<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That means taht ICMP is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915120#M153902</link>
    <description>&lt;P&gt;That means taht ICMP is inspected and you should be able to ping through the ASA.&amp;nbsp;Can you again describe exactly what's not working?&lt;/P&gt;</description>
    <pubDate>Thu, 12 May 2016 20:11:38 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-05-12T20:11:38Z</dc:date>
    <item>
      <title>ASA interfaces, no ACL applied inbound or outbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915113#M153895</link>
      <description>&lt;P&gt;I am working with an ASA setup that I have not seen before.&lt;/P&gt;
&lt;P&gt;ASA5585-SSP-10&lt;/P&gt;
&lt;P&gt;Software Version 9.1(7)4 &amp;lt;context&amp;gt;&lt;BR /&gt;Device Manager Version 7.1(1)52&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are multiple contexts, but at the moment, those are not related to the question I have.&lt;/P&gt;
&lt;P&gt;Each context has multiple interfaces, but for the most part, there are no ACLs applied.&lt;/P&gt;
&lt;P&gt;The outside Interface has one applied on the inbound direction, but the inside interface doesn't have one applied at all.&lt;/P&gt;
&lt;P&gt;Routes are configured to direct traffic.&lt;/P&gt;
&lt;P&gt;there is a dynamic NAT configured:&lt;/P&gt;
&lt;P&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic INTERNAL interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My question is how the ASA handles traffic, if no ACLs are applied to specify what is allowed and denied.&lt;/P&gt;
&lt;P&gt;I am thinking that the ASA will allow all traffic by default from a higher security level to a lower one, but if no ACL is applied from lower to higher, all of that traffic is blocked.&lt;/P&gt;
&lt;P&gt;So, with no ACL applied to the inside interface (security level 100), any traffic sourced from inside is allowed through, and from outside to inside, the ACL will specify what is allowed.&lt;/P&gt;
&lt;P&gt;Any other interface that has no ACL applied, allows no traffic to a lower lever interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is this correct?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915113#M153895</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2019-03-12T07:44:49Z</dc:date>
    </item>
    <item>
      <title>&gt;I am thinking that the ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915114#M153896</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;H6&gt;I am thinking that the ASA will allow all traffic by default from a higher security level to a lower one, but if no ACL is applied from lower to higher, all of that traffic is blocked.&lt;/H6&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;correct! But to be more specific, all new connections are blocked. All return traffic is automatically allowed by the statefull inspection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;H6&gt;So, with no ACL applied to the inside interface (security level 100), any traffic sourced from inside is allowed through, and from outside to inside, the ACL will specify what is allowed.&lt;/H6&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;correct as long as the traffic is routed to an interface with a lower security level (there could be other interfaces with 100)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;H6&gt;Any other interface that has no ACL applied, allows no traffic to a lower lever interface.&lt;/H6&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;No, it's a general rule that traffic is allowed to lower level interface regardless if it's inside, DMZ or whatever.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 15:43:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915114#M153896</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T15:43:53Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply,</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915115#M153897</link>
      <description>&lt;P&gt;Thanks for the reply,&lt;/P&gt;
&lt;P&gt;This "Any other interface that has no ACL applied, allows no traffic to a lower lever interface."&lt;/P&gt;
&lt;P&gt;Should have been "Any other interface that has no ACL applied, allows no traffic to a higher level interface."&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would like to understand this better:&lt;/P&gt;
&lt;P&gt;"correct! But to be more specific, all new connections are blocked. All return traffic is automatically allowed by the statefull inspection."&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So, say I have two interfaces with no ACL applied to either, Inside(100) and DMZ1(50).&lt;/P&gt;
&lt;P&gt;If I source ICMP traffic to a device in the DMZ, I should expect to see that traffic hit the device in the DMZ, but unable to return that traffic back to Inside.&lt;/P&gt;
&lt;P&gt;Or are you saying that even without an ACL applied to either interface, I should expect to see the return traffic?&lt;/P&gt;
&lt;P&gt;And, if I am not seeing the return traffic, should I look at NAT being an issue?&lt;/P&gt;
&lt;P&gt;My understanding was with the newer images, (8.3 or 8.4 or later), NAT was not needed across the ASA interfaces by default.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 16:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915115#M153897</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2016-05-12T16:53:34Z</dc:date>
    </item>
    <item>
      <title>NAT is not needed any more.</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915116#M153898</link>
      <description>&lt;P&gt;NAT is not needed any more. And if there is no NAT-rule, the traffic is forwarded without translation. Well,&amp;nbsp;only if allowed by ACL or security-level.&lt;/P&gt;
&lt;P&gt;For ICMP you have to be aware that this is not statefully inspected by default. This has to be enabled in the policy-map.&lt;/P&gt;
