<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall access rule question regarding TCP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246219#M350350</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the rule must be from ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that the "Marketing" might be some "object-group" that defines several addresses or subnets/networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems that will allow all TCP connections through the interface where that rule is attached from the networks/addresses mentioned in "Marketing"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though there is naturally more things that factor to where the hosts can actually connect. Lacking some NAT configuration or having some NAT configuration might mean that even though evertyhing is permitted, they still wouldnt go through. Naturally routing etc might play some part also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tcp (6) you see when hovering your mouse pointer over the section just tells that we are talking about TCP. The number refers to TCP protocol number which is 6. UDP would be 17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the listing here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml"&gt;http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark correct replys as the correct answer and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 May 2013 15:40:17 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-07T15:40:17Z</dc:date>
    <item>
      <title>Firewall access rule question regarding TCP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246218#M350349</link>
      <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;I found the following rule on an ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp; Service&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Marketing&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;Does this mean that marketing can access any tcp service since it doesn't specify one (http-80 or https-443 &lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;for example&lt;/SPAN&gt;)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;When I move the mouse over it I see it says tcp (6). So is 6 the port and what exactly does this allow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial;"&gt;If my question sounds completely ridiculous just blame it on me being a rookie. Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246218#M350349</guid>
      <dc:creator>Eric Washington</dc:creator>
      <dc:date>2019-03-12T01:40:00Z</dc:date>
    </item>
    <item>
      <title>Firewall access rule question regarding TCP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246219#M350350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the rule must be from ASDM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that the "Marketing" might be some "object-group" that defines several addresses or subnets/networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems that will allow all TCP connections through the interface where that rule is attached from the networks/addresses mentioned in "Marketing"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though there is naturally more things that factor to where the hosts can actually connect. Lacking some NAT configuration or having some NAT configuration might mean that even though evertyhing is permitted, they still wouldnt go through. Naturally routing etc might play some part also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tcp (6) you see when hovering your mouse pointer over the section just tells that we are talking about TCP. The number refers to TCP protocol number which is 6. UDP would be 17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the listing here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml"&gt;http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark correct replys as the correct answer and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 15:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246219#M350350</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T15:40:17Z</dc:date>
    </item>
    <item>
      <title>Firewall access rule question regarding TCP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246220#M350351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I am using ASDM and marketing is a network object group with six network objects.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understand you correctly, that rule will allow all TCP connections unless there is a NAT rule preventing it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 15:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246220#M350351</guid>
      <dc:creator>Eric Washington</dc:creator>
      <dc:date>2013-05-07T15:57:30Z</dc:date>
    </item>
    <item>
      <title>Firewall access rule question regarding TCP</title>
      <link>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246221#M350352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might have just complicated things mentioning about NAT and Routing. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general the interface ACL should be the "only" thing on your ASA that controls the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why I mentioned NAT was simply due to the fact that in some cases even if you had allowed some traffic, if you LACKED a certain NAT configuration, the connection could still fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In most cases when we are talking about ASA interfaces and local LAN networks there is no NAT configurations between these networks. So the ACL should most of the time be the only thing that controls access between different interfaces of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 16:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-access-rule-question-regarding-tcp/m-p/2246221#M350352</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T16:03:13Z</dc:date>
    </item>
  </channel>
</rss>

