<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Implicit Rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822456#M492455</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I put a server on 172.16.16.0/24 interface (172.16.16.1). I activate NAT for this server ==&amp;gt; success, it connects to any website.&lt;/P&gt;&lt;P&gt;But if i try to connect on its 80 port (it's a webserver), although PAT is activated (see conf file) i get a tcp deny access on the ASA.&lt;/P&gt;&lt;P&gt;i'll try sh acces-list tomorrow.&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Nov 2011 17:03:49 GMT</pubDate>
    <dc:creator>moldy7500</dc:creator>
    <dc:date>2011-11-28T17:03:49Z</dc:date>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822444#M492443</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got a Global Implicit Rule problem with my Cisco ASA 5510. Here's my configuration :&lt;/P&gt;&lt;P&gt;&lt;A href="http://hpics.li/17c305d" target="_blank"&gt;http://hpics.li/17c305d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I created a PAT translation so that my web server (group LAN Network) could be accessed from the Internet.&lt;/P&gt;&lt;P&gt;Although every rule seems to be ok, i got a "tcp deny access" when i try to telnet my public IP on port 80 (ping is ok).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is there only one Global Implicit Rule, and not one for each Interface (like in the older versions of ASA OS) ?&lt;/P&gt;&lt;P&gt;Do you think my problem comes from this rule ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx !&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822444#M492443</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2019-03-11T21:55:17Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822445#M492444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Arnaud,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is always an implicit deny when going from lower security interface to higher security interface, on your outside interface, if you don't explicitly allow the traffic, it would always be dropped. On your inside interface, you would find the implicit allow ACL, which means traffic would be permitted without any ACL as well. Can you share the access-list that you have on your outside and the server ip address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Nov 2011 17:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822445#M492444</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-25T17:39:00Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822446#M492445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're right, i forgot to mention that the Outside interface has the lowest security level (0), the DMZ has 50, and the LAN interface has 100.&lt;/P&gt;&lt;P&gt;However, don't you think i explicitly allow traffic from Outside to Inside using this rule (WAN) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAN-Network/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Arnaud&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 08:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822446#M492445</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T08:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822447#M492446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends which version of Os you're using if this is pre-8.3 then you must specify the natted public address and if its 8.3 or further then you maust specify the inside address that is natted.&lt;/P&gt;&lt;P&gt;Apparently you got no hits for this rule so maybe you are in the former case.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 08:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822447#M492446</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-28T08:56:07Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822448#M492447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you.&lt;/P&gt;&lt;P&gt;Here's my conf file :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Result of the command: "sh run"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;: Saved&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ASA Version 8.3(1) &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;hostname ciscoasa&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;enable password uDm2BNQeKvj9OKzj encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nameif WAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; ip address x.x.x.x 255.255.255.240 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nameif LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; ip address 172.16.16.254 255.255.255.0 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nameif DMZ&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; security-level 50&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; ip address 10.0.0.254 255.255.255.0 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; no nameif&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; no security-level&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; no ip address&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Management0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nameif management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; ip address 192.168.1.1 255.255.255.0 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; management-only&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clock timezone CEST 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network redirection_Tse &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; host 172.16.16.1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object service srv_RDP &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; service tcp source eq 3389 destination eq 3389 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network x.x.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; host x.x.x.x&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group protocol TCPUDP&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; protocol-object udp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; protocol-object tcp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object-group service tse tcp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; port-object eq 3389&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list DMZ_access_in extended permit ip any any inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list DMZ_access_in extended permit icmp any any echo-reply inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list WAN_access_in extended permit icmp any any echo-reply inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list WAN_access_in extended permit tcp any interface WAN eq www inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list WAN_access_in extended permit tcp any object redirection_Tse eq www inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list LAN_access_in extended permit tcp any interface LAN eq www inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list LAN_access_in extended permit ip any any inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list LAN_access_in extended permit icmp any any echo-reply inactive &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list global_access extended permit ip any any &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;logging asdm informational&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu WAN 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu LAN 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu DMZ 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;mtu management 1500&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (LAN,WAN) source dynamic any interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (DMZ,WAN) source dynamic any interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network