<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Alex, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879704#M158824</link>
    <description>&lt;P&gt;Hi Alex,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The only way to block the UDP 500 traffic is to use a control-plane ACL.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We even see hits on the &lt;G class="gr_ gr_373 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="373" data-gr-id="373"&gt;ACL :&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list Inbound_Filter line 2 extended deny object-group IPSEC any any (hitcnt=7)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Did you try clearing the connection ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use 'clear conn all address &amp;lt;addr&amp;gt;' to clear up the connection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Mar 2016 03:00:52 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-03-06T03:00:52Z</dc:date>
    <item>
      <title>ASA inbound firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879700#M158820</link>
      <description>&lt;P&gt;Hello Everyone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a question regarding ASA&amp;nbsp;5505 firewall.&lt;/P&gt;
&lt;P&gt;Outbound interface has sec level 0:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;interface Vlan10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; nameif outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Created acl to filter site-to-site traffic and triggered tunnel filtering:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;no sysopt connection permit-vpn&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;object network ipsec_subnet&lt;BR /&gt; subnet 192.168.11.0 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list l2l-filter extended permit icmp any any&lt;BR /&gt;access-list l2l-filter extended permit tcp any object ipsec_subnet eq www&lt;BR /&gt;access-list l2l-filter extended permit tcp any object ipsec_subnet eq https&lt;BR /&gt;access-list l2l-filter extended permit tcp any object ipsec_subnet eq ftp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-group l2l-filter in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Since I was working only with routers, as far as I understand, in theory&amp;nbsp;ipsec peers should not be able to establish ipsec tunnels with ASA since I did not allow inbound UDP 500,4500 and ESP in l2l-filter ACL, but in reality tunnels are working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please explain why inbound ACL on outside interface allows incoming ipsec connections.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879700#M158820</guid>
      <dc:creator>Alex MD</dc:creator>
      <dc:date>2019-03-12T07:26:33Z</dc:date>
    </item>
    <item>
      <title>Hi Alex,</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879701#M158821</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Access-Lists applied to interfaces control traffic flowing through the ASA. To control traffic to the ASA you use Access-Lists with the control-plane option.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You may use control-plane access-list to filter the VPN connections to the ASA by blocking UDP 500,4500 or ESP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# access-list FILTER-VPN deny udp host host &amp;nbsp; eq 500&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# access-list FILTER-VPN permit ip any any&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# access-group FILTER-VPN in interface outside &lt;STRONG&gt;control-plane&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The access list applied on the ASA by default using the &lt;EM&gt;access-group&amp;nbsp;&lt;/EM&gt;command only filters traffic passing THROUGH the ASA; it does not filter traffic TO the ASA. In short, we can say that the default access list applies to the data-plane not the control plane. There is an option that allows us to specify that an applied access list should be used for traffic destined to the ASA itself using the &amp;nbsp;“control-plane” keyword in the &lt;EM&gt;access-group&lt;/EM&gt; command.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;B&gt;Please rate helpful posts.&lt;/B&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 17:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879701#M158821</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-05T17:23:27Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879702#M158822</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/adganjoo" title="View user profile." class="username" lang="" about="/users/adganjoo" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Aditya&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;Thank you for the explanation! &amp;nbsp;I have modified my configuration.&lt;/P&gt;
&lt;P&gt;Added ACL&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter extended permit icmp any any echo&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter extended permit icmp any any echo-reply&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter extended deny ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Applied ACL with "&lt;SPAN&gt;control-plane&lt;/SPAN&gt;" option&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-group Inbound_Filter in interface outside control-plane&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;But ipsec peers still can connect.&lt;/P&gt;
