<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Allow public VLAN to access internet, no other networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862449#M456717</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets say if all vlans are configured for private IPs ,If you leave NAT untouched for vlans except WI-FI or be more specific to subnets/hosts then only hosts being natted will be allowed to reach internet. Instead of allowing all just allow more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Julio said controlling traffic there is only one way to do it thats called ACL no other way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jan 2012 11:57:31 GMT</pubDate>
    <dc:creator>ajay chauhan</dc:creator>
    <dc:date>2012-01-17T11:57:31Z</dc:date>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862444#M456707</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an easy way to allow our public VLAN to only access the internet, but not the other networks? I think there are two ways to do this:&lt;/P&gt;&lt;P&gt;- Outside is Security Level 0, Public is level 10 and all inside networks are above 10, for example 100.&lt;/P&gt;&lt;P&gt;- Make two ACL's: First a block from all public IP's to all my inside networks IP address and then an allow from the public IP's to any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem of the first rule is that when I add a custom extra rule to block some stuff, the level based firewalling goes away. I don't think I can choose 'to all lower security level networks' anymore in the ASDM after creating a rule.&lt;/P&gt;&lt;P&gt;The problem with the second rule is that it requires extra maintenance: For every new internal network we add, we have to add a rule to the public rule to say this specific network cannot be reached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't there an easier way to make a rule that says 'this network can only access the internet, nothing else' ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ruud van Strijp&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862444#M456707</guid>
      <dc:creator>Ruud van Strijp</dc:creator>
      <dc:date>2019-03-11T22:14:48Z</dc:date>
    </item>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862445#M456708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ruud,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure If I understand on a 100 % your question...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The best would be to see a diagram and then you can describe from each network what would you like to do!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be more than glad to help on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 18:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862445#M456708</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-16T18:57:47Z</dc:date>
    </item>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862446#M456709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. The basic idea is described below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a couple of VLANs that are terminated on the ASA5510, the main ones being:&lt;/P&gt;&lt;P&gt;- Servers&lt;/P&gt;&lt;P&gt;- Test/demo environment&lt;/P&gt;&lt;P&gt;- Clients&lt;/P&gt;&lt;P&gt;- Public Wifi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to make it so that the Public Wifi VLAN can reach the internet on the outside interface, but not any of the other VLANs. I have done this now, by making two firewall rules on the ASA:&lt;/P&gt;&lt;P&gt;1) Block 'VLAN-Public-Wifi' to 'VLAN-Servers , VLAN-Demo, VLAN-Clients'&lt;/P&gt;&lt;P&gt;2) Allow 'VLAN-Public-Wifi' to 'any'&lt;/P&gt;&lt;P&gt;This works, but it's not really practical: If I add another VLAN to the ASA, I will have to add it to rule 1. If I forget to add it to rule 1, the Public Wifi VLAN will be able to reach this newly created VLAN, which of course is a security threat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to make a rule that works and will keep working for all next to-be-added VLANs that are terminated on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ruud van Strijp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 21:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862446#M456709</guid>
      <dc:creator>Ruud van Strijp</dc:creator>
      <dc:date>2012-01-16T21:06:18Z</dc:date>
    </item>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862447#M456712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ruud,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So rules to block some particular traffic on the ASA based on source and destination (ACL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, that is the only way to do it, you will need to add the deny rule on the rule 1..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no dynamic way that you could do it ( automatically made by the asa) You will need to let the ASA knows when to block a VLAN as soon as you add it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2012 21:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862447#M456712</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-16T21:54:07Z</dc:date>
    </item>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862448#M456715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer. So, there is no possibility to make a rule that says 'only allow traffic to the internet', for example 'only allow traffic to interface outside'? Or is there a way to manually make a rule that allows traffic to only go to an interface with a lower security level? By default it does that, but when I manually add another rule I cannot use security levels as filters anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ruud&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 08:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862448#M456715</guid>
      <dc:creator>Ruud van Strijp</dc:creator>
      <dc:date>2012-01-17T08:12:15Z</dc:date>
    </item>
    <item>
      <title>ASA Allow public VLAN to access internet, no other networks</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862449#M456717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lets say if all vlans are configured for private IPs ,If you leave NAT untouched for vlans except WI-FI or be more specific to subnets/hosts then only hosts being natted will be allowed to reach internet. Instead of allowing all just allow more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Julio said controlling traffic there is only one way to do it thats called ACL no other way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2012 11:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-public-vlan-to-access-internet-no-other-networks/m-p/1862449#M456717</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2012-01-17T11:57:31Z</dc:date>
    </item>
  </channel>
</rss>

