<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5550 Access List Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114421#M395707</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ohh but the static is backwards and the interfaces as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The translation should be: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.xx.xx.161 10.xx.xx.35 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why? Simple, the syntax is always like, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Real Interface, Mapped Interface) Mapped IP, Real IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that being said, the real interface where the host is located is on the inside, so that keyword goes first, then the mapped interface is where the Host is going to be translated (thats the outside) then you put the Mapped IP and the Real IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list will go like, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 200.xx.xx.161 &lt;/P&gt;&lt;P&gt;access-group outside_access_in interface outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have doubts, let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2012 04:05:28 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2012-11-13T04:05:28Z</dc:date>
    <item>
      <title>ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114418#M395702</link>
      <description>&lt;P&gt;EDIT: If I'm missing something that's required or you just have some questions, just let me know and I'll add the necessary information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to set up an ASA5550 so that I can access the servers behind it. Simple. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As of now, I am unable to even create an access-list to allow traffic from my remote IP into the firewall. As far as my level of experience with Cisco firewalls, it's basically zero but I have taken the Cisco CCNAX class and feel that I have a good understanding of the fundamentals. That said, we only dealt with routers and switches, and it's not impossible that I'm missing something that would be totally obvious to most folks on this board. I've used CLI and ASDM with no success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the relevant parts of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description "xxxxxxxxxx"&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&amp;nbsp; &lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.x.x.85 255.255.255.240 standby 200.xx.xx.86 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0&lt;/P&gt;&lt;P&gt; speed 1000&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.xx.xx.33 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip host 70.xx.xx.195 any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip host 200.xx.xx.161 host 10.xx.xx.35 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ASDM, when I use the real time log viewer in Debug mode, I get the following when I hit 200.xx.xx.161 with my browser from 70.xx.xx.195:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Nov 12 2012&lt;/TD&gt;&lt;TD&gt;11:16:46&lt;/TD&gt;&lt;TD&gt;106001&lt;/TD&gt;&lt;TD&gt;70.xx.xx.195&lt;/TD&gt;&lt;TD&gt;58759&lt;/TD&gt;&lt;TD&gt;200.xx.xx.161&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Inbound TCP connection denied from 70.xx.xx.195/58759 to 200.xx.xx.161/80 flags SYN&amp;nbsp; on interface outside&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's almost like the access-rule isn't even being used by the firewall because it permits exactly the connection I'm trying to make. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next task is to set up a static one-to-one NAT so that I can connect to hosts on the inside interface, but we'll deal with that after we solve this one.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114418#M395702</guid>
      <dc:creator>angerincarnate</dc:creator>
      <dc:date>2019-03-12T00:22:19Z</dc:date>
    </item>
    <item>
      <title>ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114419#M395703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was gonna wirte something complicated, but giving the understanding that you have of the firewalls, maybe I wil l keep it simple. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Next task is to set up a static one-to-one NAT so that I can connect to hosts on the inside interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is not optional, you need to have it to permit traffic inbound your network, if you are trying to Hit and IP address that is on the outside of the firewall, there has to be a NAT configured so once the ACL is hit, the packet will flow through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming you are running version 8.3 or higher, because since there is no NAT configured, the log that you are seeing would be normal at some point. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packet gets to the outside interface and it doesnt have any more rules on it. The processing would stop there and it wouldnt even try to match the ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My best shot is for you to build the NAT, then we will worry about the ACL. ( This is mainly because the action on the ACL has to correlate with the translated IP address for version 8.3 and above). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114419#M395703</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T03:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114420#M395704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First of all, thank you very much for taking the time to respond to my question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already tried setting the static NAT every way from Sunday but none have allowed the packet in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm on 8.2 BTW:&lt;/P&gt;&lt;P&gt;gip1-fw1-1-ord# show ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5) &lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's what I have right now:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.xx.xx.35 200.xx.xx.161 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.xx.xx.81 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried all combinations of 70.xx.xx.195, 200.xx.xx.161, and 10.xx.xx.35 and nothing is working. If somebody could explain to me how this works, it would be much appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've read the documentation over and over and it just doesn't help. Do I only need the one rule to do translations in both directions, does the source IP of the inbound packet never change and therefore never need to be translated when it becomes the source IP on the way out, or does there need to be a rule that translates on the way out as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 03:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114420#M395704</guid>
      <dc:creator>angerincarnate</dc:creator>
      <dc:date>2012-11-13T03:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114421#M395707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ohh but the static is backwards and the interfaces as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The translation should be: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.xx.xx.161 10.xx.xx.35 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why? Simple, the syntax is always like, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Real Interface, Mapped Interface) Mapped IP, Real IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that being said, the real interface where the host is located is on the inside, so that keyword goes first, then the mapped interface is where the Host is going to be translated (thats the outside) then you put the Mapped IP and the Real IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list will go like, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 200.xx.xx.161 &lt;/P&gt;&lt;P&gt;access-group outside_access_in interface outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have doubts, let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114421#M395707</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T04:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114422#M395709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I'll give that a shot and thanks for the explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The final question is: How do I prevent all IPs except my remote IP (70.xx.xx.195) from accessing the firewall if access-lists have to be associated with NATs in order to even be considered for application to incoming traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114422#M395709</guid>
      <dc:creator>angerincarnate</dc:creator>
      <dc:date>2012-11-13T04:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114423#M395710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are asking that, is because you know the source, if you dont know the source but you would like to limit the resourced, you can permit/deny based on services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IE &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 200.xx.xx.161 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would allow anyone to come but only for port 80 (Web). If you know the source it would be something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp host xx.xx.xx.xx host 200.xx.xx.161 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same concept as CCNA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would make a good Example. &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 04:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114423#M395710</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-11-13T04:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5550 Access List Question</title>
      <link>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114424#M395712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maykol, thank you very much for your help. I ended up creating a remote IPSec VPN to access the host that I needed but I finally did it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 22:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5550-access-list-question/m-p/2114424#M395712</guid>
      <dc:creator>angerincarnate</dc:creator>
      <dc:date>2012-11-13T22:31:26Z</dc:date>
    </item>
  </channel>
</rss>

