<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi guys,I had a chance to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605193#M198175</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I had a chance to speak to the previous admin on this.&amp;nbsp; The reason he configured inside_access_in permit ip any any was in the event if he needed to block something specific on the inside from getting out, he could add the deny line above the permit ip any any line and it wouldn't interrupt traffic, versus needing to put the deny statement in, killing traffic, then adding the permit line.&amp;nbsp; Of course I would think it would be just as easy to just add the permit statement in first, then put the deny statement, but I guess there could be something said for forgetting to do that and subsequently nuking traffic.&amp;nbsp; Personal preference I guess.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jan 2015 13:39:11 GMT</pubDate>
    <dc:creator>Dean Romanelli</dc:creator>
    <dc:date>2015-01-08T13:39:11Z</dc:date>
    <item>
      <title>Purpose of inside_access_in permit ip any any</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605186#M198168</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Reviewing some firewalls from a company acquisition and moving to standardize configs with the existing firewalls.&amp;nbsp; I see they've configured the following, and I fail to see it's purpose and hoping someone can provide some insight.&lt;/P&gt;&lt;P&gt;These are 5505's:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_access_in extended permit icmp any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group inside_access_in in interface inside&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't understand the purpose of this. The inside interface is security 100, and the outside is security 0.&amp;nbsp; Aren't these flows allowed by default?&amp;nbsp; I get that you can specify inside_access_in when you want to limit what can go outside, but in the can of "any any" above, I don't see the point.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access_in extended permit icmp any any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group outside_access_in in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Same thing here ---&amp;gt; It's my understanding that ICMP, HTTPS &amp;amp; SSH all occur before the firewall function comes into play on a 5505, so isn't this ACL also moot?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605186#M198168</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2019-03-12T05:18:13Z</dc:date>
    </item>
    <item>
      <title>I've sometimes seen the</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605187#M198169</link>
      <description>&lt;P&gt;I've sometimes seen the "inside_access_in" case used to trigger logging or hits against the access-list for a very basic connection accounting function. Beyond that though, it's a pretty superfluous command.&lt;/P&gt;&lt;P&gt;I could speculate that some inexperienced admin put it in just to satisfy any doubt he/she may have had when asked "are you SURE the firewall isn't blocking my traffic?" (although it may still have been if there was an inspection rule being hit &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt; )&lt;/P&gt;&lt;P&gt;The outside one would allow pinging initiated from the outside of internal hosts that are externally addressable. (Although if that's the only entry&amp;nbsp;in the ACL it would prevent all other outside-initiated traffic.)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 00:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605187#M198169</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-01-06T00:03:40Z</dc:date>
    </item>
    <item>
      <title> "access-list outside_access</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605188#M198170</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;EM&gt;"access-list outside_access_in extended permit icmp any any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group outside_access_in in interface outside"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to ping, ICMP&amp;nbsp; is also needed for proper path mtu operation. Although he could've been more specific on which ICMP messages he allowed in that ruke, he may have enabled ICMP to troubleshoot issues related to&amp;nbsp; path MTU. I would keep that in mind when deciding about removing/changing that rule. Also check out how he has ICMP inspection set up too. He may have made changes there as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 19:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605188#M198170</guid>
      <dc:creator>internodetech</dc:creator>
      <dc:date>2015-01-06T19:06:40Z</dc:date>
    </item>
    <item>
      <title>You are correct in that you</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605189#M198171</link>
      <description>&lt;P&gt;You are correct in that you do not need the ACL. I typically see this when the person setting it up really didn't understand the security-levels or they did it for logging purposes. I don't see the log keyword so I would bet it was 'try something until it works' and this was one of the things.&lt;/P&gt;&lt;P&gt;For the outside ACL, this would allow anyone to ping any server that has a translation. Typically added for troubleshooting, but should be locked down further. You are correct about the firewall functions when it is to the ASA itself, but the ACL there is for NAT's and not just the ASA itself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2015 19:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605189#M198171</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-06T19:55:38Z</dc:date>
    </item>
    <item>
      <title>Good information, as always</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605190#M198172</link>
      <description>&lt;P&gt;Good information, as always guys.&amp;nbsp; Thanks much.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One quick question about the outside_access_in ICMP one:&amp;nbsp; So basically, if the site that has the ASA with this configured rule had any servers on the inside that have outside translations, it would allow anyone to ping the public IP's of said servers successfully from the internet right?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 02:06:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605190#M198172</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2015-01-07T02:06:17Z</dc:date>
    </item>
    <item>
      <title>marvin,this is very</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605191#M198173</link>
      <description>&lt;P&gt;marvin,&lt;/P&gt;&lt;P&gt;this is very informative! +5&lt;/P&gt;&lt;P&gt;will consider this on my new ASA builds.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 03:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605191#M198173</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2015-01-07T03:28:55Z</dc:date>
    </item>
    <item>
      <title>Correct</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605192#M198174</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 16:15:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605192#M198174</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-01-07T16:15:24Z</dc:date>
    </item>
    <item>
      <title>Hi guys,I had a chance to</title>
      <link>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605193#M198175</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I had a chance to speak to the previous admin on this.&amp;nbsp; The reason he configured inside_access_in permit ip any any was in the event if he needed to block something specific on the inside from getting out, he could add the deny line above the permit ip any any line and it wouldn't interrupt traffic, versus needing to put the deny statement in, killing traffic, then adding the permit line.&amp;nbsp; Of course I would think it would be just as easy to just add the permit statement in first, then put the deny statement, but I guess there could be something said for forgetting to do that and subsequently nuking traffic.&amp;nbsp; Personal preference I guess.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2015 13:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/purpose-of-inside-access-in-permit-ip-any-any/m-p/2605193#M198175</guid>
      <dc:creator>Dean Romanelli</dc:creator>
      <dc:date>2015-01-08T13:39:11Z</dc:date>
    </item>
  </channel>
</rss>

