<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA access-list on egress interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835208#M26574</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/404090"&gt;@Vitaliy Opora JSC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Watching the Show run.&lt;BR /&gt;Is the output similar to the configuration below?&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;1- Do you need to make several changes to the firewall?&lt;BR /&gt;If the answer is yes, the setting will become complex.&lt;BR /&gt;2- Will this firewall be applied to a small business client?&lt;BR /&gt;If so, it would be feasible to use this type of configuration.&lt;/P&gt;&lt;P&gt;Josiane de Barros&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twitter:SecureGirlNinja&lt;/P&gt;</description>
    <pubDate>Tue, 09 Apr 2019 16:29:05 GMT</pubDate>
    <dc:creator>Josiane de Barros Silva</dc:creator>
    <dc:date>2019-04-09T16:29:05Z</dc:date>
    <item>
      <title>ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3834033#M26571</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;If I configure the ASA5506 with a bridge-group on the ingress interface, I need to apply an permit access-list on the egress interface to forward traffic.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;If I use the same configuration, but without a bridge-group on the ingress interface, the traffic will be redirected without permitting an access-list on the egress interface.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;Security-level on ingress interface 100, on BVI interface 100, on egress interface 0.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please explain me why.&lt;/P&gt;&lt;P&gt;Sorry if my English is bad.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 08:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3834033#M26571</guid>
      <dc:creator>Vitaliy Opora JSC</dc:creator>
      <dc:date>2019-04-08T08:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3834930#M26572</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/404090"&gt;@Vitaliy Opora JSC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BVI (Bridge Virtual Interface) is required to configure bridge groups in a firewall transparently.&lt;BR /&gt;Each bridge group requires a management IP address. ASA uses this IP address as the source address for packets originating from the bridge group. The management IP address must be on the same subnet as the connected network. For IPv4 traffic, the management IP address is required to transmit any traffic.&lt;BR /&gt;&lt;BR /&gt;Example :&lt;BR /&gt;ciscoasa (config) # interface bvI 1&lt;BR /&gt;Specify the management IP address for the bridge group.&lt;/P&gt;&lt;P&gt;ciscoasa (config-if) # endereço ip xxxx 255.255.255.0 espera xxxy&lt;/P&gt;&lt;P&gt;Source : &lt;A href="https://www.techtutsonline.com/interface-configuration-in-cisco-asa-transparent-mode/" target="_blank"&gt;https://www.techtutsonline.com/interface-configuration-in-cisco-asa-transparent-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The ASA uses a level of security associated with each interface. It is a number between 0 and 100 that defines the reliability of the network to which the interface is connected; the higher the number, the more confidence you have in the network. For example, the most secure network, such as the internal LAN, must have a security level of 100. The external network connected to an untrusted network (such as the Internet) must be level 0. The interface connected to the DMZ must have the security level set to something between 1 and 99 (usually 50).&lt;/P&gt;&lt;P&gt;Security levels are used to define how traffic started from one interface can return from another interface. By default, top-level security interfaces can initiate traffic to a lower level&lt;/P&gt;&lt;P&gt;level 100 for the internal network&lt;BR /&gt;level 50 for the DMZ network&lt;BR /&gt;level 0 for the external network&lt;/P&gt;&lt;P&gt;By default, ASA will stop any initial traffic that is trying to move from lower security levels to higher levels of security. This means that, for example, a server on the external network can not start a conversion with the server in our DMZ network or with the host on the internal network. The server in the DMZ can initialize traffic out (from top to bottom, 50 to 0), but can not initialize a conversation indoors (from low to high, 50 trying to go to 100). The inside host can initiate traffic to the DMZ server and the Internet. When the server on the outside responds back to the internal host, the ASA will dynamically allow the return traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Josiane&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twitter: SecureGirllNinja&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 12:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3834930#M26572</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-09T12:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835090#M26573</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/587452"&gt;@Josiane de Barros Silva&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;Thanks you for your reply. Without using bridge-group on ingress interface, it works correctly (traffic sent to ingress interface with high security level may exit the output interface with lower security level, and response from the remote host will be returned to the sender). But if bridge-group is used on the ingress interface, then to obtain a response from remote host, you need to apply permit access-list on the output interface.