<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL - configuration help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184893#M357961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the Default Dynamic PAT rule that you are asking for the single "inside" network I would suggest the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First remove the current NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Inside_lan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (any,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then reconfigure the NAT in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.20.145.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto sourece dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will create and "object-group" for the networks or hosts that should be PATed to the "outside" interface IP address when accessing the Internet. If you want more internal networks to get PATed the same way, you simply add the network under the "object-group" among the already existing "inside" network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "after-auto" parameter also makes sure that this NAT rule doesnt override any other future rules. The parameter in question moves the NAT rule at the bottom of the NAT rules so its one of the last matched agains when traffic arrives on the firewall from behind "inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the neighbor network of 172.20.0.0/16, is this some network that is going to be behind a L2L VPN or is simply almost directly behind the "outside" interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general the NAT format for this kind NAT is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NEIGHBOR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 172.20.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network NEIGHBOR-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.20.145.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static NEIGHBOR-SOURCE NEIGHBOR-SOURCE destination static NEIGHBOR NEIGHBOR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I basically use an "object network" to define the remote network and "object-group network" to define the source network for this NAT. I use "object-group" for the source again because it leaves us room to add more networks under it if needed. Notice that "object network" can only hold one subnet/range/host while "object-group network" can hold pretty much as many as you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the ACL configurations will have to be looked through also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that if you want to control traffic from a behind "outside" for example, then you can only use 1 interface bound ACL to control that traffic. So every rule from "outside" to "inside" or to "dmz" has to be in the same ACL. Also this ACL would be attached to the "outside" interface in "in" direction. For example "access-group OUTSIDE-IN in interface outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we are talking about VPN connections configured directly to the ASA there are some other options compared to the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said its better that your needs regards the ACL rules are gone through more in depth to really know how we should configure them as I am myself not sure what all the above ACL are supposed to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One final question for you. You have this network directly on the "inside" interface 10.20.145.3 255.255.255.192. But you also talk about it with mask /24. Is the ASA "inside" connected to some internal L3 device which hosts rest of the segments of this whole /24 network as currently the "inside" interface holds /26.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is ANY users/networks behind the ASA "inside" interface using the ASA directly as their gateway? I noticed that you setup would seem to have (as I mentioned in another thread to you) several devices on connected by the same LAN network (Router,VPN,firewall). What I fear will happen is that IF any "inside" users uses the ASA as their gateway and has to be routed back through the ASA "inside" interface to some other gateway that this will result in asymmetric routing and the ASA doesnt really handle that kind of situation that well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 20 Apr 2013 03:59:56 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-20T03:59:56Z</dc:date>
    <item>
      <title>ACL - configuration help</title>
      <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184892#M357960</link>
      <description>&lt;P&gt;Hello I've a newly configured 5510 would appreciate a look over of the configuration and some questions I have:&amp;nbsp; Its a long post and I appreciate anyone taking time to read through it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My goals are the following: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to make the inside network 10.20.145.0 to allow internet access - as long as the connection starts inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To allow neighbor network that comes in through outside interface origin 170.20.0.0/16 access to the 10.20.145.0 (bidirectional)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The tunnel from neighbor lan to inside lan happens through vpn concentrator that has external ip address and 77.76.19.35&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Allow certain devices on the DMZ to access the internet and allow outside to inside connections on certain ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much of the settings I have configured are coming from juniper that is currently online but needs to be replaced.