<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL Question, Does TCP Established always match port? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055321#M403012</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure "established" means it checks if the TCP ACK bit is set, regardless of the port. That's why you see 232 matches for rule 5 on garden_OUT and none on the other rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can apply the rule to an explicit TCP port if you just want to match packets belonging to an established TCP session only for example on the HTTP port (80).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp x eq 80 y established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that you probably want to match the source port in garden_OUT and not the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Oct 2012 22:42:13 GMT</pubDate>
    <dc:creator>mironetgmbh</dc:creator>
    <dc:date>2012-10-24T22:42:13Z</dc:date>
    <item>
      <title>ACL Question, Does TCP Established always match port?</title>
      <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055320#M403011</link>
      <description>&lt;P&gt;On my Nexus 5k seems that ACL for "in" (garden_IN) is allowing ports needed. But for "out" (garden_OUT) unless established is ANY this does not work. Usually I do established with same port number. Is this right? Have not had to use any before. Garden is initiating connection to Pasture. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nexus5000# sho running-config interface vlan 75&lt;/P&gt;&lt;P&gt; interface Vlan75&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp; description pasture_PRIV garden SIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-group garden_IN in&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip access-group garden_OUT out&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.25.0.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nexus5000# sho running-config interface vlan 74&lt;/P&gt;&lt;P&gt;interface Vlan74&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp; description pasture_PRIV pasture SIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 172.24.0.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; IPV4 ACL garden_IN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; statistics per-entry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 remark permit tcp ports from 172.25.0.0/24 (garden) to 172.24.0.0/24 (pasture)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp 172.25.0.0/24 172.24.0.0/24 eq 1433&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit tcp 172.25.0.0/24 172.24.0.0/24 eq 445&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit tcp 172.25.0.0/24 172.24.0.0/24 eq 1434&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit tcp 172.25.0.0/24 172.24.0.0/24 eq 4022&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit tcp 172.25.0.0/24 172.24.0.0/24 eq 135&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit udp 172.25.0.0/24 172.24.0.0/24 eq 1434&lt;/P&gt;&lt;P&gt;IPV4 ACL garden_OUT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; statistics per-entry&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4 remark permit tcp established from 172.24.0.0/24 (pasture) to 172.25.0.0/24 (garden)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 permit tcp 172.24.0.0/24 172.25.0.0/24 established [match=232]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit tcp 172.24.0.0/24 172.25.0.0/24 eq 1433 established [match=0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit tcp 172.24.0.0/24 172.25.0.0/24 eq 445 established [match=0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit tcp 172.24.0.0/24 172.25.0.0/24 eq 1434 established [match=0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit tcp 172.24.0.0/24 172.25.0.0/24 eq 4022 established [match=0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 permit tcp 172.24.0.0/24 172.25.0.0/24 eq 135 established [match=0]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 permit udp 172.24.0.0/24 172.25.0.0/24 eq 1434 [match=0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055320#M403011</guid>
      <dc:creator>kg6itcraig</dc:creator>
      <dc:date>2019-03-26T00:49:22Z</dc:date>
    </item>
    <item>
      <title>ACL Question, Does TCP Established always match port?</title>
      <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055321#M403012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure "established" means it checks if the TCP ACK bit is set, regardless of the port. That's why you see 232 matches for rule 5 on garden_OUT and none on the other rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can apply the rule to an explicit TCP port if you just want to match packets belonging to an established TCP session only for example on the HTTP port (80).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp x eq 80 y established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that you probably want to match the source port in garden_OUT and not the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2012 22:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055321#M403012</guid>
      <dc:creator>mironetgmbh</dc:creator>
      <dc:date>2012-10-24T22:42:13Z</dc:date>
    </item>
    <item>
      <title>ACL Question, Does TCP Established always match port?</title>
      <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055322#M403013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link should help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.orbit-computer-solutions.com/Reflexive-ACLs.php"&gt;http://www.orbit-computer-solutions.com/Reflexive-ACLs.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 05:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055322#M403013</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-25T05:44:35Z</dc:date>
    </item>
    <item>
      <title>ACL Question, Does TCP Established always match port?</title>
      <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055323#M403014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Figured it out! Thanks for the responses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The established acl's had source and target port backwards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Wrong&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp 172.24.0.0/24 172.25.0.0/24 eq 1433 established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Correct&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp 172.24.0.0/24 eq 1433 172.25.0.0/24 established&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No longer need the established any, works fine! Great!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! &lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 06:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055323#M403014</guid>
      <dc:creator>kg6itcraig</dc:creator>
      <dc:date>2012-10-25T06:30:05Z</dc:date>
    </item>
    <item>
      <title>ACL Question, Does TCP Established always match port?</title>
      <link>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055324#M403015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IMO reflexive ACLs are not supported on Nexus 5000. "established" is the way to go on this platform.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 06:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-question-does-tcp-established-always-match-port/m-p/2055324#M403015</guid>
      <dc:creator>mironetgmbh</dc:creator>
      <dc:date>2012-10-25T06:39:12Z</dc:date>
    </item>
  </channel>
</rss>

