<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888109#M171979</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I see that you are using&amp;nbsp;&lt;SPAN&gt;access-list outside-etpi_access_in line 2 extended permit &lt;G class="gr_ gr_39 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="39" data-gr-id="39"&gt;ip&lt;/G&gt; &lt;G class="gr_ gr_56 gr-alert gr_spell undefined ContextualSpelling only-del replaceWithoutSep" id="56" data-gr-id="56"&gt;any any&lt;/G&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So there is no need of using permit &amp;nbsp;&lt;G class="gr_ gr_59 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="59" data-gr-id="59"&gt;icmp&lt;/G&gt; any as the above statement will allow every traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can use a packet tracer to confirm the access-list that is being hit on the ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Tue, 08 Mar 2016 05:17:41 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-03-08T05:17:41Z</dc:date>
    <item>
      <title>access rules seems not following</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888106#M171976</link>
      <description>&lt;P&gt;Hi, I haven't rebooted the Cisco ASA (our firewall) but might need one since I'm encountering weird stuff. On the interface where our users are running in this policy or access rules. Originally it only has ip service, so when I thought of adding icmp so that we can check by pinging outside ip etc, it worked for me but right after I removed the icmp, weird is that it can still ping a hostname and outside dns server like 8.8.8.8 (Google) etc&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Device is Cisco ASA 5520 with OS version 8.2&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888106#M171976</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2019-03-12T07:27:01Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888107#M171977</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you share the access rules configured on the outside interface ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888107#M171977</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T05:07:24Z</dc:date>
    </item>
    <item>
      <title>fw-01# show access-list</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888108#M171978</link>
      <description>&lt;P&gt;fw-01# show access-list &lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list inside_access_in; 3 elements; name hash: 0x433a1af1&lt;BR /&gt;access-list inside_access_in line 1 extended permit object-group DM_INLINE_PROTOCOL_2 any any 0xa61db0bd &lt;BR /&gt;&amp;nbsp; access-list inside_access_in line 1 extended permit ip any any (hitcnt=205985) 0xa925365e &lt;BR /&gt;&amp;nbsp; access-list inside_access_in line 1 extended permit icmp any any (hitcnt=0) 0xd6183fb5 &lt;BR /&gt;access-list inside_access_in line 2 extended permit icmp any any (hitcnt=0) 0xd6183fb5 &lt;BR /&gt;access-list outside_access_in; 1 elements; name hash: 0x6892a938&lt;BR /&gt;access-list outside_access_in line 1 extended permit ip any any (hitcnt=29) 0x7e78c5c4 &lt;BR /&gt;access-list dmz_access_in; 2 elements; name hash: 0xde725a72&lt;BR /&gt;access-list dmz_access_in line 1 extended permit ip any any (hitcnt=139834) 0xba28b9ac &lt;BR /&gt;access-list dmz_access_in line 2 extended permit icmp any any (hitcnt=0) 0xb41d7db6 &lt;BR /&gt;access-list inside_mpc_1; 1 elements; name hash: 0x99bd69c1&lt;BR /&gt;access-list inside_mpc_1 line 1 extended permit ip any vlan0090 255.255.255.0 (hitcnt=0) 0x1900fad0 &lt;BR /&gt;access-list global_mpc; 1 elements; name hash: 0x2e734f01&lt;BR /&gt;access-list global_mpc line 1 extended permit ip any any (hitcnt=116018586) 0x52c4ba82 &lt;BR /&gt;access-list management_access_in; 2 elements; name hash: 0x4814da18&lt;BR /&gt;access-list management_access_in line 1 extended permit ip any any (hitcnt=0) 0x9e85505c &lt;BR /&gt;access-list management_access_in line 2 extended permit icmp any any (hitcnt=0) 0x4f73c008 &lt;BR /&gt;access-list outside-etpi_access_in; 4 elements; name hash: 0xf5758cf2&lt;BR /&gt;access-list outside-etpi_access_in line 1 extended permit object-group DM_INLINE_PROTOCOL_3 any host&amp;nbsp;x.x.x.x 0x0c31585e &lt;BR /&gt;&amp;nbsp; access-list outside-etpi_access_in line 1 extended permit ip any host&amp;nbsp;x.x.x.x (hitcnt=178) 0xe130b3d0 &lt;BR /&gt;&amp;nbsp; access-list outside-etpi_access_in line 1 extended permit icmp any host&amp;nbsp;x.x.x.x (hitcnt=0) 0x28c0644d &lt;BR /&gt;access-list outside-etpi_access_in line 2 extended permit object-group DM_INLINE_PROTOCOL_1 any any 0x931df8a2 &lt;BR /&gt;&amp;nbsp; access-list outside-etpi_access_in line 2 extended permit ip any any (hitcnt=38281) 0x7a303a71 &lt;BR /&gt;&amp;nbsp; access-list outside-etpi_access_in line 2 extended permit icmp any any (hitcnt=0) 0x566bdf50 &lt;BR /&gt;access-list ra_vpn_access_in; 2 elements; name hash: 0x2ea3c11d&lt;BR /&gt;access-list ra_vpn_access_in line 1 extended permit tcp any any eq ssh (hitcnt=0) 0x20ec7d60 &lt;BR /&gt;access-list ra_vpn_access_in line 2 extended permit tcp any any eq https (hitcnt=0) 0x7fb6781a &lt;BR /&gt;access-list inside_mpc; 1 elements; name hash: 0x780b2a26&lt;BR /&gt;access-list inside_mpc line 1 extended permit ip vlan0090 255.255.255.0 any (hitcnt=0) 0x5fa0d363 &lt;BR /&gt;access-list inside_nat0_outbound; 1 elements; name hash: 0x467c8ce4&lt;BR /&gt;access-list inside_nat0_outbound line 1 extended permit ip any vlan0120 255.255.255.0 (hitcnt=0) 0x15fb09b4&lt;/P&gt;
