<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-config/m-p/3931861#M30314</link>
    <description>Thank you ver much.. couldnyou please explain, In which scenario we need to&lt;BR /&gt;configure acl in Inside interface?&lt;BR /&gt;&lt;BR /&gt;#- Please type your reply above this line -##&lt;BR /&gt;--&lt;BR /&gt;Thank you,&lt;BR /&gt;*Regards,*&lt;BR /&gt;*Sivasakthi Kannan, *</description>
    <pubDate>Sat, 28 Sep 2019 12:06:49 GMT</pubDate>
    <dc:creator>tech_gubby</dc:creator>
    <dc:date>2019-09-28T12:06:49Z</dc:date>
    <item>
      <title>ACL config</title>
      <link>https://community.cisco.com/t5/network-security/acl-config/m-p/3931165#M30280</link>
      <description>&lt;P&gt;Hi Folks,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Could any one tell me, In which interface we need to configure ACL in ASA? for example, please find the below scenarios.&lt;BR /&gt;Scen:- I have configured 3 interfaces in my ASA, i.e Inside ( sec level -100), outside ( Sec level - 0), DMZ&amp;nbsp; (Sec-level -50).&lt;/P&gt;&lt;P&gt;1. In which interface, I have to configure acl to allow port 1433 from inside to internet?&lt;BR /&gt;2. In which interface, I have to configure acl to allow port 1433 from DMZ to internet?&lt;BR /&gt;3. In which interface, I have to configure acl to allow port 5665 from inside to DMZ?&lt;BR /&gt;4. In which interface, I have to configure acl to allow port 443 from internet to Inside?&lt;/P&gt;&lt;P&gt;Please provide the cmd syntax for the able and It would be much appriciated if you provide me the brief explanation on this, Thank you.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 02:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-config/m-p/3931165#M30280</guid>
      <dc:creator>tech_gubby</dc:creator>
      <dc:date>2019-09-27T02:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: ACL config</title>
      <link>https://community.cisco.com/t5/network-security/acl-config/m-p/3931184#M30304</link>
      <description>Just to give you idea how ASA work. It allow all traffic from higher security level to lower security level. This is by default you don't have to configure anything for this.&lt;BR /&gt;So in your scenario&lt;BR /&gt;Inside (100) to Outside (0)&lt;BR /&gt;Inside (100) to DMZ (50)&lt;BR /&gt;DMZ (50) to Outside (100)&lt;BR /&gt;&lt;BR /&gt;This traffic flows are allowed by default. ASA is a statefull firewall so it allows the return traffic. By default all TCP and UDP packets are inspected. If you want ping to work through firewall you need to enable ICMP inspection bye below command.&lt;BR /&gt;&lt;BR /&gt;Fixup protocol ICMP&lt;BR /&gt;&lt;BR /&gt;The traffic going on the outside or say internet and return back you need to additional configuration of default route and NAT. Any device must know where to send the packet for particular ip/subnet, for this it relies on route table. The connected interface subnet are always there for Inside and DMZ however to go to internet to any ip/subnet you need default route. The traffic going over the internet should have public routeable IP so you need to NAT your Inside and DMZ private IP addresses to public IP address when it goes to internet through Outside interface.&lt;BR /&gt;For Route&lt;BR /&gt;route OUTSIDE 0 0 1.1.1.1&lt;BR /&gt;where 1.1.1.1 is ISP gateway.&lt;BR /&gt;For NAT&lt;BR /&gt;Object network LAN&lt;BR /&gt;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;***This is for inside to outside***&lt;BR /&gt;Object network DMZ&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;BR /&gt;***This is for DMZ to outside***&lt;BR /&gt;&lt;BR /&gt;All the above hope to answer your first 3 questions.&lt;BR /&gt;Now for the 4th question you need to allow access from lower to higher security level&lt;BR /&gt;Outside (0) to inside (100)&lt;BR /&gt;To do this you required to configure ACL. And to add over to this you also require NAT (a public IP) as you want your server to be accessible over the internet.&lt;BR /&gt;&lt;BR /&gt;For NAT web server&lt;BR /&gt;Object network web-server&lt;BR /&gt;Host 10.10.10.10&lt;BR /&gt;nat(inside,outside) source static 1.1.1.2&lt;BR /&gt;&lt;BR /&gt;For ACL to allow traffic&lt;BR /&gt;Access-list Outside_in extended permit TCP any host 10.10.10.10 EQ 443&lt;BR /&gt;*** CREATE ACL***&lt;BR /&gt;Access-group Outside_in in interface OUTSIDE&lt;BR /&gt;*** APPLY TO AN INTERFACE***&lt;BR /&gt;&lt;BR /&gt;The ACL will block all other traffic as there is explicit deny any any at the end by default.&lt;BR /&gt;You will use private ip of the web-server in ACL.&lt;BR /&gt;&lt;BR /&gt;I hope this answers all your queries. Feel free to contact for more details.&lt;BR /&gt;&lt;BR /&gt;Ref link for NAT&lt;BR /&gt;&lt;A href="https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#staticnat" target="_blank"&gt;https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#staticnat&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I would request you to verify the command syntax as I am directly typing over mobile. However you will have good idea for your scenario.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Fri, 27 Sep 2019 03:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-config/m-p/3931184#M30304</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-27T03:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: ACL config</title>
      <link>https://community.cisco.com/t5/network-security/acl-config/m-p/3931861#M30314</link>
      <description>Thank you ver much.. couldnyou please explain, In which scenario we need to&lt;BR /&gt;configure acl in Inside interface?&lt;BR /&gt;&lt;BR /&gt;#- Please type your reply above this line -##&lt;BR /&gt;--&lt;BR /&gt;Thank you,&lt;BR /&gt;*Regards,*&lt;BR /&gt;*Sivasakthi Kannan, *</description>
      <pubDate>Sat, 28 Sep 2019 12:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-config/m-p/3931861#M30314</guid>
      <dc:creator>tech_gubby</dc:creator>
      <dc:date>2019-09-28T12:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: ACL config</title>
      <link>https://community.cisco.com/t5/network-security/acl-config/m-p/3931887#M30331</link>
      <description>If you want to control traffic from inside host to DMZ or Outside or any other configured interface. It can be IP/Subnet, ports, protocols and other.&lt;BR /&gt;Just to give you example. Let see you have three interface INSIDE (100), DMZ (50) and OUTSIDE (0) and you want to block access to internet to specific ip host but allow DMZ subnet to all. So for that you can create ACL for inside.&lt;BR /&gt;&lt;BR /&gt;Permit inside subnet to DMZ subnet&lt;BR /&gt;Deny host from inside to any&lt;BR /&gt;Permit any any&lt;BR /&gt;Something like this...&lt;BR /&gt;This is just to give you idea there are lot of other scenario where you require ACL for inside.&lt;BR /&gt;All this depends on the requirements.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Sat, 28 Sep 2019 14:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-config/m-p/3931887#M30331</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-28T14:25:04Z</dc:date>
    </item>
  </channel>
</rss>