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The network is set up as below for a chart of traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP ---- Internet router ---- switch (3 active connections) 1. firewall&amp;nbsp; 2. internet router&amp;nbsp;&amp;nbsp; 3. vpn concentrator&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an internal 3750 that I have configured with ip 10.20.145.15 since it comes up often&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using pub IPs on the machines on the DMZ though I'm thinking of changing that to an internal vlan and than nating it out.&amp;nbsp; Well here's what I have so far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=================================================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;domain-name a.domain.com&lt;/P&gt;&lt;P&gt;enable password l4Tu/tqHeN0MdD7t encrypted&lt;/P&gt;&lt;P&gt;passwd dL9fmCBkHiwx4Iib encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0&lt;/P&gt;&lt;P&gt; description outside-interface-connected-to-internet-switch&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 76.77.19.34 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt; description inside-int-10.20.145-network&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.145.3 255.255.255.192 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 76.77.19.49 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa832-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;lock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 76.77.6.11&lt;/P&gt;&lt;P&gt; name-server 66.72.76.84&lt;/P&gt;&lt;P&gt; name-server 4.2.2.1&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; domain-name a.domain.com&lt;/P&gt;&lt;P&gt;object network Inside_lan &lt;/P&gt;&lt;P&gt; subnet 10.20.145.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NET-neighbor&lt;/P&gt;&lt;P&gt; subnet 170.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; description neighbor_LAN&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network 76.77.19.44_cake&lt;/P&gt;&lt;P&gt; host 76.77.19.44&lt;/P&gt;&lt;P&gt; description cake&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network 76.77.19.59 &lt;/P&gt;&lt;P&gt; host 76.77.19.59&lt;/P&gt;&lt;P&gt; description streaming&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network 76.77.19.61 &lt;/P&gt;&lt;P&gt; host 76.77.19.61&lt;/P&gt;&lt;P&gt; description streaming&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network cindy &lt;/P&gt;&lt;P&gt; host 50.56.249.224&lt;/P&gt;&lt;P&gt; description cindy&amp;nbsp; &lt;/P&gt;&lt;P&gt;object-group network internal-LAN&lt;/P&gt;&lt;P&gt; network-object object Inside_lan&lt;/P&gt;&lt;P&gt;object-group service 3306 tcp&lt;/P&gt;&lt;P&gt; description 3306&lt;/P&gt;&lt;P&gt; port-object eq 3306&lt;/P&gt;&lt;P&gt;object-group service 4567 tcp&lt;/P&gt;&lt;P&gt; description 4567&lt;/P&gt;&lt;P&gt; port-object eq 4567&lt;/P&gt;&lt;P&gt;object-group icmp-type ICM&lt;/P&gt;&lt;P&gt; description ICM_basic&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object traceroute&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group service Retriever_SVC tcp&lt;/P&gt;&lt;P&gt; description Retriever&lt;/P&gt;&lt;P&gt; port-object range 8000 8001&lt;/P&gt;&lt;P&gt;object-group service Production tcp&lt;/P&gt;&lt;P&gt; description PM&lt;/P&gt;&lt;P&gt; port-object range www www&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt; description RDP&lt;/P&gt;&lt;P&gt;port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group service Streaming tcp&lt;/P&gt;&lt;P&gt; description streaming server&lt;/P&gt;&lt;P&gt; port-object eq 7009&lt;/P&gt;&lt;P&gt;object-group service UDP123 udp&lt;/P&gt;&lt;P&gt; description 123&lt;/P&gt;&lt;P&gt; port-object eq ntp&lt;/P&gt;&lt;P&gt;object-group service affordable tcp&lt;/P&gt;&lt;P&gt; description affordable legacy&lt;/P&gt;&lt;P&gt; port-object eq 85&lt;/P&gt;&lt;P&gt;object-group service market tcp&lt;/P&gt;&lt;P&gt; description ports for market&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt; port-object eq 2189&lt;/P&gt;&lt;P&gt; port-object eq 2190&lt;/P&gt;&lt;P&gt; port-object eq 2192&lt;/P&gt;&lt;P&gt; port-object eq 2194&lt;/P&gt;&lt;P&gt;object-group service messenger tcp&lt;/P&gt;&lt;P&gt; description air messenger&lt;/P&gt;&lt;P&gt; port-object eq 444&lt;/P&gt;&lt;P&gt;object-group service traffic-701 tcp&lt;/P&gt;&lt;P&gt; description 701&lt;/P&gt;&lt;P&gt; port-object eq 701&lt;/P&gt;&lt;P&gt;object-group service ntp1 udp&lt;/P&gt;&lt;P&gt; description ntp-udp-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; group-object UDP123&lt;/P&gt;&lt;P&gt;object-group service payroll tcp&lt;/P&gt;&lt;P&gt; description payroll port&lt;/P&gt;&lt;P&gt; port-object eq 714&lt;/P&gt;&lt;P&gt;object-group service snmp-udp udp&lt;/P&gt;&lt;P&gt; description snmp udp 1&lt;/P&gt;&lt;P&gt; port-object eq snmp&lt;/P&gt;&lt;P&gt;object-group service vitrol tcp&lt;/P&gt;&lt;P&gt; description vitrol custom&lt;/P&gt;&lt;P&gt; port-object eq 5986&lt;/P&gt;&lt;P&gt;object-group service webconferrence tcp&lt;/P&gt;&lt;P&gt; description webconference legacy port&lt;/P&gt;&lt;P&gt; port-object eq 1417&lt;/P&gt;&lt;P&gt; port-object eq 407&lt;/P&gt;&lt;P&gt;object-group service webmail tcp&lt;/P&gt;&lt;P&gt; description webmail ports&lt;/P&gt;&lt;P&gt; port-object eq 2095&lt;/P&gt;&lt;P&gt;object-group service INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group service INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object tcp &lt;/P&gt;&lt;P&gt; service-object icmp echo-reply&lt;/P&gt;&lt;P&gt; service-object icmp traceroute&lt;/P&gt;&lt;P&gt; service-object icmp unreachable&lt;/P&gt;&lt;P&gt; service-object tcp destination eq ftp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ftp-data &lt;/P&gt;&lt;P&gt; service-object tcp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt; service-object udp destination eq echo &lt;/P&gt;&lt;P&gt; service-object udp destination eq ntp &lt;/P&gt;&lt;P&gt; service-object udp destination eq radius &lt;/P&gt;&lt;P&gt; service-object udp destination eq radius-acct &lt;/P&gt;&lt;P&gt; service-object udp destination eq syslog &lt;/P&gt;&lt;P&gt;object-group network INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 76.57.19.53&lt;/P&gt;&lt;P&gt; network-object host 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; group-object Streaming&lt;/P&gt;&lt;P&gt; group-object vitrol&lt;/P&gt;&lt;P&gt;object-group service INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object ip &lt;/P&gt;&lt;P&gt; service-object tcp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ftp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ftp-data &lt;/P&gt;&lt;P&gt; service-object tcp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ssh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet extended permit ip object Inside_lan interface outside &lt;/P&gt;&lt;P&gt;access-list internet extended permit object-group DM_INLINE_SERVICE_1 object Inside_lan any &lt;/P&gt;&lt;P&gt;access-list syndicaster extended permit tcp object Cindy object Inside_lan object-group INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list streaming extended permit tcp interface DMZ any object-group Streaming &lt;/P&gt;&lt;P&gt;access-list streaming59 extended permit tcp object 76.77.19.59 interface outside object-group Streaming&lt;/P&gt;&lt;P&gt;access-list streaming_outside_in extended permit tcp interface outside object-group INLINE_NETWORK_1 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list neighbor extended permit object-group INLINE_SERVICE_2 object NET-neighbor object Inside_lan &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Inside_lan&lt;/P&gt;&lt;P&gt; nat (any,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group neighbor in interface outside&lt;/P&gt;&lt;P&gt;access-group neighbor out interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 76.77.19.33 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.255.255.0 10.20.145.4 1&lt;/P&gt;&lt;P&gt;route inside 10.0.1.0 255.255.255.0 10.20.145.2 1&lt;/P&gt;&lt;P&gt;route inside 10.20.145.0 255.255.255.0 10.20.145.15 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 10.20.145.39 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.20.145.39 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 76.77.6.11 64.22.16.84&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd domain a domain&lt;/P&gt;&lt;P&gt;dhcpd option 6 ip 4.2.2.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username joe password m6OO.pH/13qc7ypS encrypted privilege 15&lt;/P&gt;&lt;P&gt;username bob password N./x1Ut.gM.QGZLa encrypted privilege 15&lt;/P&gt;&lt;P&gt;username bill password uZjIWeHtovCOweHJ encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:06eb82d8d8a3ae82352512cd707e7f4a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;========================================================================================================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list internet; 14 elements; name hash: 0xb30cf7fe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list internet line 1 extended permit ip object Inside_lan interface outside 0xe073f975 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 1 extended permit ip 10.20.1450 255.255.255.0 interface outside (hitcnt=0) 0xe073f975 &lt;/P&gt;&lt;P&gt;access-list internet line 2 extended permit object-group INLINE_SERVICE_1 object Inside_lan any 0x2e33ca08 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any (hitcnt=0) 0xa576d14f &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any echo-reply (hitcnt=0) 0x15cccd5c &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any traceroute (hitcnt=0) 0x8aab2f53 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any unreachable (hitcnt=0) 0xe02606e1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq ftp (hitcnt=0) 0x6d0043b6 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq ftp-data (hitcnt=0) 0xce904411 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq www (hitcnt=0) 0x1ddebc69 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq https (hitcnt=0) 0x1a3b15bc &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq echo (hitcnt=0) 0xadc66030 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq ntp (hitcnt=0) 0xa67a4406 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq radius (hitcnt=0) 0x230419e6 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq radius-acct (hitcnt=0) 0xa8ae0824 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq syslog (hitcnt=0) 0x051c7ef5 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cindy; 2 elements; name hash: 0x807c55e5&lt;/P&gt;&lt;P&gt;access-list cindy line 1 extended permit tcp object cindy object Inside_lan object-group DM_INLINE_TCP_1 0xe35e702c &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list cindy line 1 extended permit tcp host 50.56.249.224 10.20.145.0 255.255.255.0 eq ftp (hitcnt=0) 0x64b321cc &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list cindy line 1 extended permit tcp host 50.56.249.224 10.20.145.0 255.255.255.0 eq ftp-data (hitcnt=0) 0x55109118 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list