<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cisco firewall rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032948#M399407</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohammad, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM has a completely different architecture, based upon which packet flow can be understood. Here is the explanation below: &lt;/P&gt;&lt;P&gt;he FWSM architecture is heirachical using four different components:&lt;/P&gt;&lt;P&gt;Network Processor 1 (NP1)&lt;/P&gt;&lt;P&gt;Network Processor 2 (NP2)&lt;/P&gt;&lt;P&gt;Network Processor 3 (NP3)&lt;/P&gt;&lt;P&gt;Control Point (CP, PC, CPU)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="/servlet/JiveServlet/showImage/102-12713-9-8366/NP Architecture.png"&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/6/3/8366-NP%20Architecture.png" class="jive-image" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP1&amp;nbsp; and NP2 are the front line processors that are responsible for reading&amp;nbsp; and analyzing all traffic initially. NP1 and NP2 are responsible for&amp;nbsp; receiving packets from the switch across the backplane connection. NP1&amp;nbsp; and NP2 each have three 1 Gigabit connections which connect the FWSM to&amp;nbsp; the backplane of the switch. Adding these all together gives you the 6&amp;nbsp; Gigabit link as identified in the FWSM datasheets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP1 and NP2 are responsible for the following functions:&lt;/P&gt;&lt;P&gt;- Perform per packet session lookup&lt;/P&gt;&lt;P&gt;- Maintain connection table&lt;/P&gt;&lt;P&gt;- Perform NAT/PAT&lt;/P&gt;&lt;P&gt;- TCP checks&lt;/P&gt;&lt;P&gt;- Handle reassembled IP packets (NP2 only)&lt;/P&gt;&lt;P&gt;- TCP sequence number shift for "randomization"&lt;/P&gt;&lt;P&gt;- Syn Cookies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP3 sits above NP1 and NP2. NP3 is also known as the session manager and performs the following functions:&lt;BR /&gt;- Processes first packet in a flow&lt;/P&gt;&lt;P&gt;- ACL checks&lt;/P&gt;&lt;P&gt;- Translation creation&lt;/P&gt;&lt;P&gt;- Embryonic/establish connection counts&lt;/P&gt;&lt;P&gt;- TCP/UDP checksums&lt;/P&gt;&lt;P&gt;- Per-flow offset calculation for TCP sequence number "randomization"&lt;/P&gt;&lt;P&gt;- TCP intercept&lt;/P&gt;&lt;P&gt;- IP reassembly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP3 talks to NP1 and NP2 as well as the CP. All packets that come to NP3 must first be processed by NP1 and NP2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; Control Point sits above NP3, and similarly only sees traffic that is&amp;nbsp; forwarded via NP3. The Control Point is primarily responsible for&amp;nbsp; performing Layer 7 fixups. For example, traffic that requires embedded&amp;nbsp; NAT or command inspection. The CP is also responsible for handling&amp;nbsp; traffic souced from or destined to the FWSM itself:&lt;/P&gt;&lt;P&gt;- Syslogs&lt;/P&gt;&lt;P&gt;- AAA (Radius/TACACS+)&lt;/P&gt;&lt;P&gt;- URL filtering (Websense/N2H2)&lt;/P&gt;&lt;P&gt;- Management traffic (telnet/SSH/HTTPS/SNMP)&lt;/P&gt;&lt;P&gt;- Failover communictions&lt;/P&gt;&lt;P&gt;- Routing protocols&lt;/P&gt;&lt;P&gt;- Most Layer 7 fixups/inspections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it answers your concern. &lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Sep 2012 18:22:09 GMT</pubDate>
    <dc:creator>gurpsin2</dc:creator>
    <dc:date>2012-09-12T18:22:09Z</dc:date>
    <item>
      <title>cisco firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032945#M399404</link>
      <description>&lt;P&gt;Hai,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone please clarrify me my question!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in cisco firewall, which is inspecting first??? either&amp;nbsp; network address translation (NAT) or access list???&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032945#M399404</guid>
      <dc:creator>mohamed fayz</dc:creator>
      <dc:date>2019-03-11T23:53:22Z</dc:date>
    </item>
    <item>
      <title>cisco firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032946#M399405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohammed, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prior to version 8.3, access-list hits first, followed by NAT, and then route-lookup. After 8.3 and above, nat hits first, then the ACL, due to wchi real ip are allowed in interface ACL. &lt;/P&gt;&lt;P&gt;Let me know if you have any other questions&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 18:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032946#M399405</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-12T18:11:52Z</dc:date>
    </item>
    <item>
