<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Undesireable &amp;quot;Deny&amp;quot; or &amp;quot;Block&amp;quot; ASA Behavior in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/undesireable-quot-deny-quot-or-quot-block-quot-asa-behavior/m-p/515198#M427558</link>
    <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Per my previous post ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[In a full "Nat 0" envrionment with the PIX Functioning as an VLAN ACL Filter]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) When a packet gets blocked by the default ASA policy -- that of a packet with a source in a lower security level traveling to a higher security level interface, you get a "timed out", or no reponse the default behavior of many firewalls "block", "drop", or "deny" rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) If I don't apply an access-list/access-group combination to an "Internal" interface (one defined by a high security level), the implied behavior is an ACL "permit any any" from traffic headed to a destination on a lower interface.  As if an explicity ACL "permit any any" is in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) In that scenario, in order for ICMP (and *ONLY* ICMP traffic) reply traffic&lt;/P&gt;&lt;P&gt;to return back from the lower security level interface at the destionation host,&lt;/P&gt;&lt;P&gt;back to the original sender on the higher level security interface, &lt;/P&gt;&lt;P&gt;I must apply an inbound access-list/&lt;/P&gt;&lt;P&gt;access-group statement matching return traffic.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Is this something to do with ASA's automatic stateful/reflexive nature of TCP&lt;/P&gt;&lt;P&gt;v.s. ICMP's stateless? Other firewalls can keep state on ICMP/UDP/GRE/ESP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) If I apply access-list/access-group combination to the same internal "higher security" interface in an attempt to restrict access from the higher level security interface/subnet to a lower level security interface/subnet, traffic matching "deny" statements will recieve "Connection Refused" ICMP back (TCP Flag RST from the PIX masquarading as the destination), &lt;/P&gt;&lt;P&gt;which is the OpenBSD PF(4) equiv of a "return-rst" argument to a "block", and what&lt;/P&gt;&lt;P&gt;a non-firewalled host will return to an attempt to open a TCP port to a non-listening Service Port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from capture:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11:03:32.150565 802.1Q vlan#20 P0 192.168.9.2.23 &amp;gt; 192.168.8.2.1096: R 0:0(0) ack 1397346855 win 65535 &amp;lt;mss 1260,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106023: Deny tcp src Customer0:192.168.8.2/1099 dst Management:192.168.9.2/23 by access-group "customer0_2_mgmnt"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) This behavior is a bit misleading and normally something that you would be able to fine-tune in many firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Also, because Pix only allows application of access-groups "inbound", I am left with this quagmire:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 11 (interface DMZ, Security0 -- public routable),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 12 (private management, Security15),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 2[X], Where&lt;/P&gt;&lt;P&gt;X = Interface:CustomerX (Security50).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- All customer subnets are isolated by the nature of ASA/Same Security Levels; good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Nat0 applied to all customer interfaces with&lt;/P&gt;&lt;P&gt;  an ACL for *each* matching source that subnet destination the Management subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Granular "inbound" ACLs applied from Customer0 to Management to restrict the&lt;/P&gt;&lt;P&gt;  default ASA behavior, overriding the default "permit any" behavior&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Nat1/PAT from Management to DMZ (Via Interface Address):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   -- nat (Management) 1 access-list MgmntSubnetToNAT 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Now I must design a very convuluted Access-list applied "inbound" to the &lt;/P&gt;&lt;P&gt;  Management interface to permit:&lt;/P&gt;&lt;P&gt;   - ICMP returns to CustomerX interfaces&lt;/P&gt;&lt;P&gt;   - Specific TCP/UDP from Management to CustomerX interfaces&lt;/P&gt;&lt;P&gt;   - Some kind of permit exemption for all traffic from source Management subnet destined&lt;/P&gt;&lt;P&gt;     for a wildcard on DMZ.  Luckily, DMZ is a different subnet/ip block, and Cisco ACLs use a match-first-rule-stop-evaluating logic so I can do something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps I would be better off with a Gigabit enabled router acting as an ACL filter?  If I don't need NAT, Fixups, Like a 26xx or 28xx router?  Something that can take a IPSec enabled IOS image and a VPN acellerator in a WIC port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is, the Supervisor in my 3550 HSRP Pair (or 65xx MSRP) is simply doing default routing from my DMZ to my WAN subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unforunately, I only enable IPs on those two VLANs.  For security, the VLANs I'm ACL'ing on the PIX are only introduced to Layer 3 *on* the PIX, and only Layer2 on the 3550 Pair.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I have will work, but it is sub-optimal.  I should definately be able to reconfigure "block" ACL behavior in the same way I can with generic IOS. &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:41:00 GMT</pubDate>
