<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM access-lists in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-access-lists/m-p/1977053#M440503</link>
    <description>&lt;P&gt;On the ASA, an inbound access-list controls traffic coming into an interface, aka ingress traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I have an Internet-facing interface (outside) with security 0, and I wanted to control inbound traffic through this interface to internal hosts (on a dmz perhaps), I would apply the access-list as so&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group TEST in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I am looking at a FWSM config that seems to be doing the opposite. It has a vlan interface defined like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan58&lt;/P&gt;&lt;P&gt; description Network Management VLAN &lt;/P&gt;&lt;P&gt; nameif NetworkMgt&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.100.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and an access-list that reads like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NETWORKMGT-IN remark THESE ACL STATEMENT PERMIT TRAFFIC FROM INSIDE THE SUBNET TO OUTSIDE HOSTS&lt;/P&gt;&lt;P&gt;access-list NETWORKMGT-IN extended permit tcp object-group CITRIX-SERVERS object-group DATABASE-SERVERS eq sqlnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the CITRIX-SERVERS as hosts on Vlan58 (172.100.100.0 /24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the access-list is applied as so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group NETWORKMGT-IN in interface NetworkMgt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what do we mean by "in" --this is obviously egress traffic out of the interface, not traffic coming into the interface from the outside. On the FWSM do we control traffic into a vlan by a outbound access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This just seems strange to me. Any advice would help.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:22:39 GMT</pubDate>
    <dc:creator>Colin Higgins</dc:creator>
    <dc:date>2019-03-11T23:22:39Z</dc:date>
    <item>
      <title>FWSM access-lists</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-access-lists/m-p/1977053#M440503</link>
      <description>&lt;P&gt;On the ASA, an inbound access-list controls traffic coming into an interface, aka ingress traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I have an Internet-facing interface (outside) with security 0, and I wanted to control inbound traffic through this interface to internal hosts (on a dmz perhaps), I would apply the access-list as so&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group TEST in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I am looking at a FWSM config that seems to be doing the opposite. It has a vlan interface defined like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan58&lt;/P&gt;&lt;P&gt; description Network Management VLAN &lt;/P&gt;&lt;P&gt; nameif NetworkMgt&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.100.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and an access-list that reads like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NETWORKMGT-IN remark THESE ACL STATEMENT PERMIT TRAFFIC FROM INSIDE THE SUBNET TO OUTSIDE HOSTS&lt;/P&gt;&lt;P&gt;access-list NETWORKMGT-IN extended permit tcp object-group CITRIX-SERVERS object-group DATABASE-SERVERS eq sqlnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the CITRIX-SERVERS as hosts on Vlan58 (172.100.100.0 /24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the access-list is applied as so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group NETWORKMGT-IN in interface NetworkMgt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what do we mean by "in" --this is obviously egress traffic out of the interface, not traffic coming into the interface from the outside. On the FWSM do we control traffic into a vlan by a outbound access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This just seems strange to me. Any advice would help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-access-lists/m-p/1977053#M440503</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-03-11T23:22:39Z</dc:date>
    </item>
    <item>
      <title>FWSM access-lists</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-access-lists/m-p/1977054#M440504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On FWSM, you need to apply ACL on all interfaces to allow the traffic through the FWSM. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on NetworkMgt interface, you would need to apply ACL for traffic initiated from behind this interface towards other interfaces. Similarly to the Outside interface, you would need to apply ACL for traffic initiated behind the Outside interface (aka Internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"in" means inbound towards the interface&lt;/P&gt;&lt;P&gt;"out" means outbound off that interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 03:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-access-lists/m-p/1977054#M440504</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-26T03:32:16Z</dc:date>
    </item>
  </channel>
</rss>