streaming; 1 elements; name hash: 0xfd34cf16&lt;/P&gt;&lt;P&gt;access-list streaming line 1 extended permit tcp interface DMZ any object-group Streaming_custom 0x8b2e87d1 &lt;/P&gt;&lt;P&gt;access-list streaming line 1 extended permit tcp interface DMZ any eq 7009 (hitcnt=0) 0xb13a2776 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list streaming59; 1 elements; name hash: 0x959c1f3b&lt;/P&gt;&lt;P&gt;access-list streaming59 line 1 extended permit tcp object 76.77.19.59 interface outside object-group Streaming_custom 0xc173840d &lt;/P&gt;&lt;P&gt;access-list streaming59 line 1 extended permit tcp host 76.77.19.59 interface outside eq 7009 (hitcnt=0) 0x84cd9084 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list streaming_outside_in; 4 elements; name hash: 0x3f86c9d4&lt;/P&gt;&lt;P&gt;access-list streaming_outside_in line 1 extended permit tcp interface outside object-group INLINE_NETWORK_1 object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list streaming_outside_in line 1 extended permit tcp interface outside host 206.57.19.53 eq 7009 (hitcnt=0) 0x06c04720 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list streaming_outside_in line 1 extended permit tcp interface outside host 206.57.19.53 eq 5986 (hitcnt=0) 0x9ae9047e &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list streaming_outside_in line 1 extended permit tcp interface outside host 255.255.255.255 eq 7009 (hitcnt=0) 0x5e3553e8 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list streaming_outside_in line 1 extended permit tcp interface outside host 255.255.255.255 eq 5986 (hitcnt=0) 0x1f5d8fd9 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list neighbor; 7 elements; name hash: 0xc99eb2b4&lt;/P&gt;&lt;P&gt;access-list neighbor line 1 extended permit object-group INLINE_SERVICE_2 object NET-neighbor object Inside_lan 0xc9688a21 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit ip 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 (hitcnt=0) 0xe1e8b995 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 (hitcnt=0) 0x462beedc &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ftp (hitcnt=0) 0xf238c75e &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ftp-data (hitcnt=0) 0x266e675b &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq www (hitcnt=0) 0x8627ec0a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq https (hitcnt=0) 0x3cae424a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ssh (hitcnt=0) 0xcb6666b3 &lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184892#M357960</guid>
      <dc:creator>willy moronta</dc:creator>
      <dc:date>2019-03-26T00:50:40Z</dc:date>
    </item>
    <item>
      <title>ACL - configuration help</title>
      <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184893#M357961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the Default Dynamic PAT rule that you are asking for the single "inside" network I would suggest the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First remove the current NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Inside_lan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (any,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then reconfigure the NAT in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.20.145.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto sourece dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will create and "object-group" for the networks or hosts that should be PATed to the "outside" interface IP address when accessing the Internet. If you want more internal networks to get PATed the same way, you simply add the network under the "object-group" among the already existing "inside" network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "after-auto" parameter also makes sure that this NAT rule doesnt override any other future rules. The parameter in question moves the NAT rule at the bottom of the NAT rules so its one of the last matched agains when traffic arrives on the firewall from behind "inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the neighbor network of 172.20.0.0/16, is this some network that is going to be behind a L2L VPN or is simply almost directly behind the "outside" interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general the NAT format for this kind NAT is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NEIGHBOR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 172.20.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network NEIGHBOR-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.20.145.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static NEIGHBOR-SOURCE NEIGHBOR-SOURCE destination static NEIGHBOR NEIGHBOR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I basically use an "object network" to define the remote network and "object-group network" to define the source network for this NAT. I use "object-group" for the source again because it leaves us room to add more networks under it if needed. Notice that "object network" can only hold one subnet/range/host while "object-group network" can hold pretty much as many as you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the ACL configurations will have to be looked through also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that if you want to control traffic from a behind "outside" for example, then you can only use 1 interface bound ACL to control that traffic. So every rule from "outside" to "inside" or to "dmz" has to be in the same ACL. Also this ACL would be attached to the "outside" interface in "in" direction. For example "access-group OUTSIDE-IN in interface outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we are talking about VPN connections configured directly to the ASA there are some other options compared to the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said its better that your needs regards the ACL rules are gone through more in depth to really know how we should configure them as I am myself not sure what all the above ACL are supposed to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One final question for you. You have this network directly on the "inside" interface 10.20.145.3 255.255.255.192. But you also talk about it with mask /24. Is the ASA "inside" connected to some internal L3 device which hosts rest of the segments of this whole /24 network as currently the "inside" interface holds /26.