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 09 Apr 2019 14:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835090#M26573</guid>
      <dc:creator>Vitaliy Opora JSC</dc:creator>
      <dc:date>2019-04-09T14:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835208#M26574</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/404090"&gt;@Vitaliy Opora JSC&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Watching the Show run.&lt;BR /&gt;Is the output similar to the configuration below?&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;!&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;1- Do you need to make several changes to the firewall?&lt;BR /&gt;If the answer is yes, the setting will become complex.&lt;BR /&gt;2- Will this firewall be applied to a small business client?&lt;BR /&gt;If so, it would be feasible to use this type of configuration.&lt;/P&gt;&lt;P&gt;Josiane de Barros&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twitter:SecureGirlNinja&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 16:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835208#M26574</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-09T16:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835861#M26576</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/587452"&gt;@Josiane de Barros Silva&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;I checked the configuration again and I was find an error. I test the connection with ping, ASA block icmp reply, but connections work correctly. To fix this i will add:&lt;/P&gt;&lt;PRE&gt;policy-map global_policy
 class inspection_default
  inspect icmp&lt;/PRE&gt;&lt;P&gt;full config with bridge interface is:&lt;/P&gt;&lt;PRE&gt;ASA Version 9.8(2) 
!
interface GigabitEthernet1/1
 no shutdown
 nameif outside
 security-level 0
 ip address xx.xxx.xxx.xx 255.255.255.240 
!
interface GigabitEthernet1/2
 no shutdown
 bridge-group 1
 nameif inside_1
 security-level 100
!
interface BVI1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
same-security-traffic permit inter-interface
object network obj_any1
 subnet 192.168.1.0 255.255.255.0
!
object network obj_any1
 nat (inside_1,outside) dynamic interface
!
route outside 0.0.0.0 0.0.0.0 xx.xxx.xxx.xx 1
!
dhcpd dns 8.8.8.8
!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside
!
policy-map global_policy
 class inspection_default
  inspect icmp &lt;/PRE&gt;&lt;P&gt;full config without bridge interface:&lt;/P&gt;&lt;PRE&gt;ASA Version 9.8(2) 
!
interface GigabitEthernet1/1
 no shutdown
 nameif outside
 security-level 0
 ip address xx.xxx.xxx.xx 255.255.255.240 
!
interface GigabitEthernet1/2
 no shutdown
 nameif inside_1
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
same-security-traffic permit inter-interface
object network obj_any1
 subnet 192.168.1.0 255.255.255.0
!
object network obj_any1
 nat (inside_1,outside) dynamic interface
!
route outside 0.0.0.0 0.0.0.0 xx.xxx.xxx.xx 1
!
dhcpd dns 8.8.8.8
!
dhcpd address 192.168.1.5-192.168.1.254 inside_1
dhcpd enable inside_1
!
policy-map global_policy
 class inspection_default
  inspect icmp &lt;/PRE&gt;&lt;P&gt;both configurations work correct, &lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;problem solved.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 10:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3835861#M26576</guid>
      <dc:creator>Vitaliy Opora JSC</dc:creator>
      <dc:date>2019-04-10T10:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA access-list on egress interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3836204#M26578</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/404090"&gt;@Vitaliy Opora JSC&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you feel like contributing, it is like a vote of helpful help, so that we can continue to help whenever possible. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Good job&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT&gt;Thanks,&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT&gt;Josiane&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT&gt;Twitter:SecureGirlNinja&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 17:29:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-on-egress-interface/m-p/3836204#M26578</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-10T17:29:44Z</dc:date>
    </item>
  </channel>
</rss>