      <title>cisco firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032947#M399406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Gurpeet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&amp;nbsp; Is this same happening in cisco fwsm also???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 18:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032947#M399406</guid>
      <dc:creator>mohamed fayz</dc:creator>
      <dc:date>2012-09-12T18:15:07Z</dc:date>
    </item>
    <item>
      <title>cisco firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032948#M399407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mohammad, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM has a completely different architecture, based upon which packet flow can be understood. Here is the explanation below: &lt;/P&gt;&lt;P&gt;he FWSM architecture is heirachical using four different components:&lt;/P&gt;&lt;P&gt;Network Processor 1 (NP1)&lt;/P&gt;&lt;P&gt;Network Processor 2 (NP2)&lt;/P&gt;&lt;P&gt;Network Processor 3 (NP3)&lt;/P&gt;&lt;P&gt;Control Point (CP, PC, CPU)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="/servlet/JiveServlet/showImage/102-12713-9-8366/NP Architecture.png"&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/6/3/8366-NP%20Architecture.png" class="jive-image" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP1&amp;nbsp; and NP2 are the front line processors that are responsible for reading&amp;nbsp; and analyzing all traffic initially. NP1 and NP2 are responsible for&amp;nbsp; receiving packets from the switch across the backplane connection. NP1&amp;nbsp; and NP2 each have three 1 Gigabit connections which connect the FWSM to&amp;nbsp; the backplane of the switch. Adding these all together gives you the 6&amp;nbsp; Gigabit link as identified in the FWSM datasheets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP1 and NP2 are responsible for the following functions:&lt;/P&gt;&lt;P&gt;- Perform per packet session lookup&lt;/P&gt;&lt;P&gt;- Maintain connection table&lt;/P&gt;&lt;P&gt;- Perform NAT/PAT&lt;/P&gt;&lt;P&gt;- TCP checks&lt;/P&gt;&lt;P&gt;- Handle reassembled IP packets (NP2 only)&lt;/P&gt;&lt;P&gt;- TCP sequence number shift for "randomization"&lt;/P&gt;&lt;P&gt;- Syn Cookies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP3 sits above NP1 and NP2. NP3 is also known as the session manager and performs the following functions:&lt;BR /&gt;- Processes first packet in a flow&lt;/P&gt;&lt;P&gt;- ACL checks&lt;/P&gt;&lt;P&gt;- Translation creation&lt;/P&gt;&lt;P&gt;- Embryonic/establish connection counts&lt;/P&gt;&lt;P&gt;- TCP/UDP checksums&lt;/P&gt;&lt;P&gt;- Per-flow offset calculation for TCP sequence number "randomization"&lt;/P&gt;&lt;P&gt;- TCP intercept&lt;/P&gt;&lt;P&gt;- IP reassembly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NP3 talks to NP1 and NP2 as well as the CP. All packets that come to NP3 must first be processed by NP1 and NP2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; Control Point sits above NP3, and similarly only sees traffic that is&amp;nbsp; forwarded via NP3. The Control Point is primarily responsible for&amp;nbsp; performing Layer 7 fixups. For example, traffic that requires embedded&amp;nbsp; NAT or command inspection. The CP is also responsible for handling&amp;nbsp; traffic souced from or destined to the FWSM itself:&lt;/P&gt;&lt;P&gt;- Syslogs&lt;/P&gt;&lt;P&gt;- AAA (Radius/TACACS+)&lt;/P&gt;&lt;P&gt;- URL filtering (Websense/N2H2)&lt;/P&gt;&lt;P&gt;- Management traffic (telnet/SSH/HTTPS/SNMP)&lt;/P&gt;&lt;P&gt;- Failover communictions&lt;/P&gt;&lt;P&gt;- Routing protocols&lt;/P&gt;&lt;P&gt;- Most Layer 7 fixups/inspections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it answers your concern. &lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 18:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032948#M399407</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-12T18:22:09Z</dc:date>
    </item>
    <item>
      <title>cisco firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032949#M399408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you Gurpet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still i have one doubt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you said, after 8.3 and above if nat is htting first, thats y we are giving real ip in access-list (in outside). But if we have a nat rule from inisde users (inside interface generally),&amp;nbsp; and if we have access-list on inisde interface, how can we add access-list???? for nated mapped ip or real ip??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if we are applying access-list for real ip, as per you said, nat will hit first, followed by access-list. then nat will transalte to mapped ip, so do we need to permit mapped ip from inside?????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Sep 2012 05:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewall-rules/m-p/2032949#M399408</guid>
      <dc:creator>mohamed fayz</dc:creator>
      <dc:date>2012-09-13T05:20:49Z</dc:date>
    </item>
  </channel>
</rss>

