<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How the firewall handles return traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3829097#M30083</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Check this document:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-voicevideo.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-voicevideo.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2019 19:51:45 GMT</pubDate>
    <dc:creator>Deepak Kumar</dc:creator>
    <dc:date>2019-03-29T19:51:45Z</dc:date>
    <item>
      <title>How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826350#M30075</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;Please ignore my ignorance as I tried to wrap my head around this question lingering in my mind.&lt;/P&gt;&lt;P&gt;This is more of a query on how the Cisco firewall handles return traffic when an 'any any' policy is in place. The traffic is originating from a &lt;SPAN&gt;higher security &lt;/SPAN&gt;known port 5060, 443, 22, 80 to a lower security destination. Based on my understanding, the return traffic should be allowed due to the permit ip any any rule in place.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 14:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826350#M30075</guid>
      <dc:creator>w1ll1ambarr</dc:creator>
      <dc:date>2019-03-26T14:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826391#M30076</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Where and how to apply this ANY ANY policy? What is your configuration?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the Cisco ASA packet flow:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="packet-flow-through-asa.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/32805i13B1AB4C8E08AC82/image-size/medium?v=v2&amp;amp;px=400" role="button" title="packet-flow-through-asa.png" alt="packet-flow-through-asa.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope it will help you to understand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 15:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826391#M30076</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-03-26T15:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826441#M30077</link>
      <description>Hi, The ASA is a stateful firewall, it keeps track of the connections going through the firewall. So if traffic was permitted from inside to outside and the conection is in the state table (an existing connection) the return traffic would be permitted. &lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 26 Mar 2019 16:41:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826441#M30077</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-26T16:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826531#M30078</link>
      <description>&lt;P&gt;Hello, Thanks for your detailed reply. Another question I have regarding sip inspection. By default, I can see that&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;sip is being inspected by the firewall. See global policy-map below.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Should sip port 5060 be already opened by the firewall based on it's statefullness? Or I still have to open port 5060 to allow sip traffic from the CUCM to the endpoint?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Appreciate, any light that you can shed on this.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 18:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826531#M30078</guid>
      <dc:creator>w1ll1ambarr</dc:creator>
      <dc:date>2019-03-26T18:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826637#M30079</link>
      <description>&lt;P&gt;on your sip question: NO&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;that is not what sip inspection does. so you would need to explicitly allow SIp based on port 5060. once SIP is permitted, sip inspection will look inside the packet and more specifically in the SDP packet contained within sip. based on this, it will dynamically allow ports for RTP. this way you dont need to open thousands of ports for the purpose of allowing video and voice across your FW&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 21:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826637#M30079</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-03-26T21:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826723#M30080</link>
      <description>Hi,&lt;BR /&gt;You have to explicitly allow SIp based on port 5060&lt;BR /&gt;&lt;BR /&gt;Regards.&lt;BR /&gt;Deepak Kumar</description>
      <pubDate>Wed, 27 Mar 2019 02:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3826723#M30080</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-03-27T02:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3828837#M30081</link>
      <description>Hello Deepak,&lt;BR /&gt;&lt;BR /&gt;Thanks for your comment. But wanted to clarify as I thought that due to the&lt;BR /&gt;statefullness of the sip traffic, if the UCCM initiated the session port&lt;BR /&gt;5060 will be automatically open or allowed. Please see below output and&lt;BR /&gt;keep me honest.&lt;BR /&gt;&lt;BR /&gt;ASA4# sh run all | in sip&lt;BR /&gt;object service tcp-sip pre-defined&lt;BR /&gt;service tcp destination eq sip&lt;BR /&gt;object service tcp-udp-sip pre-defined&lt;BR /&gt;service tcp-udp destination eq sip&lt;BR /&gt;object service udp-sip pre-defined&lt;BR /&gt;service udp destination eq sip&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect&lt;BR /&gt;0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;policy-map type inspect sip _default_sip_map&lt;BR /&gt;traffic-non-sip&lt;BR /&gt;&lt;BR /&gt;ASA4# sh run all | in sip&lt;BR /&gt;object service tcp-sip pre-defined&lt;BR /&gt;service tcp destination eq sip&lt;BR /&gt;object service tcp-udp-sip pre-defined&lt;BR /&gt;service tcp-udp destination eq sip&lt;BR /&gt;object service udp-sip pre-defined&lt;BR /&gt;service udp destination eq sip&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect&lt;BR /&gt;0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;policy-map type inspect sip _default_sip_map&lt;BR /&gt;traffic-non-sip&lt;BR /&gt;&lt;BR /&gt;Do I still have to allo sip port despite that it's already pre-defined by&lt;BR /&gt;the default&lt;BR /&gt;ASA configuration?&lt;BR /&gt;&lt;BR /&gt;Appreciate greatly all your input and help.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;William&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Mar 2019 12:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3828837#M30081</guid>
      <dc:creator>w1ll1ambarr</dc:creator>
      <dc:date>2019-03-29T12:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3829081#M30082</link>
      <description>&lt;P&gt;Those are the configurations in relation to SIP and what to do with the SIP traffic once permitted. The ASA inherently blocks traffic, unless no ACL is applied and you are going from a higher security zone to a lower security zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If SIP is not explicitly permitted in the ACL then this traffic would not be permitted through the Firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would need, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list INSIDE permit udp any any eq sip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the INSIDE acl was applied to your Internal segment on the ASA, this would allow SIP traffic from your Internal Segment through the ASA. The other options you see in your output are now how to handle this traffic, such as Idle Timeout or confirming that it is in fact SIP traffic before permitting the traffic etc.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 19:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3829081#M30082</guid>
      <dc:creator>John-Finnegan</dc:creator>
      <dc:date>2019-03-29T19:15:38Z</dc:date>
    </item>
    <item>
      <title>Re: How the firewall handles return traffic</title>
      <link>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3829097#M30083</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Check this document:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-voicevideo.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/inspect-voicevideo.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Deepak Kumar&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 19:51:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-the-firewall-handles-return-traffic/m-p/3829097#M30083</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-03-29T19:51:45Z</dc:date>
    </item>
  </channel>
</rss>

