<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL for  Transparent ASA Port in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030256#M22652</link>
    <description>&lt;P&gt;Hello Experts,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am am setting up an asa 5508 in transparent firewall. Created a BVI interface and join two inside interfaces to bridge. I am after to create an ACL that can permit only one host&amp;nbsp; per&amp;nbsp; interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface BVI&amp;nbsp; 44&lt;/P&gt;&lt;P&gt;ip add 10.1.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface giga&amp;nbsp; 1/1&lt;/P&gt;&lt;P&gt;nameif in&lt;/P&gt;&lt;P&gt;sec level 100&lt;/P&gt;&lt;P&gt;bridge group 44&lt;/P&gt;&lt;P&gt;int giga 1/2&lt;/P&gt;&lt;P&gt;nameif in2&lt;/P&gt;&lt;P&gt;sec level 100&lt;/P&gt;&lt;P&gt;bridge group 44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;network object in&amp;nbsp; host 10.1.1.1&lt;/P&gt;&lt;P&gt;network object in2 host 10.1.1.2&lt;/P&gt;&lt;P&gt;wrote this&amp;nbsp;&lt;/P&gt;&lt;P&gt;01. access-list acl_in extended permit ip object in&amp;nbsp; any&amp;nbsp;&lt;/P&gt;&lt;P&gt;apply access-group acl_in in interface in.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then i&amp;nbsp; change the my machine's ip 10.1.1.40 and try to send a ping command to BVI interface.&amp;nbsp; since the ACL is apply to Inbound traffic, I am expecting&amp;nbsp; if i change the ip address of the machine it should not&amp;nbsp; let me pass. can someone&amp;nbsp; please help me to understand&amp;nbsp; this correctly ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for your time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 15 Feb 2020 12:43:57 GMT</pubDate>
    <dc:creator>LANSK</dc:creator>
    <dc:date>2020-02-15T12:43:57Z</dc:date>
    <item>
      <title>ACL for  Transparent ASA Port</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030256#M22652</link>
      <description>&lt;P&gt;Hello Experts,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am am setting up an asa 5508 in transparent firewall. Created a BVI interface and join two inside interfaces to bridge. I am after to create an ACL that can permit only one host&amp;nbsp; per&amp;nbsp; interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface BVI&amp;nbsp; 44&lt;/P&gt;&lt;P&gt;ip add 10.1.1.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface giga&amp;nbsp; 1/1&lt;/P&gt;&lt;P&gt;nameif in&lt;/P&gt;&lt;P&gt;sec level 100&lt;/P&gt;&lt;P&gt;bridge group 44&lt;/P&gt;&lt;P&gt;int giga 1/2&lt;/P&gt;&lt;P&gt;nameif in2&lt;/P&gt;&lt;P&gt;sec level 100&lt;/P&gt;&lt;P&gt;bridge group 44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;network object in&amp;nbsp; host 10.1.1.1&lt;/P&gt;&lt;P&gt;network object in2 host 10.1.1.2&lt;/P&gt;&lt;P&gt;wrote this&amp;nbsp;&lt;/P&gt;&lt;P&gt;01. access-list acl_in extended permit ip object in&amp;nbsp; any&amp;nbsp;&lt;/P&gt;&lt;P&gt;apply access-group acl_in in interface in.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then i&amp;nbsp; change the my machine's ip 10.1.1.40 and try to send a ping command to BVI interface.&amp;nbsp; since the ACL is apply to Inbound traffic, I am expecting&amp;nbsp; if i change the ip address of the machine it should not&amp;nbsp; let me pass. can someone&amp;nbsp; please help me to understand&amp;nbsp; this correctly ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for your time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2020 12:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030256#M22652</guid>
      <dc:creator>LANSK</dc:creator>
      <dc:date>2020-02-15T12:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for  Transparent ASA Port</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030345#M22653</link>
      <description>&lt;P&gt;where is your device belong to - when you initiated traffic - connected to in-network or in2 network side?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;post full config&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Feb 2020 20:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030345#M22653</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-02-15T20:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for  Transparent ASA Port</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030504#M22654</link>
      <description>&lt;P&gt;Hello Balaji,&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&amp;nbsp; for the reply.&amp;nbsp; sure ,let me share the full config .&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;firewall transparent&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;bridge-group 44&lt;BR /&gt;nameif in&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 44&lt;BR /&gt;nameif in2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;!&lt;BR /&gt;interface BVI44&lt;BR /&gt;description Virtual Interface&lt;BR /&gt;ip address 10.1.1.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;banner motd $ Un-authorized access to this device is prohibited $&lt;BR /&gt;boot system disk0:/asa982-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GST 4&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network PERMIT_1&lt;BR /&gt;host 10.1.1.1&lt;BR /&gt;object network PERMIT_2&lt;BR /&gt;host 10.1.1.2&lt;BR /&gt;access-list ACL_permitGiga01 extended permit ip object PERMIT_1 object PERMIT_2&lt;BR /&gt;access-list ACL_permitGiga02 extended permit ip object PERMIT_2 object PERMIT_1&lt;BR /&gt;!&lt;BR /&gt;snmp-map asa_snmp_map&lt;BR /&gt;deny version 1&lt;BR /&gt;deny version 2&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu in 1500&lt;BR /&gt;mtu in2 1500&lt;BR /&gt;&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;/P&gt;&lt;P&gt;access-group ACL_permitGiga01 in interface in&lt;BR /&gt;access-group ACL_permitGiga02 in interface in2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;no http server enable&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;no service password-recovery&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 5&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic will&amp;nbsp; start from 10.1.1.1 --&amp;gt; 10.1.1.2&lt;/P&gt;</description>
      <pubDate>Sun, 16 Feb 2020 16:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030504#M22654</guid>
      <dc:creator>LANSK</dc:creator>
      <dc:date>2020-02-16T16:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for  Transparent ASA Port</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030530#M22655</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The interested bit are below&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface BVI44&lt;BR /&gt;description Virtual Interface&lt;BR /&gt;ip address 10.1.1.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;object network PERMIT_1&lt;BR /&gt;host 10.1.1.1&lt;BR /&gt;!&lt;BR /&gt;object network PERMIT_2&lt;BR /&gt;host 10.1.1.2&lt;BR /&gt;!&lt;BR /&gt;access-list ACL_permitGiga01 extended permit ip object PERMIT_1 object PERMIT_2&lt;BR /&gt;access-list ACL_permitGiga02 extended permit ip object PERMIT_2 object PERMIT_1&lt;BR /&gt;!&lt;BR /&gt;access-group ACL_permitGiga01 in interface in&lt;BR /&gt;access-group ACL_permitGiga02 in interface in2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;now if you configured your machine ip address 10.1.1.40 and ping BVI this will be successful. if you ping to from 10.1.140 to PERMIT_1/2 it will deny as your rule are very specific. This is how i see it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Feb 2020 17:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030530#M22655</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-16T17:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for  Transparent ASA Port</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030536#M22657</link>
      <description>&lt;P&gt;These subnets belong to the same network right and you have a rule here which allows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sense?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Feb 2020 18:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-transparent-asa-port/m-p/4030536#M22657</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-02-16T18:03:35Z</dc:date>
    </item>
  </channel>
</rss>