    <dc:creator>BRIAN SEKLECKI</dc:creator>
    <dc:date>2020-02-21T08:41:00Z</dc:date>
    <item>
      <title>Undesireable "Deny" or "Block" ASA Behavior</title>
      <link>https://community.cisco.com/t5/network-security/undesireable-quot-deny-quot-or-quot-block-quot-asa-behavior/m-p/515198#M427558</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Per my previous post ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[In a full "Nat 0" envrionment with the PIX Functioning as an VLAN ACL Filter]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) When a packet gets blocked by the default ASA policy -- that of a packet with a source in a lower security level traveling to a higher security level interface, you get a "timed out", or no reponse the default behavior of many firewalls "block", "drop", or "deny" rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) If I don't apply an access-list/access-group combination to an "Internal" interface (one defined by a high security level), the implied behavior is an ACL "permit any any" from traffic headed to a destination on a lower interface.  As if an explicity ACL "permit any any" is in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) In that scenario, in order for ICMP (and *ONLY* ICMP traffic) reply traffic&lt;/P&gt;&lt;P&gt;to return back from the lower security level interface at the destionation host,&lt;/P&gt;&lt;P&gt;back to the original sender on the higher level security interface, &lt;/P&gt;&lt;P&gt;I must apply an inbound access-list/&lt;/P&gt;&lt;P&gt;access-group statement matching return traffic.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Is this something to do with ASA's automatic stateful/reflexive nature of TCP&lt;/P&gt;&lt;P&gt;v.s. ICMP's stateless? Other firewalls can keep state on ICMP/UDP/GRE/ESP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) If I apply access-list/access-group combination to the same internal "higher security" interface in an attempt to restrict access from the higher level security interface/subnet to a lower level security interface/subnet, traffic matching "deny" statements will recieve "Connection Refused" ICMP back (TCP Flag RST from the PIX masquarading as the destination), &lt;/P&gt;&lt;P&gt;which is the OpenBSD PF(4) equiv of a "return-rst" argument to a "block", and what&lt;/P&gt;&lt;P&gt;a non-firewalled host will return to an attempt to open a TCP port to a non-listening Service Port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from capture:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;11:03:32.150565 802.1Q vlan#20 P0 192.168.9.2.23 &amp;gt; 192.168.8.2.1096: R 0:0(0) ack 1397346855 win 65535 &amp;lt;mss 1260,nop,nop,sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;106023: Deny tcp src Customer0:192.168.8.2/1099 dst Management:192.168.9.2/23 by access-group "customer0_2_mgmnt"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) This behavior is a bit misleading and normally something that you would be able to fine-tune in many firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Also, because Pix only allows application of access-groups "inbound", I am left with this quagmire:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 11 (interface DMZ, Security0 -- public routable),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 12 (private management, Security15),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 2[X], Where&lt;/P&gt;&lt;P&gt;X = Interface:CustomerX (Security50).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- All customer subnets are isolated by the nature of ASA/Same Security Levels; good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Nat0 applied to all customer interfaces with&lt;/P&gt;&lt;P&gt;  an ACL for *each* matching source that subnet destination the Management subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Granular "inbound" ACLs applied from Customer0 to Management to restrict the&lt;/P&gt;&lt;P&gt;  default ASA behavior, overriding the default "permit any" behavior&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Nat1/PAT from Management to DMZ (Via Interface Address):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   -- nat (Management) 1 access-list MgmntSubnetToNAT 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Now I must design a very convuluted Access-list applied "inbound" to the &lt;/P&gt;&lt;P&gt;  Management interface to permit:&lt;/P&gt;&lt;P&gt;   - ICMP returns to CustomerX interfaces&lt;/P&gt;&lt;P&gt;   - Specific TCP/UDP from Management to CustomerX interfaces&lt;/P&gt;&lt;P&gt;   - Some kind of permit exemption for all traffic from source Management subnet destined&lt;/P&gt;&lt;P&gt;     for a wildcard on DMZ.  