<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how would the firewall react ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426253#M269375</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but it is a &lt;STRONG&gt;very bad idea&lt;/STRONG&gt; to leverage tcp-state-bypass here.&amp;nbsp; The design should be changed to avoid the asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Feb 2014 13:53:33 GMT</pubDate>
    <dc:creator>David White</dc:creator>
    <dc:date>2014-02-19T13:53:33Z</dc:date>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426246#M269355</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a setup where the firewall is the default gateway for all clients, the firewall then routes some traffic to a wan router, the router is on the same lan as the internal interface, so hairpinning effectively&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, the return traffic from the router hits the lan on the way back basically bypassing the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how does the firewall handle this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would it result in lots of half open connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426246#M269355</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2019-03-12T03:47:19Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426247#M269360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a reason why the router is not the default gateway?&lt;/P&gt;&lt;P&gt;Is the firewall connected to any other network or does it send all traffic to the router? If it sends all traffic to the router, why is in not placed inline?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can create problems on the ASA as traffic from hosts will have different sequence numbers than what the ASA is expecting to see and the ASA may very well see this as an attack and start dropping packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could configure PBR on the router forcing it to send all traffic to the ASA, but this is a very "dirty" way of doing things.&amp;nbsp; If at all possible I would place the ASA inline between the router and the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 11:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426247#M269360</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-19T11:23:07Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426248#M269364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Its a temporary setup whilst me migrate a site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are just replicating the current site setup, just replacing old hardware, will change the toplogy in the next phase as we dont want to do too many changes at once. The idea is the wan router will hang off the DMZ interface very shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is currently a watchguard firewall, and packets seem to flow OK through at that at present&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your thoughts ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 11:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426248#M269364</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2014-02-19T11:28:35Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426249#M269367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I just set up a quick lab an I managed to get ICMP to work with a similar kind of setup you are thinking of doing.&amp;nbsp; However I am not able to test using different protocols.&amp;nbsp; But I am thinking that if it doesn't work at first, then perhaps just setting up a TCP&amp;nbsp; bypass will do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 12:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426249#M269367</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-19T12:00:07Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426250#M269369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; how would you do a tcp bypass ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 13:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426250#M269369</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2014-02-19T13:29:34Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426251#M269372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is an example of TCP bypass configuration on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;access-list ACL-NAME extended permit tcp 10.10.10.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;class-map CLASS-NAME&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; match access-list ACL-NAME&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;policy-map POLICY-NAME&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; class CLASS-NAME&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;service-policy POLICY-NAME outside&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 13:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426251#M269372</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-19T13:38:29Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426252#M269373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; so is this effectively a packet filter?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 13:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426252#M269373</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2014-02-19T13:49:35Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426253#M269375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but it is a &lt;STRONG&gt;very bad idea&lt;/STRONG&gt; to leverage tcp-state-bypass here.&amp;nbsp; The design should be changed to avoid the asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 13:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426253#M269375</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T13:53:33Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426254#M269377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wouldn't exactly say it is a filter as it is not filtering anything..per se... but instead we are telling the ASA to overlook certain criteria that would otherwise cause a packet to be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I agre with David, and mention it further up, that the design should be changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 14:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426254#M269377</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-19T14:04:33Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426255#M269378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It can be a 'filter' if an ACL is applied to the interface for which the initial packets are ingressing.&lt;/P&gt;&lt;P&gt;Note with tcp-state-bypass we still check interface ACLs, but no longer perform inspections on the traffic nor any TCP specific checks (flags, Seq/ACK analysis, etc...)&amp;nbsp; Additionally, we cannot tear down the connection when it is finished because we are not tracking the TCP states.&amp;nbsp; Therefore, I would advise lowering the conn timeouts if you use this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 14:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426255#M269378</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T14:12:56Z</dc:date>
    </item>
    <item>
      <title>how would the firewall react ?</title>
      <link>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426256#M269381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;True that the interface ACLs are still checked, but it is not the TCP bypass that is doing the filtering, which is why I said that it is not filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 14:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-the-firewall-react/m-p/2426256#M269381</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-19T14:30:37Z</dc:date>
    </item>
  </channel>
</rss>

