<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACLs on Cisco FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acls-on-cisco-fwsm/m-p/2110750#M393634</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have question regarding mixing ACL permit and deny statements. I am using network object-groups. I have a specific requirement. &lt;/P&gt;&lt;P&gt;a. I have to permit few port access to servers in object-groups&lt;/P&gt;&lt;P&gt;b&amp;nbsp; I have to deny all other ports to these servers in object-groups&lt;/P&gt;&lt;P&gt;c. I&amp;nbsp; have to permit traffic to all other network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using following ACLs. Is this going to achieve that and I am trying to do by mxing permits and deny statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group SMTP_SERVERS eq 465&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group SMTP_SERVERS eq 587&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended deny ip any object-group SMTP_SERVERS log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group WEB_SERVERS-2 object-group http-https&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended deny ip any object-group WEB_SERVERS-2 log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN permit ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is this workable on FWSMs? Any drawbacks for this method. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is best way to implement ACLs so deleting an ACE or adding an ACE is simpler and manageable. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:41:42 GMT</pubDate>
    <dc:creator>S891</dc:creator>
    <dc:date>2019-03-12T00:41:42Z</dc:date>
    <item>
      <title>ACLs on Cisco FWSM</title>
      <link>https://community.cisco.com/t5/network-security/acls-on-cisco-fwsm/m-p/2110750#M393634</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have question regarding mixing ACL permit and deny statements. I am using network object-groups. I have a specific requirement. &lt;/P&gt;&lt;P&gt;a. I have to permit few port access to servers in object-groups&lt;/P&gt;&lt;P&gt;b&amp;nbsp; I have to deny all other ports to these servers in object-groups&lt;/P&gt;&lt;P&gt;c. I&amp;nbsp; have to permit traffic to all other network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using following ACLs. Is this going to achieve that and I am trying to do by mxing permits and deny statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group SMTP_SERVERS eq 465&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group SMTP_SERVERS eq 587&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended deny ip any object-group SMTP_SERVERS log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any object-group WEB_SERVERS-2 object-group http-https&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended deny ip any object-group WEB_SERVERS-2 log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN permit ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is this workable on FWSMs? Any drawbacks for this method. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is best way to implement ACLs so deleting an ACE or adding an ACE is simpler and manageable. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acls-on-cisco-fwsm/m-p/2110750#M393634</guid>
      <dc:creator>S891</dc:creator>
      <dc:date>2019-03-12T00:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: ACLs on Cisco FWSM</title>
      <link>https://community.cisco.com/t5/network-security/acls-on-cisco-fwsm/m-p/2110751#M393635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration does the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Allows connections to IPs/Networks under SMTP_SERVERS from "any" source address while using destination port TCP/465 or TCP/587&lt;/LI&gt;&lt;LI&gt;Deny all other TCP/UDP connections to the IPs/Networks under SMTP_SERVERS&lt;/LI&gt;&lt;LI&gt;Allows connections to IPs/Networks under WEB_SERVERS-2 from "any" source address while using destination ports configured under http-https&lt;/LI&gt;&lt;LI&gt;Deny all other TCP/UDP connections to the IPs/Networks under WEB_SERVERS-2&lt;/LI&gt;&lt;LI&gt;Permit all the rest of the traffic no matter what the source and destination IP/Port are&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that this is an ACL to limit traffic from Internet to your servers. The ACL configured for "outside" interface usually only contains permit statements and all other traffic is denied by default. I wouldnt suggest using an ACE such as "permit ip any any" in an ACL that is controlling traffic that will be entering your LAN network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd say the above configuration you listed is more common for traffic leaving your network/server than traffic entering your network/server. In some DMZs for example you might want to allow the servers to communicate to the LAN only with certain destination ports and block all other traffic to the LAN. And after that you would still want to give the server full access to Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One example of such might be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow TCP/80 traffic to LAN&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit tcp host 10.10.10.10 10.10.20.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Deny all other TCP/UDP traffic to LAN&lt;/P&gt;&lt;P&gt;access-list DMZ-IN deny ip host 10.10.10.10 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow all TCP/UDP traffic to other networks&lt;/P&gt;&lt;P&gt;access-list DMZ-IN permit ip host 10.10.10.10 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object-groups are a good way to keep the running-configuration in clear format when ACL statements need to include many address ranges/IPs/ports/port ranges and you cant handle it with just simply configuring them line by line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Drawback for using object-groups could be when you have a lot of object-groups containing alot of entries and the same object-groups are used frequently. This will eventually eat up resources from the FWSM though I'd imagine it requires alot of them. I have run into such a problem in a FWSM with multiple contexts where a single context reached it maximum amount of configure ACL rules. (This could have been changed by reallocating resources but instead the other party agreed to "optimize" the ACL &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if you have found any of the information helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 22:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acls-on-cisco-fwsm/m-p/2110751#M393635</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-27T22:52:17Z</dc:date>
    </item>
  </channel>
</rss>

