<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Implisit Rule ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372320#M416296</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps you could post your config minus any public IP info ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Jan 2014 13:01:08 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2014-01-02T13:01:08Z</dc:date>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372317#M416293</link>
      <description>&lt;P&gt;HI, i just got an ASA 5505 and iam trying to get to the internet and i cant , i traced the problem to an implicit rule that can't be deleted or changes that denys outside ip any&amp;gt;any. how can i solve this ?&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372317#M416293</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2020-02-21T13:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372318#M416294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each ACL that is bound to an interface has an invisible "deny ip any any" statement (there are exceptions to that with global ACLs on the ASA). That is the implicit deny. You can't remove that entry but you can force your ASA to never reach that Access-List-Entry. Just add an "permit ip any any" as the last line to your ACL.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 07:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372318#M416294</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-12-31T07:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372319#M416295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I already made an ACL to permit any&amp;gt;any ip now i still can't get to the router's interface (the ASA exteral Ethernet is connected to the router's internal ethernet port) i already did static nat on the ASA'S internal network which is (192.168.1.0/24) to be translated into the external ASA's entherner (which is 192.168.0.0/24) which is also the router's internal network.&lt;/P&gt;&lt;P&gt;Do you think that imight be missing something else?&lt;/P&gt;&lt;P&gt;Oh and i alreday added static route to any netwotk to the router IP address as a default gateway for the ASA to get to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 20:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372319#M416295</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2014-01-01T20:43:05Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372320#M416296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps you could post your config minus any public IP info ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jan 2014 13:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372320#M416296</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-02T13:01:08Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372321#M416297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name nav.info&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.1 router description router&lt;/P&gt;&lt;P&gt;name 192.168.1.10 WebServer-Internal&lt;/P&gt;&lt;P&gt;name 192.168.0.0 Outside-network&lt;/P&gt;&lt;P&gt;name 192.168.0.10 WebServer-External&lt;/P&gt;&lt;P&gt;name 192.168.1.6 Aeroresearcher-IN&lt;/P&gt;&lt;P&gt;name 192.168.0.230 Aeroresearcher-OUT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address dhcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 4.4.4.2&lt;/P&gt;&lt;P&gt; domain-name nav.info&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object tcp-udp&lt;/P&gt;&lt;P&gt; service-object ip&lt;/P&gt;&lt;P&gt; service-object tcp eq www&lt;/P&gt;&lt;P&gt; service-object tcp eq https&lt;/P&gt;&lt;P&gt; service-object udp eq snmp&lt;/P&gt;&lt;P&gt; service-object udp eq snmptrap&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object icmp6&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object icmp6&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt;protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object icmp6&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object icmp6&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_5&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object icmp6&lt;/P&gt;&lt;P&gt;access-list testvpn2_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 a&lt;/P&gt;&lt;P&gt;ny interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt;any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 a&lt;/P&gt;&lt;P&gt;ny any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 a&lt;/P&gt;&lt;P&gt;ny any&lt;/P&gt;&lt;P&gt;access-list inside_authentication extended deny tcp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit object-group DM_INLINE_PROTOCOL_5&lt;/P&gt;&lt;P&gt;any any&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit object-group DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; any any&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.1.192 255.255.25&lt;/P&gt;&lt;P&gt;5.224&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 19&lt;/P&gt;&lt;P&gt;2.168.1.208 255.255.255.240&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpn 192.168.1.100-192.168.1.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool vpn2 192.168.1.205-192.168.1.210 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;ip local pool vpn3 192.168.1.215-192.168.1.220 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.0.8-192.168.0.15 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) Outside-network 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 router 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication match inside_authentication inside LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128&lt;/P&gt;&lt;P&gt;-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256&lt;/P&gt;&lt;P&gt;-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map inside_map interface inside&lt;/P&gt;&lt;P&gt;crypto isakmp enable inside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy testvpn2 internal&lt;/P&gt;&lt;P&gt;group-policy testvpn2 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; default-domain value nav.info&lt;/P&gt;&lt;P&gt;group-policy testvpn2_1 internal&lt;/P&gt;&lt;P&gt;group-policy testvpn2_1 attributes&lt;/P&gt;&lt;P&gt; dns-server value 4.4.4.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 09:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372321#M416297</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2014-01-03T09:34:43Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372322#M416298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your ACL-implemetation (and much of the complete config) is a real mess (sorry to say that).&lt;/P&gt;&lt;P&gt;Please specify what you want to achieve and then let's work out how the config should be modified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;How should the outbound traffic be controlled?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Do you need inbound traffic?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Where are your VPN-clients?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;which version are you running?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;Do you really have private addresses on the outside interface? If yes, do you have control over the router in front of your ASA?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 11:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372322#M416298</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-01-03T11:10:01Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372323#M416299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need inbound traffic to be able to go back to the internet and browse HTTP,HTTPS i have a VPN setup and iam using VPN cleint software, everything works fine in the vpn but when i disable split tunneling(which is what i want to do) the vpn clients can't go to the internet (naturally because my internal network can't) , the vpn pool i set up is in the same internal network ip range.&lt;/P&gt;&lt;P&gt;When i first got the ASA i did a change in the CLI which i learned which is to allow http and https to my web server by creating an access list specifying the IP of my server, the only computer that can go to the internet from the internal network is my webserver computer.I am not sure which version you are refering to here, the ASDM version is (6.4).&lt;/P&gt;&lt;P&gt;The answers to your number 5 is YES,YES.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 18:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372323#M416299</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2014-01-03T18:43:03Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372324#M416300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;I am not sure which version you are refering to here, the ASDM version is (6.4).&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm refering to the ASA-version. You see the version with "show version" at the top of the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;The answers to your number 5 is YES,YES.&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it a DSL-router (PPPoE?) that you can reconfigure to bridge-mode? With that, the public IP that is now on that router would be moved to the ASA. With that you have more control over the needed functions like NAT. The rest of the config is dependant on that so we have to figure that out first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 19:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372324#M416300</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-01-03T19:16:01Z</dc:date>