redirection_Tse&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nat (LAN,WAN) static interface service tcp www www &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group WAN_access_in in interface WAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group LAN_access_in in interface LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group DMZ_access_in in interface DMZ&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group global_access global&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route WAN 0.0.0.0 0.0.0.0 x1.x1.x1.x1 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 192.168.1.0 255.255.255.0 management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;http 0.0.0.0 0.0.0.0 LAN&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ipsec security-association lifetime seconds 28800&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ssh timeout 5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics host&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics port&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics protocol&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;no threat-detection statistics tcp-intercept&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;username renault.adm password 8I/4o9tSbGqZ0RHm encrypted&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; parameters&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; message-length maximum client auto&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect ftp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect rsh &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect rtsp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect esmtp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sqlnet &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sunrpc &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect xdmcp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect netbios &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect tftp &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; inspect ip-options &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;prompt hostname context &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Cryptochecksum:8867a21d9945a0e425ecfe54201e18d6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;: end&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;As you can see, i deleted all access rules and only let a global one on all interfaces :&lt;/P&gt;&lt;P&gt;any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here's the result i get :&lt;/P&gt;&lt;P&gt;&lt;A href="http://img707.imageshack.us/img707/1328/sanstitre2bu.jpg"&gt;http://img707.imageshack.us/img707/1328/sanstitre2bu.jpg&lt;/A&gt; &lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" height="1" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 11:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822448#M492447</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T11:01:22Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822449#M492448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list WAN_access_in extended permit icmp any any echo-reply &lt;STRONG&gt;inactive &lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all these lines are inactive so not taken into account so the implicit deny is hit on these ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taken from the configuration guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;You can configure global access rules in&amp;nbsp; conjunction with interface access rules, in which case, the &lt;STRONG&gt;specific&amp;nbsp; interface access rules are always processed before the general global&amp;nbsp; access rules&lt;/STRONG&gt;. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 12:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822449#M492448</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-28T12:33:46Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822450#M492449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes i know that, i inactivated all the rules on purpose, and then i added the global rule (last line of the access list) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list global_access extended permit ip any any &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;so that the firewall permit any connection on any interface.&lt;/P&gt;&lt;P&gt;But it still doesn't work.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 13:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822450#M492449</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T13:07:18Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822451#M492450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No you didn't inactivate all the rules, you're missing the default implicit deny all at the end of each access-list&lt;/P&gt;&lt;P&gt;And as the interface ACL is parsed before the global one then you are dropping your packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 13:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822451#M492450</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-28T13:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822452#M492451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This default implicit "deny all" does not appear in the configuration ?&lt;/P&gt;&lt;P&gt;How should i process then, to allow temporarily every connection ?&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 15:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822452#M492451</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T15:24:45Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822453#M492452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;don't apply the interface ACL to outside&amp;nbsp; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 15:45:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822453#M492452</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-28T15:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822454#M492453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean the Security Level ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a new test configuration :&lt;/P&gt;&lt;P&gt;&lt;A href="http://img408.imageshack.us/img408/568/sanstitre3xmz.jpg"&gt;http://img408.imageshack.us/img408/568/sanstitre3xmz.jpg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;still doesn't work &lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 16:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822454#M492453</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T16:03:41Z</dc:date>
    </item>
    <item>
      <title>Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822455#M492454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;explain what test is failing and what does sh access-list outputs?&lt;/P&gt;&lt;P&gt;You can also do a packet-tracer or capture packets to see where the problem resides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 16:08:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822455#M492454</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-28T16:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: Global Implicit Rule</title>
      <link>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822456#M492455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I put a server on 172.16.16.0/24 interface (172.16.16.1). I activate NAT for this server ==&amp;gt; success, it connects to any website.&lt;/P&gt;&lt;P&gt;But if i try to connect on its 80 port (it's a webserver), although PAT is activated (see conf file) i get a tcp deny access on the ASA.&lt;/P&gt;&lt;P&gt;i'll try sh acces-list tomorrow.&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2011 17:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-implicit-rule/m-p/1822456#M492455</guid>
      <dc:creator>moldy7500</dc:creator>
      <dc:date>2011-11-28T17:03:49Z</dc:date>
    </item>
  </channel>
</rss>

