<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default Rule Query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209607#M348624</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is more of a clarification request of my understanding than a support issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall is typically locked down using ACLs on the inside &amp;amp; outside interfaces, and there are various static NAT statements for servers that are reachable on the outside hosting web/e-mail etc you get the idea. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a host network on the inside say 10.0.0.0/24, which appears in my inside ACL, as an ACE, permit source 10.0.0.0/24 any &lt;/P&gt;&lt;P&gt;I then create a PAT statement to overload this traffic to the outside interface. &lt;/P&gt;&lt;P&gt;My outside ACL&lt;SPAN style="text-decoration: underline;"&gt; does not&lt;/SPAN&gt; have a ACE that says permit source any dest outside IP of firewall. &lt;/P&gt;&lt;P&gt;Default packet inspection is as per default i.e. no HTTP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding was that as soon as an ACL is applied to an interface the rule of High to Low is now null and void, but the above works but surely I should need to put a ACE statement on the outside ACL, applied to my outside interface, saying permit source any dest IP address of my firewall? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some other default rule that allows traffic back in, or have am I lacking something in my understanding?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:53:19 GMT</pubDate>
    <dc:creator>neil_cco_2094</dc:creator>
    <dc:date>2019-03-12T01:53:19Z</dc:date>
    <item>
      <title>Default Rule Query</title>
      <link>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209607#M348624</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is more of a clarification request of my understanding than a support issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A firewall is typically locked down using ACLs on the inside &amp;amp; outside interfaces, and there are various static NAT statements for servers that are reachable on the outside hosting web/e-mail etc you get the idea. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a host network on the inside say 10.0.0.0/24, which appears in my inside ACL, as an ACE, permit source 10.0.0.0/24 any &lt;/P&gt;&lt;P&gt;I then create a PAT statement to overload this traffic to the outside interface. &lt;/P&gt;&lt;P&gt;My outside ACL&lt;SPAN style="text-decoration: underline;"&gt; does not&lt;/SPAN&gt; have a ACE that says permit source any dest outside IP of firewall. &lt;/P&gt;&lt;P&gt;Default packet inspection is as per default i.e. no HTTP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding was that as soon as an ACL is applied to an interface the rule of High to Low is now null and void, but the above works but surely I should need to put a ACE statement on the outside ACL, applied to my outside interface, saying permit source any dest IP address of my firewall? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some other default rule that allows traffic back in, or have am I lacking something in my understanding?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209607#M348624</guid>
      <dc:creator>neil_cco_2094</dc:creator>
      <dc:date>2019-03-12T01:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Default Rule Query</title>
      <link>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209608#M348625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct about the logic with &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value. If we presume that NO ACLs are configured and attached to firewall interfaces then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; is the main thing controlling traffic. Additional configurations are only required when you configure 2 interface with the same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value OR traffic needs to enter and leave the same interface on the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the traffic control with ACL..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unlike a Router, the ASA firewall for example is a statefull firewall that keeps track of the state of the connections/translations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the ASA has allowed an connection through it, it will then automatically allow the return traffic as it already has an allowed connection formed from a trusted source (according to its configuration) in its connection table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; That is why you dont need any separate ACL on a firewall permitting the return traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Cisco routers on the other hand you might have to take account both directions of the traffic as it doesnt really keep track of the connections through it in the same way the firewall does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the reply as the correct answer if you felt that it was the correct answer and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 10:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209608#M348625</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T10:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Default Rule Query</title>
      <link>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209609#M348626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK I see, so even though once there is an ACL on the outside interface, the implicit deny all does not effect return traffic with an exisiting connection entry though the firewall. &lt;/P&gt;&lt;P&gt;I think I had a small misunderstanding in my firewall concept. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 12:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-rule-query/m-p/2209609#M348626</guid>
      <dc:creator>neil_cco_2094</dc:creator>
      <dc:date>2013-06-06T12:32:05Z</dc:date>
    </item>
  </channel>
</rss>