    </item>
    <item>
      <title>Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372325#M416301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the router which is actally a modem and a router and an access point (3 in 1): &lt;A href="http://www.motorola.com/us/SBG6580-SURFboard%C2%AE-eXtreme-Wireless-Cable-Modem/70902.html"&gt;http://www.motorola.com/us/SBG6580-SURFboard%C2%AE-eXtreme-Wireless-Cable-Modem/70902.html&lt;/A&gt;&amp;nbsp; but if there is bridging in the router (which i dobt it) then what is the static route on the ASA going to be ? (Now the static route on the asa is &amp;gt;OUTSIDE INTERFACE&amp;gt;NETWORK ANY&amp;gt;GATEWAY&amp;gt; (the router's internal IP addess).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 21:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372325#M416301</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2014-01-03T21:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372326#M416303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on your needs I would try to reduce the complexity of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) NAT&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you are doing NAT on the cable-router, you can remove NAT completely from the ASA.&lt;/P&gt;&lt;P&gt;For that the cable router needs a route for all internally used networks pointing to your ASA. You can configure a static route on the Motorola-router for 192.168.0.0 255.255.0.0 pointing to your ASA-address 192.168.0.6. That one is really important. Without that route not outbound traffic will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router also needs to send all traffic that arrives on the external interface to the ASA. This function is often named "exposed host" or "DMZ-host". Thats for you incoming traffic like VPN.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;On the ASA disable all NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure nat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure static&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure access-list inside_nat0_outbound&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no nat-control&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Access-Control&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/acl_overview.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/acl_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_nw.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/access_nw.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't want to control outgoing traffic you can remove all access-control in outboud direction. The Access-control in inbound direction can be skipped if you don't have internal hosts that sould be reachable from outside:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no access-group inside_access_in in interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no access-group inside_access_out out interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no access-group outside_access_in in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no access-group outside_access_out out interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure access-list outside_access_in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure access-list inside_access_out&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure access-list outside_access_in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;clear configure access-list outside_access_out&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group service DM_INLINE_SERVICE_1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group protocol DM_INLINE_PROTOCOL_1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group protocol DM_INLINE_PROTOCOL_2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group protocol DM_INLINE_PROTOCOL_3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group protocol DM_INLINE_PROTOCOL_4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no object-group protocol DM_INLINE_PROTOCOL_5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) For hairpinning vpn-traffic you have to allow that trafic enters and leaves the same interface:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/intrface.html#wp1061479" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/intrface.html#wp1061479&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;4) For firewalling there are the typical inspections missing:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;class-map inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 h225&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect h323 ras&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect ip-options&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect netbios&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rsh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect rtsp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect skinny&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sqlnet&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sunrpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect tftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect sip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect xdmcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect icmp error&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect http&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;! &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Your VPN-config allows many insecure and unneeded algorithms and it's unlikely that you need VPN on the inside interface:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ike.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ike.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-MD5 ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto map inside_map interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;no crypto isakmp enable inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's likely that there is still something missing. But that could be the starting-point for your further config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Jan 2014 11:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372326#M416303</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-01-04T11:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Implisit Rule ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372327#M416304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you much, there is one thing though, the router doesn't have any NAT options so, what if i wanna do it with the current config. i mean with the addition of your suggested config. what is the final config would look like? oh and there is something else, when i do a packet trace to the router's int. (192.168.0.1) or any other host on the internet, sometimes it says allowed but i can't actually get to it, and sometimes it says Denied or dropped and when i trace the ACL that drops it, i see that it is one of the implisit access lists!! it is a little confusing..i mean it is not really black and white thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 06:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implisit-rule-asa-5505/m-p/2372327#M416304</guid>
      <dc:creator>aeronav01</dc:creator>
      <dc:date>2014-01-06T06:13:31Z</dc:date>
    </item>
  </channel>
</rss>

