<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deny inside address internet (outside interface) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213532#M348017</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That wont work. The configuration basicly only blocks traffic towards your ASAs &lt;STRONG&gt;"outside"&lt;/STRONG&gt; IP address and nothing else. And no connections can be made to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; IP address from behind some LAN interface of the ASA anyway. (even without the ACL statement)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to do the following things&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In the interface ACL where this network is located, first make sure you &lt;STRONG&gt;ALLOW&lt;/STRONG&gt; traffic to any &lt;STRONG&gt;LOCAL&lt;/STRONG&gt; networks you need to access from that network. (If they are located behind some other interface of the ASA. If there is only LAN and WAN interfaces then the traffic between different LAN networks probably wont even show up on the ASA)&lt;/LI&gt;&lt;LI&gt;Then block traffic with &lt;STRONG&gt;"deny ip 172.20.17.0 255.255.255.0 any"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont first &lt;STRONG&gt;ALLOW&lt;/STRONG&gt; the traffic before the &lt;STRONG&gt;DENY&lt;/STRONG&gt; statement then you will essentially block any traffic through the firewall from that source network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To use a very simply example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have interface called &lt;STRONG&gt;"inside", "dmz"&lt;/STRONG&gt; and &lt;STRONG&gt;"guest" (&lt;/STRONG&gt;and naturally&lt;STRONG&gt; "outside")&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;They have networks&lt;STRONG&gt; 172.20.17.0/24 (inside), 192.168.17.0/24 (dmz) and 10.10.17.0/24 (guest)&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;We presume you already have an ACL called &lt;STRONG&gt;INSIDE-IN&lt;/STRONG&gt; controlling traffic on the interface where the source network is&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 1 remark Allow traffic from 172.20.17.0/24 to Local LAN networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 2 permit ip 172.20.17.0 255.255.255.0 object-group INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 3 remark Deny traffic from 172.20.17.0/24 to any other networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 4 deny ip 172.20.17.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it answered your question please mark the reply as the correct answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Jun 2013 12:49:21 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-14T12:49:21Z</dc:date>
    <item>
      <title>Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213531#M348016</link>
      <description>&lt;P&gt;I've got an IP address range (172.20.17.x) on the inside interface that I want to deny internet access to. I created a deny statement for the subnet and put the destination as outside interface but nothing is being blocked, they can still access internet. Is this becuase 172.20.17.x is being nated? &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213531#M348016</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2019-03-12T01:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213532#M348017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That wont work. The configuration basicly only blocks traffic towards your ASAs &lt;STRONG&gt;"outside"&lt;/STRONG&gt; IP address and nothing else. And no connections can be made to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; IP address from behind some LAN interface of the ASA anyway. (even without the ACL statement)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to do the following things&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In the interface ACL where this network is located, first make sure you &lt;STRONG&gt;ALLOW&lt;/STRONG&gt; traffic to any &lt;STRONG&gt;LOCAL&lt;/STRONG&gt; networks you need to access from that network. (If they are located behind some other interface of the ASA. If there is only LAN and WAN interfaces then the traffic between different LAN networks probably wont even show up on the ASA)&lt;/LI&gt;&lt;LI&gt;Then block traffic with &lt;STRONG&gt;"deny ip 172.20.17.0 255.255.255.0 any"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont first &lt;STRONG&gt;ALLOW&lt;/STRONG&gt; the traffic before the &lt;STRONG&gt;DENY&lt;/STRONG&gt; statement then you will essentially block any traffic through the firewall from that source network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To use a very simply example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have interface called &lt;STRONG&gt;"inside", "dmz"&lt;/STRONG&gt; and &lt;STRONG&gt;"guest" (&lt;/STRONG&gt;and naturally&lt;STRONG&gt; "outside")&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;They have networks&lt;STRONG&gt; 172.20.17.0/24 (inside), 192.168.17.0/24 (dmz) and 10.10.17.0/24 (guest)&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;We presume you already have an ACL called &lt;STRONG&gt;INSIDE-IN&lt;/STRONG&gt; controlling traffic on the interface where the source network is&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 1 remark Allow traffic from 172.20.17.0/24 to Local LAN networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 2 permit ip 172.20.17.0 255.255.255.0 object-group INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 3 remark Deny traffic from 172.20.17.0/24 to any other networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 4 deny ip 172.20.17.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it answered your question please mark the reply as the correct answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 12:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213532#M348017</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-14T12:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213533#M348018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is how I have it setup. I have lots of permit statements on my inside interface. Now I just want to deny range 172.20.17.x from accessing the internet. What am I missing. Can this not be done?