<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL Problem with firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801655#M169228</link>
    <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am configuring a firewall which has four zones:&lt;/P&gt;
&lt;P&gt;1. DC-INSIDE (security-level 50)&lt;/P&gt;
&lt;P&gt;2. DC-OUTSIDE (security-level 50)&lt;/P&gt;
&lt;P&gt;3. DC-DMZ-ZONE (security-level 90)&lt;/P&gt;
&lt;P&gt;4. DC-SERVER-ZONE (security-level 100)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;I created the below ACLs for all users can access all zones:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;access-list DC-OUTSIDE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-INSIDE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-DMZ-ZONE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-SERVER-ZONE_ACCESS_IN extended permit ip any any&lt;/P&gt;
&lt;P&gt;access-group DC-OUTSIDE_ACCESS_IN in interface DC-OUTSIDE&lt;BR /&gt;access-group DC-INSIDE_ACCESS_IN in interface DC-INSIDE&lt;BR /&gt;access-group DC-DMZ-ZONE_ACCESS_IN in interface DC-DMZ-ZONE&lt;BR /&gt;access-group DC-SERVER-ZONE_ACCESS_IN in interface DC-SERVER-ZONE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;Problems:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;1. I cannot access DC-INSIDE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;2. I cannot access DC-SERVER-ZONE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;3. I cannot access DC-DMZ-ZONE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;***(N.B.: I only get access DC-OUTSIDE to DC-INSIDE and DC-OUTSIDE to DC-SERVER-ZONE)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any mistake in ACLs?&lt;/P&gt;
&lt;P&gt;If there is any mistake, please let me know and suggest me the solution.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanking You-&lt;/P&gt;
&lt;P&gt;Azizur Rahman&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:07:06 GMT</pubDate>
    <dc:creator>azizur-rahman</dc:creator>
    <dc:date>2019-03-12T07:07:06Z</dc:date>
    <item>
      <title>ACL Problem with firewall</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801655#M169228</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am configuring a firewall which has four zones:&lt;/P&gt;
&lt;P&gt;1. DC-INSIDE (security-level 50)&lt;/P&gt;
&lt;P&gt;2. DC-OUTSIDE (security-level 50)&lt;/P&gt;
&lt;P&gt;3. DC-DMZ-ZONE (security-level 90)&lt;/P&gt;
&lt;P&gt;4. DC-SERVER-ZONE (security-level 100)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;I created the below ACLs for all users can access all zones:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;access-list DC-OUTSIDE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-INSIDE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-DMZ-ZONE_ACCESS_IN extended permit ip any any&lt;BR /&gt;access-list DC-SERVER-ZONE_ACCESS_IN extended permit ip any any&lt;/P&gt;
&lt;P&gt;access-group DC-OUTSIDE_ACCESS_IN in interface DC-OUTSIDE&lt;BR /&gt;access-group DC-INSIDE_ACCESS_IN in interface DC-INSIDE&lt;BR /&gt;access-group DC-DMZ-ZONE_ACCESS_IN in interface DC-DMZ-ZONE&lt;BR /&gt;access-group DC-SERVER-ZONE_ACCESS_IN in interface DC-SERVER-ZONE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="text-decoration: underline;"&gt;Problems:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;1. I cannot access DC-INSIDE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;2. I cannot access DC-SERVER-ZONE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;3. I cannot access DC-DMZ-ZONE to DC-OUTSIDE&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;***(N.B.: I only get access DC-OUTSIDE to DC-INSIDE and DC-OUTSIDE to DC-SERVER-ZONE)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any mistake in ACLs?&lt;/P&gt;
&lt;P&gt;If there is any mistake, please let me know and suggest me the solution.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanking You-&lt;/P&gt;
&lt;P&gt;Azizur Rahman&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:07:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801655#M169228</guid>
      <dc:creator>azizur-rahman</dc:creator>
      <dc:date>2019-03-12T07:07:06Z</dc:date>
    </item>
    <item>
      <title>Hi Azizur,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801656#M169229</link>
      <description>&lt;P&gt;Hi Azizur,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By default the ASA will not permit traffic between interfaces (or sub-interfaces) with the same security level, or for that matter hairpin traffic. You can either change the security levels of the interfaces or use the 'same-security-traffic permit inter-interface' command in global config mode. This will solve your DC-INSIDE to DC-OUTSIDE problem.&lt;/P&gt;
&lt;P&gt;as for your other problems ensure routing is in place and I recommend using the 'packet-tracer' command to see where the problem lies.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 18:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801656#M169229</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-06T18:20:05Z</dc:date>
