<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Basic ASA5505 Setup Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814013#M493004</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok I understood but you also need to permit DNS and ICMP.&lt;/P&gt;&lt;P&gt;For ICMP just enable inspection like this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;For other traffic, you can configure an ACL only permitting return traffic and apply inbound on interface outside or configure an ACL only permitting exiting traffic and apply on interface inside inbound.In this case you'll have to permit icmp if you want it to be inspected.&lt;/P&gt;&lt;P&gt;In latter case your ACL should be like this:&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp&amp;nbsp; x.x.x.x.x y.y.y.y any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp&amp;nbsp; x.x.x.x y.y.y.y any eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit udp&amp;nbsp; x.x.x.x y.y.y.y any eq dns&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-group outside_access_out in interface inside&lt;/P&gt;&lt;P&gt;And enable icmp inspection like above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Nov 2011 21:12:46 GMT</pubDate>
    <dc:creator>cadet alain</dc:creator>
    <dc:date>2011-11-16T21:12:46Z</dc:date>
    <item>
      <title>Basic ASA5505 Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814010#M492995</link>
      <description>&lt;P&gt;I have a new 5505 installed to a pretty small network.&amp;nbsp; I have the outside IP/mask/gateway from the provider, and I can see the other end or that connection as well as ping devices out on the internet from the console.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's a good rule of thumb for my inside network to access the internet knowing I only need 80 and 443 open?&amp;nbsp; Meaning can someone provide an ACL example that will do just that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing the following may be a little TOO open:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq www any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq https any eq https&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814010#M492995</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-11T21:52:00Z</dc:date>
    </item>
    <item>
      <title>Basic ASA5505 Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814011#M492997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you want to restrict access from inside to tcp 8O,443 on outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 20:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814011#M492997</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-16T20:30:23Z</dc:date>
    </item>
    <item>
      <title>Basic ASA5505 Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814012#M493002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only thing I want is 80 and 443 open so I can get to http and https from any workstation on the inside, 172.20.10.0 /24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that the correct way of saying it?&amp;nbsp;&amp;nbsp; Essentially completely locked down except for whatever is necessary.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 20:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814012#M493002</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2011-11-16T20:57:00Z</dc:date>
    </item>
    <item>
      <title>Basic ASA5505 Setup Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814013#M493004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok I understood but you also need to permit DNS and ICMP.&lt;/P&gt;&lt;P&gt;For ICMP just enable inspection like this:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;For other traffic, you can configure an ACL only permitting return traffic and apply inbound on interface outside or configure an ACL only permitting exiting traffic and apply on interface inside inbound.In this case you'll have to permit icmp if you want it to be inspected.&lt;/P&gt;&lt;P&gt;In latter case your ACL should be like this:&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp&amp;nbsp; x.x.x.x.x y.y.y.y any eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit tcp&amp;nbsp; x.x.x.x y.y.y.y any eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit udp&amp;nbsp; x.x.x.x y.y.y.y any eq dns&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-group outside_access_out in interface inside&lt;/P&gt;&lt;P&gt;And enable icmp inspection like above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Nov 2011 21:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa5505-setup-question/m-p/1814013#M493004</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-11-16T21:12:46Z</dc:date>
    </item>
  </channel>
</rss>