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 12:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213533#M348018</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2013-06-14T12:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213534#M348019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said, you will first need to make sure you permit the local traffic in the ACL if needed. And then you configure a statement which denies traffic from that source network towards "any" destination and it should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have configured a deny rule and traffic isnt blocked then you have configure the deny rule AFTER the permit rules and it will never be hit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though naturally as we cant see the exact interface ACL you are using I cant say for sure what the situation is at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using a proxy for web traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 12:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213534#M348019</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-14T12:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213535#M348020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the deny statment on the interface, it is the first entry on the ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list inside_access_in extended deny tcp object CAD_No-Internet interface outside object-group DM_INLINE_TCP_5 &lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 13:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213535#M348020</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2013-06-14T13:00:50Z</dc:date>
    </item>
    <item>
      <title>Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213536#M348021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see it doesnt match what&amp;nbsp; I suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ACL destination is still the IP address of the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That IP address is not the target of ANY Internet traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The destination needs to be &lt;STRONG&gt;"any"&lt;/STRONG&gt; not &lt;STRONG&gt;"interface outside"&lt;/STRONG&gt;. The &lt;STRONG&gt;"interface outside"&lt;/STRONG&gt; doesnt mean traffic destined to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; but traffic destined to the single IP address that is configured on your&lt;STRONG&gt; "outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have other interfaces than "inside" and "outside" then you will have to make sure you allow traffic to those networks before you configure the deny statement with the "any" destination. That is what I gave an example in the first reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 13:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213536#M348021</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-14T13:07:36Z</dc:date>
    </item>
    <item>
      <title>Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213537#M348022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I see now. If I change it to deny destination any does that include its own interface? I need the 172.20.14.x range to still be able to access networks on the inside interface. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 13:11:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213537#M348022</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2013-06-14T13:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Deny inside address internet (outside interface)</title>
      <link>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213538#M348023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The destination &lt;STRONG&gt;"any"&lt;/STRONG&gt; in the ACL &lt;STRONG&gt;"deny"&lt;/STRONG&gt; rule will basically block traffic to any destination network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are worried about traffic inside that same network 172.20.17.0/24 then you should notice that that traffic newer crosses the ASA. All traffic inside the same subnet never need to send data to their gateway but directly to the other host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we look at the ACL example again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 1 remark Allow traffic from 172.20.17.0/24 to Local LAN networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 2 permit ip 172.20.17.0 255.255.255.0 object-group INSIDE-ALLOWED-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 3 remark Deny traffic from 172.20.17.0/24 to any other networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 4 deny ip 172.20.17.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We first define an &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; inside which we list all the networks (or hosts) to which this source network &lt;STRONG&gt;NEEDS&lt;/STRONG&gt; to be able to connect to. These networks/hosts are located behind some other interface on the ASA then the source network.&lt;/LI&gt;&lt;LI&gt;We then start configuring the ACL with a rule that permits traffic to those local LAN networks and we use the &lt;STRONG&gt;"object-group" &lt;/STRONG&gt;to tell those destination networks.&lt;/LI&gt;&lt;LI&gt;The next rule will deny any other traffic from this source network. And since you have allowed traffic to the other LAN networks in the earlier rule then you will naturally only be blocking the traffic bound to Internet&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2013 13:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-inside-address-internet-outside-interface/m-p/2213538#M348023</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-14T13:36:20Z</dc:date>
    </item>
  </channel>
</rss>

