<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL placement DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169782#M351493</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're amazing Jouni! thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Apr 2013 18:34:36 GMT</pubDate>
    <dc:creator>Delmiro Campelo</dc:creator>
    <dc:date>2013-04-18T18:34:36Z</dc:date>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169776#M351483</link>
      <description>&lt;P&gt;I have a group of servers in the DMZ that need to communicate with servers in the inside network as well as the outside network, where would be the best place to place an ACL to acommplish this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. DMZ interface inbound?&lt;/P&gt;&lt;P&gt;2. DMZ interface outbound? &lt;/P&gt;&lt;P&gt;3. neither &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would add more to the question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WebServer1 (dmz) needs to communicate to a DBServer1 and DomainController1 in the (inside) in order to server requests to the (outside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Delmiro&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169776#M351483</guid>
      <dc:creator>Delmiro Campelo</dc:creator>
      <dc:date>2019-03-12T01:31:06Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169777#M351484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest using an ACL on each interface and using the inbound direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is atleast my personal preference and has always been.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me the clearest when you control the traffic entering from certain network segment (inbound) rather than controlling traffic thats already come from some network segment and is now trying to head to another network segment (outbound)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need some specific configuration help then we might need to see the current ASA configuration to see for example if some NAT configurations are required netween the DMZ and INSIDE to enable connections between them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169777#M351484</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T14:03:07Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169778#M351486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni for your answer, it makes sense to do the ACL inbound after reading your explanation. Do you normally have an inbound ACL for your inside interface as well? I already have one inbound for my outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Delmiro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169778#M351486</guid>
      <dc:creator>Delmiro Campelo</dc:creator>
      <dc:date>2013-04-18T14:14:29Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169779#M351489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tend to personally configure an ACL for every LAN/DMZ interface protected by the firewall. Even if they were used to allow all traffic. All ACLs are also configured in "inbound" direction. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the "outside" interface only requires an ACL if you are going to host some services to the Internet from your LAN. It might also be usefull in situations where you are not hosting any service but want to allow some ICMP traffic through "outside" so that for example Traceroute and other ICMP related things work correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont necesarily need an ACL on the "inside" interface since your other interface are most likely lower "security-level" than the "inside" interface so traffic would be by default allowed from "inside" to any other interface on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I just find it more clear to have an ACL on every interface so I know exactly whats allowed and dont have to care about the "security-level" values. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to mark the question as answered, that is if some reply did answer your question &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 14:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169779#M351489</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T14:31:57Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169780#M351491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni, I do have one last question &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; again thanks for helping. do you have any samples that I can use as a reference for access list DMZ and Inside interface, I do also want to use ACL the same way you are suggesting and not relay on the security-levels values. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 15:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169780#M351491</guid>
      <dc:creator>Delmiro Campelo</dc:creator>
      <dc:date>2013-04-18T15:22:22Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169781#M351492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well every environment is a bit different. So you might have different ideas on what traffic you want to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally though the DMZ would be a network segment that should only be accessible from the OUTSIDE on certain ports. Likewise the DMZ should be a network segment that has very limited access to your INSIDE network so in an event that the DMZ server get "infected" there would be minimal risk to your INSIDE network segment and the problem would be somewhat limited to your DMZ segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if we are talking about segment which doesnt have anything to do with the OUTSIDE network then the ACL rules could again be a bit different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are also customer that simply insist on leaving everything open even if its suggested that the traffic should be controlled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At its simplest you could consider the following situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;LAN network 1: 10.10.10.0/24&lt;/LI&gt;&lt;LI&gt;LAN network 2: 10.10.20.0/24&lt;/LI&gt;&lt;LI&gt;LAN network 3: 10.10.30.0/24&lt;/LI&gt;&lt;LI&gt;DMZ network: 192.168.10.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network LAN-NETWORKS&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DMZ-DNS&lt;/P&gt;&lt;P&gt; network-object host 8.8.8.8&lt;/P&gt;&lt;P&gt; network-object host 8.8.4.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DMZ-SMTP&lt;/P&gt;&lt;P&gt; network-object host x.x.x.x&lt;/P&gt;&lt;P&gt; network-object host y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Deny DMZ -&amp;gt; INSIDE&lt;/P&gt;&lt;P&gt;access-list DMZ-IN deny ip any object-group LAN-NETWORKS&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow DNS&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit udp 192.168.10.0 255.255.255.0 object-group DMZ-DNS eq domain&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow SMTP&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit tcp 192.168.10.0 255.255.255.0 object-group DMZ-SMTP eq smtp&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow HTTP / HTTPS / FTP&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit tcp 192.168.10.0 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit tcp 192.168.10.0 255.255.255.0 any eq https&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit tcp 192.168.10.0 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Deny DMZ -&amp;gt; ANY&lt;/P&gt;&lt;P&gt;access-list DMZ-IN deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ-IN in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is a really simple example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It would for example first block any traffic destined to the LAN networks (since the following lines would allow services otherwise with destination "any" which is needed for Internet bound traffic)&lt;/LI&gt;&lt;LI&gt;It would next allow DNS and SMTP to only selected servers&lt;/LI&gt;&lt;LI&gt;Next it would allow HTTP / HTTPS / FTP to anywhere (although this could be limited if the server only need connections to certain destinations&lt;/LI&gt;&lt;LI&gt;The last line with "deny ip any any" I would configure only for the fact that I would see the hitcount in the DMZ-IN ACL at any point and could easily determine how much unallowed connection attemps have been coming from the DMZ towards ANY network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally when you need to open traffic to some LAN server or host, you would then add "permit" statements at the very top of the created ACL so they would override on their part the "deny" statement currently at the top of the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the rules could be DMZ server specific also. You might only allow certain servers to access the mentioned services on the OUTSIDE and block all others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said it depends on the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169781#M351492</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-18T16:44:31Z</dc:date>
    </item>
    <item>
      <title>ACL placement DMZ</title>
      <link>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169782#M351493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're amazing Jouni! thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 18:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-placement-dmz/m-p/2169782#M351493</guid>
      <dc:creator>Delmiro Campelo</dc:creator>
      <dc:date>2013-04-18T18:34:36Z</dc:date>
    </item>
  </channel>
</rss>