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is ANY users/networks behind the ASA "inside" interface using the ASA directly as their gateway? I noticed that you setup would seem to have (as I mentioned in another thread to you) several devices on connected by the same LAN network (Router,VPN,firewall). What I fear will happen is that IF any "inside" users uses the ASA as their gateway and has to be routed back through the ASA "inside" interface to some other gateway that this will result in asymmetric routing and the ASA doesnt really handle that kind of situation that well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Apr 2013 03:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184893#M357961</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-20T03:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: ACL - configuration help</title>
      <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184894#M357962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni thanks for your feed back, the NAT rules will surely help me as I have in mind adding another network to the inside interface which will need outside access your solution will help me manage that much easier:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As to your questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;With regards to the neighbor network of 172.20.0.0/16, is this some&amp;nbsp; network that is going to be behind a L2L VPN or is simply almost&amp;nbsp; directly behind the "outside" interface?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes this network connects on a L2L currently configured on vpn concentrator that connects to external host.&amp;nbsp; Currently the networks pass traffic viaa L2L tunnel.&amp;nbsp; I am trying to make sure that tunnel remains unchanged as I swap out devices.&amp;nbsp; Basically that 10.20.145.x network can ping across to the 170.20.x.x - but I'm not looking to tackle that part of upgrade just yet as my downtimes are very limited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of the ACL' should I should aim to make one acl with many ace's that would control traffic from "outside" to "inside" and to "dmz".&amp;nbsp; Additionally than, should I create one ACL with many ACE's that would control traffic from "inside" to "outside" - and the same for the "DMZ" to outside?&amp;nbsp; In essence having fewer ACL's with greater amount of ACEs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;One final question for you. You have this network directly on the&amp;nbsp; "inside" interface 10.20.145.3 255.255.255.192. But you also talk about&amp;nbsp; it with mask /24. Is the ASA "inside" connected to some internal L3&amp;nbsp; device which hosts rest of the segments of this whole /24 network as&amp;nbsp; currently the "inside" interface holds /26.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a 3750 switch that has the rest of the segments for 10.20.145.0/24 it connects various vlans that belong to various subnets.&amp;nbsp; currently 10.20.145.3/192 is configured for the inside interface of the live firewall I thought to use the same one.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a side note I would prefer this wasnt the case and that actual separate networks (not subnets) would belong to VLANs, but changing this would mean manual re-ip of about 200 devices (really dhcp range is extremely small rest are all statics).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for remembering my last post and the asymetrical routing issue.&amp;nbsp; I believe have worked out how traffic is currently flowing (this is what is currently happening)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will not be used as the direct gateway for internal clients (or at least I don't believe so):&amp;nbsp; All clients have a default gateway of 10.20.145.15 - this is the switchs VLAN IP.&amp;nbsp; The switch itself has a gateway of 10.20.145.2 - this is an MPLS router that connects solely to a remote site.&amp;nbsp; Any non mpls traffic is than sent to the firewall.&amp;nbsp; Any outside traffic should be sent to the outside interface inside traffic for 10.20.145.0/24 from client to client should never reach it as the 3750 should route that to connected networks without forwarding it.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it is the single device doing state inspection of the packet the state of the packet should return to the same firewall - the outside traffic coming should go from the firewall to 10.20.145.15 and than back to the clients on that segment.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case of packets that are not destined for mpls and are destined for 10.0.0.0/24 network the firewall has a direct route configured to send that traffic to 10.20.145.4 (VPN, site-to-site) that packet should than come back to 10.20.145.4 which has default gateway to 10.12.175.15 which has all the hosts connected to it (its actually 2 3750's working as one to clarify).&amp;nbsp;&amp;nbsp; As I trace route to 10.0.0.1 client traffic goes from &lt;/P&gt;&lt;P&gt;10.20.145.15 &lt;/P&gt;&lt;P&gt;10.20.145.2 &lt;/P&gt;&lt;P&gt; 10.20.145.4 &lt;/P&gt;&lt;P&gt;10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the current device a juniper ssg we're not seeing asymetrical routing problems, but I'm not sure if the ASA will treat the traffic differently?&lt;/P&gt;&lt;P&gt; (there have been some other problems with the device but not this)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Apr 2013 05:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184894#M357962</guid>
