<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, I have tried to put in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505097#M236597</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried to put the control plane acl but without any luck, this is driving me crazy as I feel someone can run a dhcp attack and my firewall will build those msgs, I don't even see the hits when I run the packet tracer on the new ACL, here is my config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If I remove the ip address dhcp setroute then everything is normal, not sure if its even possible to block this type of traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network INSIDE-NETWORKS&lt;BR /&gt;&amp;nbsp;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object-group service MY-PORTS&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit object-group MY-PORTS object INSIDE-NETWORKS any&lt;BR /&gt;access-list inside_acl extended permit ip object INSIDE-NETWORKS object INSIDE-NETWORKS&lt;BR /&gt;access-list outside_acl extended deny ip any any&lt;/P&gt;&lt;P&gt;**new control plane acl**&lt;/P&gt;&lt;P&gt;access-list cpl-acl; 1 elements; name hash: 0xe068185&lt;BR /&gt;access-list cpl-acl line 1 extended deny udp any any log informational interval 300 (hitcnt=0) 0xcfe2e0a1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group inside_acl in interface inside&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-group cpl-acl in interface outside control-plane&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jul 2014 16:27:04 GMT</pubDate>
    <dc:creator>Zawekaroo</dc:creator>
    <dc:date>2014-07-15T16:27:04Z</dc:date>
    <item>
      <title>ASA5505 Port 68 issue - cannot block it on the wan/outside interface - V 8.4.7</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505094#M236594</link>
      <description>&lt;DIV class="field field-name-body field-type-text-with-summary field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I setup my ASA5505 to get the public IP address from the outside/wan ( my cable provider via DHCP) interface 0/0 on vlan 90 and the inside interface gives dhcp addresses to my local lan. I have denied all the traffic on the outside interface coming in and allowed domain/http/https from the inside to anywhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran the packet tracer and I noticed that if the traffic comes from any ip on the outside targeting UDP port 68 or 67&amp;nbsp; (broadcast traffic) is allowed and I see the packets being built even tho my outside ACL is deny any any - not sure how to resolve the issue as I gave up on all the solutions &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;*outside facing the internet*&lt;BR /&gt;&amp;nbsp;switchport access vlan 90&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;*inside*&lt;BR /&gt;&amp;nbsp;switchport access vlan 50&lt;/P&gt;&lt;P&gt;interface Vlan50&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan90&lt;BR /&gt;&amp;nbsp;description OUTSIDE to Internet&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.50.101-192.168.50.202 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 150.50.50.50 1234 255.255.255.255 68 detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CP-PUNT&lt;BR /&gt;Subtype: l2-selective&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xca2a13a0, priority=13, domain=punt, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xca2a1430, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xca2830b0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This should not be allowed as I have a deny any any on the outside interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505094#M236594</guid>
      <dc:creator>Zawekaroo</dc:creator>
      <dc:date>2019-03-12T04:28:06Z</dc:date>
    </item>
    <item>
      <title>Hi, Can you show the actual</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505095#M236595</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you show the actual &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; and &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; configurations?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My own ASA 5505 running 8.4(5) blocks the above mentioned &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output. I wonder if its in any way related to the WAN interface being set as a DHCP Client? Though if I am not wrong the port UDP/68 should only be destination port for connections to the DHCP server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried to make a separate ACL and attach it to the WAN interface as a &lt;STRONG&gt;"control-plane"&lt;/STRONG&gt; ACL that blocks/permits traffic to the actual ASA interface?&lt;/P&gt;&lt;P&gt;You attach it to the interface with the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group &amp;lt;acl name&amp;gt; in interface &amp;lt;interface name&amp;gt; control-plane&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can naturally have a normal interface ACL that controls traffic &lt;STRONG&gt;"through the box"&lt;/STRONG&gt; and a &lt;STRONG&gt;"control-plane"&lt;/STRONG&gt; ACL that controls traffic &lt;STRONG&gt;"to the box".&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 06:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505095#M236595</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-15T06:25:18Z</dc:date>
    </item>
    <item>
      <title>Hi,I believe this is because</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505096#M236596</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I believe this is because of the ip address dhcp enabled on the outside interface. I do not get such packet-tracer output in a statically assigned environment. But if you apply the ACL to the control-plane it is applicable to the box which might affect the dhcp assignment to your Outside interface.&lt;/P&gt;&lt;P&gt;UDP port number 67 is the destination port of a server &amp;amp; UDP port number 68 is used by the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 07:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505096#M236596</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-15T07:53:51Z</dc:date>
    </item>
    <item>
      <title>Hello, I have tried to put</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505097#M236597</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried to put the control plane acl but without any luck, this is driving me crazy as I feel someone can run a dhcp attack and my firewall will build those msgs, I don't even see the hits when I run the packet tracer on the new ACL, here is my config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If I remove the ip address dhcp setroute then everything is normal, not sure if its even possible to block this type of traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network INSIDE-NETWORKS&lt;BR /&gt;&amp;nbsp;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object-group service MY-PORTS&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq domain&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit object-group MY-PORTS object INSIDE-NETWORKS any&lt;BR /&gt;access-list inside_acl extended permit ip object INSIDE-NETWORKS object INSIDE-NETWORKS&lt;BR /&gt;access-list outside_acl extended deny ip any any&lt;/P&gt;&lt;P&gt;**new control plane acl**&lt;/P&gt;&lt;P&gt;access-list cpl-acl; 1 elements; name hash: 0xe068185&lt;BR /&gt;access-list cpl-acl line 1 extended deny udp any any log informational interval 300 (hitcnt=0) 0xcfe2e0a1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group inside_acl in interface inside&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-group cpl-acl in interface outside control-plane&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 16:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505097#M236597</guid>
      <dc:creator>Zawekaroo</dc:creator>
      <dc:date>2014-07-15T16:27:04Z</dc:date>
    </item>
    <item>
      <title>Yes I tested on another ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505098#M236598</link>
      <description>&lt;P&gt;Yes I tested on another ASA that has a static IP and the traffic is dropped - I don't like the fact that those broadcast messages are being built even tho I am blocking everything, hence someone could use my ip as a target for dhcp attacks if they spoof their source&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 16:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-68-issue-cannot-block-it-on-the-wan-outside/m-p/2505098#M236598</guid>
      <dc:creator>Zawekaroo</dc:creator>
      <dc:date>2014-07-15T16:30:21Z</dc:date>
    </item>
  </channel>
</rss>