&lt;P&gt;Here is my routing table.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;5505(config)# show route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; * - candidate default, U - per-user static route, o - ODR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; P - periodic downloaded static route&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Gateway of last resort is 10.3.1.1 to network 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;C 192.168.11.0 255.255.255.248 is directly connected, ipsec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;C 10.3.1.0 255.255.255.0 is directly connected, outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;C 192.168.2.0 255.255.255.0 is directly connected, mgmt&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&lt;STRONG&gt;S* 0.0.0.0 0.0.0.0 [1/0] via 10.3.1.1, outside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Pinging my default gateway&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;5505(config)# ping 10.3.1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type escape sequence to abort.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Sending 5, 100-byte ICMP Echos to 10.3.1.1, timeout is 2 seconds:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!!!!!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;But I do not see any matches/hits on applied ACL:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;5505(config)# sho access-list Inbound_Filter&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter; 3 elements; name hash: 0x61bc98a6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter line 1 extended permit icmp any any echo (&lt;STRONG&gt;hitcnt=0&lt;/STRONG&gt;) 0x007dc0fa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter line 2 extended permit icmp any any echo-reply (&lt;STRONG&gt;hitcnt=0&lt;/STRONG&gt;) 0x6762f5f4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter line 3 extended deny ip any any (hitcnt=0) 0xf59102e3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Software version:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;5505# sho version&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Cisco Adaptive Security Appliance Software Version 9.1(4)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please advice what am I doing wrong ?&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 19:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879702#M158822</guid>
      <dc:creator>Alex MD</dc:creator>
      <dc:date>2016-03-05T19:54:26Z</dc:date>
    </item>
    <item>
      <title>Answering my own question</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879703#M158823</link>
      <description>&lt;P&gt;Answering my own question above.&lt;/P&gt;
&lt;P&gt;Don`t try to compare ASA rules with routers ones. By some reason even if you set deny ip any any it will still allow incoming connections, ASA does not care. Icmp, http, ssh is filtered the other way around.&lt;/P&gt;
&lt;P&gt;I have modified my ACL, specified udp ports:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list Inbound_Filter line 2 extended deny object-group IPSEC any any (hitcnt=7) 0x5697f160&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; access-list Inbound_Filter line 2 extended deny esp any any &lt;STRONG&gt;(hitcnt=7)&lt;/STRONG&gt; 0xbd4f4649&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; access-list Inbound_Filter line 2 extended deny ah any any (hitcnt=0) 0x0104ee40&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; access-list Inbound_Filter line 2 extended deny udp any any eq isakmp &lt;STRONG&gt;(hitcnt=0)&lt;/STRONG&gt; 0x11afb0c0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; access-list Inbound_Filter line 2 extended deny udp any any eq 4500 &lt;STRONG&gt;(hitcnt=0)&lt;/STRONG&gt; 0xe07ed8e3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As the result, by unknown reason, tunnels are active, but no traffic in tunnel since ESP is blocked.&lt;/P&gt;
&lt;P&gt;Can you please advice how to block incoming UDP traffic ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 22:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879703#M158823</guid>
      <dc:creator>Alex MD</dc:creator>
      <dc:date>2016-03-05T22:01:04Z</dc:date>
    </item>
    <item>
      <title>Hi Alex,</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879704#M158824</link>
      <description>&lt;P&gt;Hi Alex,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The only way to block the UDP 500 traffic is to use a control-plane ACL.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We even see hits on the &lt;G class="gr_ gr_373 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="373" data-gr-id="373"&gt;ACL :&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list Inbound_Filter line 2 extended deny object-group IPSEC any any (hitcnt=7)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Did you try clearing the connection ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use 'clear conn all address &amp;lt;addr&amp;gt;' to clear up the connection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2016 03:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879704#M158824</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-06T03:00:52Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879705#M158825</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/adganjoo" title="View user profile."&gt;Aditya&lt;/A&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Indeed, after clearing connections everything worked like a charm.&lt;/P&gt;
&lt;P&gt;Thank you for advice.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2016 18:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-firewall/m-p/2879705#M158825</guid>
      <dc:creator>Alex MD</dc:creator>
      <dc:date>2016-03-09T18:55:41Z</dc:date>
    </item>
  </channel>
</rss>