Luckily, DMZ is a different subnet/ip block, and Cisco ACLs use a match-first-rule-stop-evaluating logic so I can do something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perhaps I would be better off with a Gigabit enabled router acting as an ACL filter?  If I don't need NAT, Fixups, Like a 26xx or 28xx router?  Something that can take a IPSec enabled IOS image and a VPN acellerator in a WIC port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is, the Supervisor in my 3550 HSRP Pair (or 65xx MSRP) is simply doing default routing from my DMZ to my WAN subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unforunately, I only enable IPs on those two VLANs.  For security, the VLANs I'm ACL'ing on the PIX are only introduced to Layer 3 *on* the PIX, and only Layer2 on the 3550 Pair.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I have will work, but it is sub-optimal.  I should definately be able to reconfigure "block" ACL behavior in the same way I can with generic IOS. &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/undesireable-quot-deny-quot-or-quot-block-quot-asa-behavior/m-p/515198#M427558</guid>
      <dc:creator>BRIAN SEKLECKI</dc:creator>
      <dc:date>2020-02-21T08:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Undesireable "Deny" or "Block" ASA Behavior</title>
      <link>https://community.cisco.com/t5/network-security/undesireable-quot-deny-quot-or-quot-block-quot-asa-behavior/m-p/515199#M427559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not 100% sure what you're asking here so I'll try and just help with your first few statements and hopefully that'll clear things up and maybe make your ACL a bit less convoluted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------&lt;/P&gt;&lt;P&gt;*) In that scenario, in order for ICMP (and *ONLY* ICMP traffic) reply traffic&lt;/P&gt;&lt;P&gt;to return back from the lower security level interface at the destionation host,&lt;/P&gt;&lt;P&gt;back to the original sender on the higher level security interface,&lt;/P&gt;&lt;P&gt;I must apply an inbound access-list/&lt;/P&gt;&lt;P&gt;access-group statement matching return traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) Is this something to do with ASA's automatic stateful/reflexive nature of TCP&lt;/P&gt;&lt;P&gt;v.s. ICMP's stateless? Other firewalls can keep state on ICMP/UDP/GRE/ESP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*) If I apply access-list/access-group combination to the same internal "higher security" interface in an attempt to restrict access from the higher level security interface/subnet to a lower level security interface/subnet, traffic matching "deny" statements will recieve "Connection Refused" ICMP back (TCP Flag RST from the PIX masquarading as the destination),&lt;/P&gt;&lt;P&gt;which is the OpenBSD PF(4) equiv of a "return-rst" argument to a "block", and what&lt;/P&gt;&lt;P&gt;a non-firewalled host will return to an attempt to open a TCP port to a non-listening Service Port. &lt;/P&gt;&lt;P&gt;------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX/ASA does not by default inspect ICMP packets like it does UDP/TCP packets, meaning that it doesn't open a "hole" for the return packets to come back in.  You can of course turn ICMP inspection on meaning the replies to these packet s will be allowed back in just like any other packet.  Look near the bottom of your config for the global service policy and all the "inspect" statements, simply add :&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;inspect icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;into that policy and you will no longer need to worry about ICMP return packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA does reply to inside-interface denied packets with a RST, and this cannot be changed.  On the outside interface it will by default silently discard the packet, but you can get it to send a RST if you like (not recommended) with the use of the "service resetinbound" command (&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/s.htm#wp1099773" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/s.htm#wp1099773&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also note that in v7.0 (which you are running if you're using an ASA), then you can apply access-groups both inbound and outbound now.  See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/ab.htm#wp1409851" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/ab.htm#wp1409851&lt;/A&gt; for details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully all that will make your configuration a bit easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2006 23:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/undesireable-quot-deny-quot-or-quot-block-quot-asa-behavior/m-p/515199#M427559</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2006-01-31T23:54:52Z</dc:date>
    </item>
  </channel>
</rss>