    </item>
    <item>
      <title>Yes Gareth,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801657#M169230</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes Gareth,&lt;/P&gt;
&lt;P&gt;I know that by&amp;nbsp;&lt;SPAN&gt;default the ASA will not permit traffic between interfaces (or sub-interfaces) with the same security level. To communicate between two same security level zone, I use "&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;" commend.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Gareth, one thing I would like to mention that I can access (ping)&amp;nbsp;&lt;STRONG&gt;DC-OUTSIDE to DC-INSIDE&lt;/STRONG&gt;&amp;nbsp;and both are in same security level (50). So I think it is working. but I cannot get ping&amp;nbsp;&lt;STRONG&gt;DC-INSIDE to DC-OUTSIDE&lt;/STRONG&gt;,&amp;nbsp;&lt;STRONG&gt;DC-SERVER-ZONE to DC-OUTSIDE&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;DC-DMZ-ZONE to DC-OUTSIDE.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanking You-&lt;/P&gt;
&lt;P&gt;Azizur Rahman&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 18:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801657#M169230</guid>
      <dc:creator>azizur-rahman</dc:creator>
      <dc:date>2016-01-06T18:32:31Z</dc:date>
    </item>
    <item>
      <title>Hi Azizur,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801658#M169231</link>
      <description>&lt;P&gt;Hi Azizur,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you post interface configurations and 'show route' and 'show arp' output please? also what are the addresses of the devices on each interface you are trying to ping from/to?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 18:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801658#M169231</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-06T18:35:54Z</dc:date>
    </item>
    <item>
      <title>Hi Gareth,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801659#M169233</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Gareth,&lt;/P&gt;
&lt;P&gt;Please find the attachments.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Ping Test:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;1. From&amp;nbsp;10.10.3.3 to 10.10.1.1===ok&lt;/P&gt;
&lt;P&gt;2. From 10.10.1.1 to 10.10.3.3, 10.10.3.5 (standby)===Not ok&lt;/P&gt;
&lt;P&gt;3. From 10.10.3.3 to 10.10.2.1===ok&lt;/P&gt;
&lt;P&gt;4. From 10.10.2.1 to 10.10.3.3===Not ok&lt;/P&gt;
&lt;P&gt;5. From 10.10.3.3 to 192.168.102.254===ok&lt;/P&gt;
&lt;P&gt;6. From 192.168.102.254 to 10.10.3.3===not ok&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanking You-&lt;/P&gt;
&lt;P&gt;Azizur Rahman&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 19:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801659#M169233</guid>
      <dc:creator>azizur-rahman</dc:creator>
      <dc:date>2016-01-06T19:08:02Z</dc:date>
    </item>
    <item>
      <title>Hi Azizur,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801660#M169235</link>
      <description>&lt;P&gt;Hi Azizur,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you run the commands:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input DC-INSIDE tcp 10.10.1.1 50000 10.10.3.3 443 detailed&lt;/P&gt;
&lt;P&gt;packet-tracer input DC-INSIDE tcp 10.10.2.1 50000 10.10.3.3 443 detailed&lt;/P&gt;
&lt;P&gt;packet-tracer input DC-INSIDE tcp 192.168.102.254 50000 10.10.3.3 443 detailed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;and post the output please?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 19:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801660#M169235</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-06T19:22:00Z</dc:date>
    </item>
    <item>
      <title>apply this command:</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801661#M169237</link>
      <description>&lt;P&gt;apply this command:&lt;/P&gt;
&lt;P&gt;same-security permit inter-interface&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Sarabjit&lt;/P&gt;
&lt;P&gt;Please rate it if helpful.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 20:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801661#M169237</guid>
      <dc:creator>sarabsin</dc:creator>
      <dc:date>2016-01-06T20:33:09Z</dc:date>
    </item>
    <item>
      <title>ignore my previous comments ,</title>
      <link>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801662#M169238</link>
      <description>&lt;P&gt;ignore my previous comments , it already has been suggested.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 20:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-problem-with-firewall/m-p/2801662#M169238</guid>
      <dc:creator>sarabsin</dc:creator>
      <dc:date>2016-01-06T20:37:45Z</dc:date>
    </item>
  </channel>
</rss>

