<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Rule for Allowing Computer Access Microsoft in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911240#M438028</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Par13,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yo do not need to allow anything as you are already allowing everything from inside to oustide:&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inside_access_out extended permit ip any any&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;That line allows everything that is innitiated from the inside interface of the ASA, the returning traffic that matches a connection already established from that inside host will be allowed by default ( Stateful inspection aplied by the ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;Do&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; rate all the &lt;STRONG&gt;&lt;EM style="text-decoration: underline; "&gt;helpful&lt;/EM&gt;&lt;/STRONG&gt; posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Apr 2012 17:15:19 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-04-25T17:15:19Z</dc:date>
    <item>
      <title>Rule for Allowing Computer Access Microsoft</title>
      <link>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911239#M438027</link>
      <description>&lt;P&gt;I have a computer behind the ASA 5505 firewall. The computer needs to access Microsoft Activation Server. Reading some website information, I need to allow a huge list of servers that basically points to www and https traffic. Therefore, looking at this heavy requirements, I prefer to allow this computer to navigate to any https or http (www) server outside of the firewall. Below, I have included my current asa 5505 configuration. can you please tell me what needs to be added or so?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.2.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 170.18.18.132 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner motd&lt;/P&gt;&lt;P&gt;banner motd +......................-+&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | *** Unauthorized Use or Access Prohibited *** |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;banner motd | For Authorized Official Use Only |&lt;/P&gt;&lt;P&gt;banner motd | You must have explicit permission to access or |&lt;/P&gt;&lt;P&gt;banner motd | configure this device. All activities performed |&lt;/P&gt;&lt;P&gt;banner motd | on this device may be logged, and violations of |&lt;/P&gt;&lt;P&gt;banner motd | this policy may result in disciplinary action, and |&lt;/P&gt;&lt;P&gt;banner motd | may be reported to law enforcement authorities. |&lt;/P&gt;&lt;P&gt;banner motd | |&lt;/P&gt;&lt;P&gt;boot system disk0:/asa724-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;object-group network obj_any&lt;/P&gt;&lt;P&gt;object-group network microsoft-servers&lt;/P&gt;&lt;P&gt;network-object host 207.46.21.123&lt;/P&gt;&lt;P&gt;network-object host 4.26.252.126&lt;/P&gt;&lt;P&gt;network-object host 8.26.205.253&lt;/P&gt;&lt;P&gt;network-object host 8.27.149.126&lt;/P&gt;&lt;P&gt;network-object host 65.55.58.195&lt;/P&gt;&lt;P&gt;network-object host 94.245.126.107&lt;/P&gt;&lt;P&gt;network-object host 192.70.222.41&lt;/P&gt;&lt;P&gt;network-object host 192.70.222.59&lt;/P&gt;&lt;P&gt;network-object host 157.55.44.71&lt;/P&gt;&lt;P&gt;network-object host 118.108.3.84&lt;/P&gt;&lt;P&gt;network-object host 207.46.131.43&lt;/P&gt;&lt;P&gt;network-object host 207.46.19.190&lt;/P&gt;&lt;P&gt;network-object host 143.127.102.40&lt;/P&gt;&lt;P&gt;network-object host 72.14.204.101&lt;/P&gt;&lt;P&gt;network-object host 64.208.186.114&lt;/P&gt;&lt;P&gt;object-group network other_servers&lt;/P&gt;&lt;P&gt;network-object 118.108.62.236 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip object-group psu-servers any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 10.2.1.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 10.2.1.0 255.255.255.0 any eq https&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp any object-group epay_servers eq https&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any object-group psu-servers&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip audit name insidepolicy info action&lt;/P&gt;&lt;P&gt;ip audit name outsidepolicy info action&lt;/P&gt;&lt;P&gt;ip audit interface inside insidepolicy&lt;/P&gt;&lt;P&gt;ip audit interface outside outsidepolicy&lt;/P&gt;&lt;P&gt;ip audit info action&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any echo-reply outside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-523.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 170.18.18.133 10.2.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 170.18.18.129 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.2.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.2.1.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;ssh 170.18.18.132 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.2.1.2-10.2.1.254 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911239#M438027</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2019-03-11T22:58:17Z</dc:date>
    </item>
    <item>
      <title>Rule for Allowing Computer Access Microsoft</title>
      <link>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911240#M438028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Par13,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yo do not need to allow anything as you are already allowing everything from inside to oustide:&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inside_access_out extended permit ip any any&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;That line allows everything that is innitiated from the inside interface of the ASA, the returning traffic that matches a connection already established from that inside host will be allowed by default ( Stateful inspection aplied by the ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;Do&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt; rate all the &lt;STRONG&gt;&lt;EM style="text-decoration: underline; "&gt;helpful&lt;/EM&gt;&lt;/STRONG&gt; posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 17:15:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911240#M438028</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-04-25T17:15:19Z</dc:date>
    </item>
    <item>
      <title>Rule for Allowing Computer Access Microsoft</title>
      <link>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911241#M438030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the fast reply. But, as it is now, the computer behind the firewall is not able to connect to&amp;nbsp; &lt;A href="http://www.microsoft.com"&gt;www.microsoft.com&lt;/A&gt; or to get windows updates, and or to activate windows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I think there is got to be something stopping from allowing this computer to connect to the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 18:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911241#M438030</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2012-04-25T18:01:20Z</dc:date>
    </item>
    <item>
      <title>Rule for Allowing Computer Access Microsoft</title>
      <link>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911242#M438033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need to make captures in order to see if the packets are reaching the ASA, if they are going to Microsoft and then if Microsoft replies back to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2012 18:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-for-allowing-computer-access-microsoft/m-p/1911242#M438033</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-04-25T18:22:44Z</dc:date>
    </item>
  </channel>
</rss>