      <dc:creator>willy moronta</dc:creator>
      <dc:date>2013-04-20T05:55:30Z</dc:date>
    </item>
    <item>
      <title>ACL - configuration help</title>
      <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184895#M357963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;In the case of the ACL' should I should aim to make one acl with many&amp;nbsp; ace's that would control traffic from "outside" to "inside" and to&amp;nbsp; "dmz".&amp;nbsp; Additionally than, should I create one ACL with many ACE's that&amp;nbsp; would control traffic from "inside" to "outside" - and the same for the&amp;nbsp; "DMZ" to outside?&amp;nbsp; In essence having fewer ACL's with greater amount of&amp;nbsp; ACEs?&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, basically ASA when it comes to controlling traffic from behind each interface, you only use ONE ACL to control that traffic. This ACL will then contain all the needed rules to control traffic entering the ASA. And these ACLs are usually attached to the ASA interface in "inbound" direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group INSIDE-IN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group DMZ-IN in interface dmz&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the ACLs will look totally different in an actual production environment. The above was just to give an example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some cases where you might want to use also an "outbound" ACL on an interface that already has an "inbound" ACL. The latest example from these forums was a situation where a user wanted to block all traffic destined to some IP on the Internet. Naturally this could be done on the "inbound" ACLs of the local interfaces but naturally the same could be done with a single ACL on the "outside" interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-OUT remark Block All Traffic to Specific Public IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-OUT deny ip any host 1.2.3.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-OUT remark Allow All Other Traffic Outbound to Internet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-OUT permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-OUT out interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;With the current device a juniper ssg we're not seeing asymetrical&amp;nbsp; routing problems, but I'm not sure if the ASA will treat the traffic&amp;nbsp; differently?&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The key thing with ASA is that IF the ASA sees some TCP&amp;nbsp; connection SYN packet, IT HAS TO SEE the TCP SYN,ACK also. Otherwise you will run into a situation where the last part of the TCP connection negotiation (TCP ACK) is sent to the ASA but the ASA hasnt seen the SYN ACK. Therefore the ASA will simply block the connection from ever forming. (Blocks the TCP ACK)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround for this is to configure TCP State Bypass but naturally this isnt a good choice. I am not 100% sure if this would happen after you migration but I just felt I want to stress this fact so that you dont find yourself in a bad situation when you eventually do the device change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Apr 2013 17:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184895#M357963</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-20T17:34:53Z</dc:date>
    </item>
    <item>
      <title>ACL - configuration help</title>
      <link>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184896#M357964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That makes complete sense for the ACL management.&amp;nbsp; I was concerned with traffic inside making it out, but since that traffic will be initiated from higher level interface 100 to 0 it should flow easily and making an ACL to allow inside to out does seem silly in hindsight.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've read up some more on the Asymetric routing and possible issues, its definately something to take into account and that I'll be looking for in the live environment if I see connection issues, thanks I would not have looked at that as possible culprit on my own.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will also help me with plan to run a secondary firewall for redundancy down the line in active/passive mode where asymetric routing appears as a real big issue when configuring the passive device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again, the feedback helped me understand configurations beyond the questions asked, and I'll be back when it comes time to configure vpn tunnels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Apr 2013 19:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-configuration-help/m-p/2184896#M357964</guid>
      <dc:creator>willy moronta</dc:creator>
      <dc:date>2013-04-20T19:28:22Z</dc:date>
    </item>
  </channel>
</rss>

