<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 one Way Connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474500#M270012</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the server in the untrusted network is pulling the data then there needs to be a rule on the outside interface allowing that.&amp;nbsp; When a server is pulling data it is that server which is initiating the traffic...even though the actual data is being sent by the trusted server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 08 Feb 2014 18:43:18 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-02-08T18:43:18Z</dc:date>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474497#M270003</link>
      <description>&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; how i can Achive one way Connection without Leave the Higher Security Level Allowed to go to any Less Secure Area&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for Example i have 2 Servers and One Firewall i need to Open into the Trusted Network Port TCP/5450 so the server in the outside (Untrusted Network)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; can Commnuacate and read the Data throgh that Port .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; the Problem here when i do that the data Cannot Return i have to open the Same Access Rule to the Return path using the Same Port TCP/5450 to &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; the Untrusted Network use my attached Pic its Can Help&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474497#M270003</guid>
      <dc:creator>Ahmad Khalifa</dc:creator>
      <dc:date>2019-03-12T03:42:53Z</dc:date>
    </item>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474498#M270007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the DCS server is the one initiating traffic?&amp;nbsp; would it be possible for you to check with the support team for the server on the untrusted network, to see how this server responds to requests?&amp;nbsp; It is very possible that when the server on the trusted network sends a request to the server on the untrusted network, that the untrusted network server instead of replying to the original request initiates a new traffic stream, which will result in the ASA dropping the packet if a rule is not configured to allow it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than that, how have you configured your ACL?&amp;nbsp; It should look something like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list in-to-out extended permit tcp host 192.168.201.138 host 172.16.4.105 eq 5450&lt;/P&gt;&lt;P&gt;access-group in-to-out in inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 17:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474498#M270007</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-08T17:57:13Z</dc:date>
    </item>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474499#M270009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the Server in the untrusted Network is reading data from DCS via tcp/5450 (Pulling Data) the server 172.16.4.105 is who the &lt;SPAN style="font-size: 10pt;"&gt;initiating the traffic.&amp;nbsp;&amp;nbsp; is this info. help&lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 18:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474499#M270009</guid>
      <dc:creator>Ahmad Khalifa</dc:creator>
      <dc:date>2014-02-08T18:39:42Z</dc:date>
    </item>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474500#M270012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the server in the untrusted network is pulling the data then there needs to be a rule on the outside interface allowing that.&amp;nbsp; When a server is pulling data it is that server which is initiating the traffic...even though the actual data is being sent by the trusted server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 18:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474500#M270012</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-08T18:43:18Z</dc:date>
    </item>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474501#M270014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so this mean that it have to be 2 access list to allow the traffic via firewall so this 2 way connection &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 18:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474501#M270014</guid>
      <dc:creator>Ahmad Khalifa</dc:creator>
      <dc:date>2014-02-08T18:58:28Z</dc:date>
    </item>
    <item>
      <title>ASA5510 one Way Connection</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474502#M270016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am a little uncertain as I am not 100% sure how the servers handle traffic.&amp;nbsp; But my initial though is that you would only need an access list on the outside interface to permit traffic in.&amp;nbsp; But also since the server being pulled from is on a secure network, this should already have access to the outside unless there is a specific reason it should not have access out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, yes you would have two access rules for these two servers, but I believe you only actually need one from outside to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Feb 2014 19:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-one-way-connection/m-p/2474502#M270016</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-08T19:02:35Z</dc:date>
    </item>
  </channel>
</rss>

