lt;/P&gt;
&lt;P&gt;Since outside interface is on the lowest security level, no packet should be allowed to go through unless it has been allowed in the ACL (also keeping NAT in mind).&lt;/P&gt;
&lt;P&gt;Please check the ACL's that you have in inbound direction on the outside interface of the ASA.&lt;/P&gt;
&lt;P&gt;In regards to the syslog's that you should be ideally seeing are :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no connection entry:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-6-106015: Deny TCP (no connection) from IP_address/port to&lt;BR /&gt; IP_address/port flags tcp_flags on interface interface_name&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when the packet is denied by an ACL:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-4-106023: Deny protocol src [interface_name:source_address/source_port]&lt;BR /&gt; dst interface_name:dest_address/dest_port by access_group acl_ID&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no translation rule found:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-3-305005: No translation group found for protocol src interface_name:&lt;BR /&gt; source_address/source_port dst interface_name:dest_address/dest_port&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when a packet is denied by Security Inspection:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-4-405104: H225 message received from outside_address/outside_port to&lt;BR /&gt; inside_address/inside_port before SETUP&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Syslog message when there is no route information:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;%ASA-6-110003: Routing failed to locate next-hop for protocol from src&lt;BR /&gt; interface:src IP/src port to dest interface:dest IP/dest port&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Above mentioned are the most commonly seen syslog messages on a perimeter firewall when traffic is denied by the firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Sat, 17 Sep 2016 06:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pen-test-from-outside-the-firewall/m-p/2966390#M149924</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2016-09-17T06:04:41Z</dc:date>
    </item>
  </channel>
</rss>

