<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Applying Extended ACL  close to Destination in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348360#M343685</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to share something here.Mostly we use extended ACL close to the source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is this scenario i need to use the extended ACL&amp;nbsp; close to destination to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server 1&amp;nbsp; connected to interface X&amp;nbsp; ASA1&amp;nbsp; it has wan connection to ASA2---ASA2 has connection to ASA3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now&amp;nbsp; ASA3 is learning source server IP via its Y interface.&lt;/P&gt;&lt;P&gt;In order to reach the destination server ASA3&amp;nbsp; has to through its interface Z.&lt;/P&gt;&lt;P&gt;Now there was ACL&amp;nbsp; on ASA3 which denies traffic from source server IP&amp;nbsp; to destination IP on interface Y.&lt;/P&gt;&lt;P&gt;I apply the ACL&amp;nbsp; on ASA3 to allow the traffic and it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dooes someone elase also has seen this behaviour?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:32:44 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2019-03-12T02:32:44Z</dc:date>
    <item>
      <title>Applying Extended ACL  close to Destination</title>
      <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348360#M343685</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to share something here.Mostly we use extended ACL close to the source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is this scenario i need to use the extended ACL&amp;nbsp; close to destination to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is info&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server 1&amp;nbsp; connected to interface X&amp;nbsp; ASA1&amp;nbsp; it has wan connection to ASA2---ASA2 has connection to ASA3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now&amp;nbsp; ASA3 is learning source server IP via its Y interface.&lt;/P&gt;&lt;P&gt;In order to reach the destination server ASA3&amp;nbsp; has to through its interface Z.&lt;/P&gt;&lt;P&gt;Now there was ACL&amp;nbsp; on ASA3 which denies traffic from source server IP&amp;nbsp; to destination IP on interface Y.&lt;/P&gt;&lt;P&gt;I apply the ACL&amp;nbsp; on ASA3 to allow the traffic and it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dooes someone elase also has seen this behaviour?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348360#M343685</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T02:32:44Z</dc:date>
    </item>
    <item>
      <title>Applying Extended ACL  close to Destination</title>
      <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348361#M343687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not really sure on the setup here but here is what I gathered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have connection between 2 hosts/servers.&lt;/LI&gt;&lt;LI&gt;There are 3 ASA firewall (physical or virtual) between the 2 hosts&lt;/LI&gt;&lt;LI&gt;There was a DENY rule on ASA3 interface behind which ASA2, ASA1 and the source host/server is located&lt;/LI&gt;&lt;LI&gt;You added an PERMIT rule on ASA3 to allow this traffic and it was allowed after that&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the case then I am not sure what unexpected happened there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every ASA on the way from the source host to the destination host has to have a rule to allow this traffic to pass it since they are different firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on the environment there could naturally be firewalls that dont have any ACL rules if they were used for some other particular purpose only (like NAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348361#M343687</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T15:00:06Z</dc:date>
    </item>
    <item>
      <title>Applying Extended ACL  close to Destination</title>
      <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348362#M343689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Learned something new from you----"Every ASA on the way from the source host to the destination host has to have a rule to allow this traffic to pass it since they are different firewalls."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my understanding&amp;nbsp; is that----&lt;/P&gt;&lt;P&gt;Seems in firewall world depending on traffic flow and if ACL is configured or not to allow the traffic&amp;nbsp; sometimes we need to config ACL close to destination address to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348362#M343689</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-30T15:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Extended ACL  close to Destination</title>
      <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348363#M343691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing depends on the fact if I understood your setup correctly. If you have traffic flowing through 3 different firewalls to reach its final destination then naturally you have to make sure that each of those firewalls allow that traffic. Even if the first ASA1 allows this connections in its ACL rules it might still be that ASA2 or ASA3 has a configuration that doesnt allow this traffic (like it seemed to be originally in your situation). The fact that ASA1 allowed the connection attempt through itself doesnt mean that it would reach its destination as there are differen firewalls on the way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just as an example I could mention one real life setup that I manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup contains 4 firewalls always (at minimum)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;One is customer firewall/vpn device&lt;/LI&gt;&lt;LI&gt;One is our vpn device&lt;/LI&gt;&lt;LI&gt;One is our firewall device&lt;/LI&gt;&lt;LI&gt;One is our partner firewall device&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means essentially that for the &lt;STRONG&gt;Customer&lt;/STRONG&gt; to reach the &lt;STRONG&gt;Partner&lt;/STRONG&gt; sites servers the traffic has to go through 4 firewalls atleast. Because of the policy chosen we only have to make sure that the &lt;STRONG&gt;Customer&lt;/STRONG&gt; and the&lt;STRONG&gt; Partner &lt;/STRONG&gt;firewall allows the traffic as &lt;STRONG&gt;Our&lt;/STRONG&gt; firewalls dont do any access control (just provide the connectivity between sites)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348363#M343691</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T15:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Extended ACL  close to Destination</title>
      <link>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348364#M343693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni for explaining it so clearly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-extended-acl-close-to-destination/m-p/2348364#M343693</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-30T15:41:13Z</dc:date>
    </item>
  </channel>
</rss>