&lt;P&gt;Above is the access-list or policies. the x.x.x.x is one of the NAT'ed IP's going outside but we can ignore that for the moment.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888108#M171978</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-08T05:12:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888109#M171979</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I see that you are using&amp;nbsp;&lt;SPAN&gt;access-list outside-etpi_access_in line 2 extended permit &lt;G class="gr_ gr_39 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="39" data-gr-id="39"&gt;ip&lt;/G&gt; &lt;G class="gr_ gr_56 gr-alert gr_spell undefined ContextualSpelling only-del replaceWithoutSep" id="56" data-gr-id="56"&gt;any any&lt;/G&gt; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So there is no need of using permit &amp;nbsp;&lt;G class="gr_ gr_59 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="59" data-gr-id="59"&gt;icmp&lt;/G&gt; any as the above statement will allow every traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can use a packet tracer to confirm the access-list that is being hit on the ASA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888109#M171979</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T05:17:41Z</dc:date>
    </item>
    <item>
      <title>Ok, what I did was remove the</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888110#M171980</link>
      <description>&lt;P&gt;Ok, what I did was remove the ip for the service and just put in domain. I was able to browse but icmp was not working. So I changed it from domain udp/tcp to ip and it worked both, was able to browse and was able to ping.&lt;/P&gt;
&lt;P&gt;I now moved to my next issue, if I can ping a website, dns, etc, I'm not sure why I can't ping my ip block. the outside-etpi or ISP1 is our main which has a block of /29. I can ping our gateway (which is the ISP side). If for example his IP is:&lt;/P&gt;
&lt;P&gt;GW(ISP): 192.168.67.113 --&amp;gt; pingable&lt;/P&gt;
&lt;P&gt;FW port(our side): 192.168.67.114 --&amp;gt; not pingable and the other IP's&lt;/P&gt;
&lt;P&gt;Did I miss something in our config?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888110#M171980</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-08T05:41:33Z</dc:date>
    </item>
    <item>
      <title>Hi Jeff,</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888111#M171981</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By &lt;G class="gr_ gr_39 gr-alert gr_gramm undefined Punctuation only-ins replaceWithoutSep" id="39" data-gr-id="39"&gt;design&lt;/G&gt; you would not be able to ping ASA outside interface IP from the inside network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888111#M171981</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T05:46:02Z</dc:date>
    </item>
    <item>
      <title>I see, thanks for the input</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888112#M171982</link>
      <description>&lt;P&gt;I see, thanks for the input Aditya and thanks for the patience for a novice like me. So by design, regardless if I NAT'ed a local IP to a WAN IP, it will still be not pingable. What I did was setup a FTP server with a local IP, NAT'ed this local ip for example: 192.168.11.3 to a WAN IP for example: 192.168.67.117 and our gateway is 192.168.67.113.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888112#M171982</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-08T05:50:53Z</dc:date>
    </item>
    <item>
      <title>Hi Jeff,</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888113#M171983</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Only interface IP should not be pingable.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All other IP's should be pingable.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 05:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888113#M171983</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T05:53:52Z</dc:date>
    </item>
    <item>
      <title>ok, copy that, so that</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888114#M171984</link>
      <description>&lt;P&gt;ok, copy that, so that clarifies everything. The only problem now is that I need to check why I cant ping the other IP's in this block.&lt;/P&gt;
&lt;P&gt;Thank you and have a great day ahead!&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 06:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888114#M171984</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-08T06:02:30Z</dc:date>
    </item>
    <item>
      <title>Hi Jeff,</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888115#M171985</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_21 gr-alert gr_gramm undefined Punctuation only-ins replaceWithoutSep" id="21" data-gr-id="21"&gt;Yes&lt;/G&gt; you are right.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2016 06:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-seems-not-following/m-p/2888115#M171985</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-03-08T06:09:29Z</dc:date>
    </item>
  </channel>
</rss>