&lt;P&gt;For your example,&amp;nbsp;lets assume we have:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;no inspection for ICMP and no ACLs&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;The ICMP echo-request is allowed by sec-level&amp;nbsp;to the DMZ-host, but no entry is added to the state-table.&lt;/LI&gt;
&lt;LI&gt;The answer packet reaches the lower security-level interface and is dropped.&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;no ACLs but ICMP-inspection enabled&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;The ICMP echo-request is allowed by sec-level &amp;nbsp;to the DMZ-host, and the ASA adds an&amp;nbsp;entry to the state-table.&lt;/LI&gt;
&lt;LI&gt;The echo reply matches this state-entry and is allowed.&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;3) no ACL on inside and an ACL "permit icmp any any echo-reply" on the DMZ, no icmp-inspection&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;OL&gt;
&lt;LI&gt;The ICMP echo-request is allowed by sec-level&amp;nbsp;to the DMZ-host, but no entry is added to the state-table.&lt;/LI&gt;
&lt;LI&gt;The echo-reply can't be matched against an entry in the state table and is compared against the ACL. There the echo-request is allowed.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 12 May 2016 17:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915116#M153898</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T17:26:48Z</dc:date>
    </item>
    <item>
      <title>Thanks for the great</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915117#M153899</link>
      <description>&lt;P&gt;Thanks for the great information.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I may have some more questions for you, but in the meantime, have you ever set up a firewall this way, or ever seen it done?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It was a CCIE that configured this, but it seems that with no ACLs applied, you lose a huge element of control over traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The way you have explained it, since I do have ICMP inspection enabled, this would explain why I am not getting that traffic returned, but IP traffic, TCP, UDP traffic is not getting inspected, so anything sourced from higher interface is going to get returned (if I am getting all the points).&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 17:50:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915117#M153899</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2016-05-12T17:50:52Z</dc:date>
    </item>
    <item>
      <title>I prefer to have ACLs on all</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915118#M153900</link>
      <description>&lt;P&gt;I prefer to have ACLs on all interfaces for full control of the traffic.&lt;/P&gt;
&lt;P&gt;For the inspection: The ASA inspects TCP and UDP by default, so this traffic should work. For ICMP, do you have a typo in your last statement? With ICMP enabled, you should get the replies back.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 18:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915118#M153900</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T18:30:41Z</dc:date>
    </item>
    <item>
      <title>Ok, I needed to re-read your</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915119#M153901</link>
      <description>&lt;P&gt;Ok, I needed to re-read your earlier post.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I do have inspection enabled, so I should get the reply back, but I am not.&lt;/P&gt;
&lt;P&gt;So, I guess I need to look into why I am not:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp;&lt;SPAN style="color: #ff0000;"&gt; inspect icmp&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 18:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915119#M153901</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2016-05-12T18:38:57Z</dc:date>
    </item>
    <item>
      <title>That means taht ICMP is</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915120#M153902</link>
      <description>&lt;P&gt;That means taht ICMP is inspected and you should be able to ping through the ASA.&amp;nbsp;Can you again describe exactly what's not working?&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 20:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915120#M153902</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T20:11:38Z</dc:date>
    </item>
    <item>
      <title>I believe it is working as</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915121#M153903</link>
      <description>&lt;P&gt;I believe it is working as expected.&lt;/P&gt;
&lt;P&gt;There are a lot of VRFs on the core switch and I believe I was testing from a VRF that doesn't have a route to the network in the DMZ when I tried before.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I tried from the cores switch, from the VRF of the inside interface, and was a ble to ping across the interfaces.&lt;/P&gt;
&lt;P&gt;I appreciate your help in understanding this.&lt;/P&gt;
&lt;P&gt;I may have some more questions regarding the context mode these ASAs are currently in.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 20:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915121#M153903</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2016-05-12T20:42:19Z</dc:date>
    </item>
    <item>
      <title>&gt; I believe it is working as</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915122#M153904</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;I believe it is working as expected.&lt;/P&gt;
&lt;P&gt;fine!&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;I may have some more questions regarding the context mode these ASAs are currently in.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I think starting a new thread for this is a good idea.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2016 20:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-no-acl-applied-inbound-or-outbound/m-p/2915122#M153904</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-05-12T20:52:43Z</dc:date>
    </item>
  </channel>
</rss>

