<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA and statefull filtering in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243291#M357852</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alain &amp;amp; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for clearing my concepts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 28 Apr 2013 18:19:12 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2013-04-28T18:19:12Z</dc:date>
    <item>
      <title>ASA and statefull filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243288#M357844</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read that ASA&amp;nbsp; by default do statefull filtering for TCP and UDP packets.&lt;/P&gt;&lt;P&gt;If user access internet website then return traffic is allowed from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curious to know what config in ASA&amp;nbsp; allows statefull filtering ?&lt;/P&gt;&lt;P&gt;Or does ASA support statefull filtering in hardware?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243288#M357844</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:36:06Z</dc:date>
    </item>
    <item>
      <title>ASA and statefull filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243289#M357846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You've got nothing special to configure: traffic from ahigh security level inteface can pass through the ASA and return traffic is permitted based on the state table that the ASA built. By default this is only for TCP and UDP but if you inspect ICMP then it will also work for ICMP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Apr 2013 18:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243289#M357846</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2013-04-28T18:02:32Z</dc:date>
    </item>
    <item>
      <title>ASA and statefull filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243290#M357849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA does this by default without any certain configuration on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It for example allows return traffic for already formed flows/connections through it. On the other hand ofcourse if the ASA sees traffic that seems to be part of some connection but the ASA doesnt have an existing flow for it, it denies the traffic. A stateless device/firewall would have simply allowed the same connection through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you add ASAs Inspections to this you will get more control of certain applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example "inspect ftp" enables the ASA to handle the secondary Data connection that is formed after the original Control connection is formed. Then theres for example "inspect dns" which control the DNS messages through the ASA firewall. Then theres for example ICMP inspection which allows the replies to ICMP Echo messages sent by the host behind ASA automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Apr 2013 18:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243290#M357849</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-28T18:04:58Z</dc:date>
    </item>
    <item>
      <title>ASA and statefull filtering</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243291#M357852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alain &amp;amp; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for clearing my concepts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Apr 2013 18:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-statefull-filtering/m-p/2243291#M357852</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-04-28T18:19:12Z</dc:date>
    </item>
  </channel>
</rss>

