<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Rules - Action - DROP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025722#M22777</link>
    <description>You should access the server directly, using it's real/private IP address (10.0.0.3) - not via the firewall on the natted ip address.</description>
    <pubDate>Fri, 07 Feb 2020 15:04:06 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-02-07T15:04:06Z</dc:date>
    <item>
      <title>Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025680#M22759</link>
      <description>&lt;P&gt;I am new to managing Firewalls, so any help would be appreciated. We have a link on our website that goes to one of our internal servers that we have. However, nothing is happening when I click the link on our website. When I do a Packet Trace, it shows that it DROPs at the ACCESS-LIST. Any ideas what I can check? I have attached some screenshots. Thank you in advance.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall1.png" style="width: 741px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66804i65A140EF3C9F8445/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall1.png" alt="firewall1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66805iE6466724A00F4560/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall2.png" alt="firewall2.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025680#M22759</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025683#M22760</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Check on the logs and do a filter to check specific address. According to your rules, all internal rules to internal and external address are allowed. &lt;BR /&gt;&lt;BR /&gt;Are you checked if the service under the server is enabled as well?</description>
      <pubDate>Fri, 07 Feb 2020 14:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025683#M22760</guid>
      <dc:creator>Jaderson Pessoa</dc:creator>
      <dc:date>2020-02-07T14:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025687#M22761</link>
      <description>&lt;P&gt;Hi Jaderson,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your feedback, I appreciate it as I am still learning Cisco Firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which service should I check on the server? I am also not sure where to access the logs you are talking about. Please be patient, I am a novice. Appreciate your help!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025687#M22761</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025688#M22762</link>
      <description>Hi,&lt;BR /&gt;Unfortunately it's possible to determine the issue from the screenshot.&lt;BR /&gt;&lt;BR /&gt;Are you referring to rule #2 inbound on the outside interface - http to WYNNEAPPS1?&lt;BR /&gt;Have you defined a static NAT for that server - mapping the public ip address to the real/private ip address?&lt;BR /&gt;Does the object WYNNEAPPS1 reference the real/private IP address of the server? The ACL needs to reference the real/private IP address rather than the public ip address.&lt;BR /&gt;&lt;BR /&gt;If you provided your configuration we could probably easily determine the issue&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 07 Feb 2020 14:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025688#M22762</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T14:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025691#M22763</link>
      <description>&lt;P&gt;Does the Global Implicit Rule that shows Deny, have anything to do with traffic being blocked from accessing the IP?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025691#M22763</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025694#M22764</link>
      <description>&lt;P&gt;So WYNNEAPPS1 is the name of the server that the link on our website is trying to access. Here is the link from our website:&amp;nbsp;&lt;A href="https://63.147.191.67/Ships5Web/Application/" target="_self"&gt;https://63.147.191.67/Ships5Web/Application/&lt;/A&gt;. Thank you for your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I have under NAT Rules&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall3.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66806iD592C798F64AA6D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall3.png" alt="firewall3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025694#M22764</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025699#M22765</link>
      <description>&lt;P&gt;You link is for HTTPS but your ACL only permits HTTP, therefore any connection on https will be dropped by the implicit deny at the end of the ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to amend the ACL rule to include HTTPS.&lt;BR /&gt;&lt;BR /&gt;You need to look at the properties of the WYNEAPPS1 and determine what IP address is defined, hopefully it is the private IP address.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025699#M22765</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T14:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025706#M22767</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the Access Rule to include HTTPS&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall5.png" style="width: 859px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66809i197F59072B9D9D3D/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall5.png" alt="firewall5.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The properties of WYNNEAPPS1 show the correct ip addresses&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall4.png" style="width: 497px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66810iFF66E4185DD4AC37/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall4.png" alt="firewall4.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025706#M22767</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025712#M22769</link>
      <description>Ok, I can access you URL so I assume all is working and your issue is resolved?&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 07 Feb 2020 14:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025712#M22769</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T14:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025716#M22775</link>
      <description>&lt;P&gt;Yes, I can access the link if I am outside of my network or on data on&amp;nbsp; a cell phone. However, I still cannot access it from my computer at the office. Do I need another rule so I can access it from office network? Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025716#M22775</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T14:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025722#M22777</link>
      <description>You should access the server directly, using it's real/private IP address (10.0.0.3) - not via the firewall on the natted ip address.</description>
      <pubDate>Fri, 07 Feb 2020 15:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025722#M22777</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T15:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025724#M22779</link>
      <description>&lt;P&gt;So if I am on my office network and go to our website the link is not going to work. So I need to access it by using the local IP 10.0.0.3? I thought maybe if I had a rule in place, I would still be able to access it directly from our website. The reason being, all my users do not know the local IP 10.0.0.3, they would just go to our website and click the link. Any workaround for this?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 15:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025724#M22779</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T15:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025730#M22781</link>
      <description>Create a FQDN that when inside the network resolves to the private IP address, and when outside the network resolves to the nat IP address. I suggest getting a valid public signed certificate for the site aswell.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Feb 2020 15:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025730#M22781</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T15:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025746#M22786</link>
      <description>&lt;P&gt;Where do I create the FQDN? Is that under Access or NAT Rules?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 15:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025746#M22786</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T15:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025749#M22877</link>
      <description>Sorry, I was referring to creating a DNS entry on your local DNS server which resolves to the private IP address and another entry with your external DNS provider resolving to the NAT ip address.</description>
      <pubDate>Fri, 07 Feb 2020 15:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025749#M22877</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T15:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025770#M22878</link>
      <description>&lt;P&gt;Okay, I am in my DNS Manager. Can you assist me at all with the FQDN? Thanks a ton!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall6.png" style="width: 504px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66814iD8DB3C98405C5C68/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall6.png" alt="firewall6.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 16:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025770#M22878</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T16:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025787#M22879</link>
      <description>&lt;P&gt;You would create an A record under the forward lookup zone of your domain name. Here is an example from my lab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="create dns entry.PNG" style="width: 442px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66816iA6864BF78D9A102F/image-size/large?v=v2&amp;amp;px=999" role="button" title="create dns entry.PNG" alt="create dns entry.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 16:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025787#M22879</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T16:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025802#M22880</link>
      <description>&lt;P&gt;I looked under my settings and I already see the IP address listed. So do I need to create an additional one?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="firewall7.png" style="width: 813px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66818iDC3B15498AA7F272/image-size/large?v=v2&amp;amp;px=999" role="button" title="firewall7.png" alt="firewall7.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 16:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025802#M22880</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-02-07T16:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Access Rules - Action - DROP</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025809#M22881</link>
      <description>In your internal DNS you would define your private IP address, I doubt the internet queries that server to resolve the public IP address?&lt;BR /&gt;&lt;BR /&gt;Is that domain name the same inside and outside of the network?&lt;BR /&gt;&lt;BR /&gt;It might be easier just to provide the users inside the network with a seperate link and get them to save it in their web browser.</description>
      <pubDate>Fri, 07 Feb 2020 17:05:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-action-drop/m-p/4025809#M22881</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-07T17:05:39Z</dc:date>
    </item>
  </channel>
</rss>

