<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access-Lists:Removing the veil of ignorance in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758467#M531575</link>
    <description>&lt;P&gt;Good Morning!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been tasked with creating an extended named access-list(s) which blocks unecessary/unused/unneeded destination ports of all traffic going to public IP addresses from any inside IP address (any any eq xxx). I believe the access rule is applied to the outside interface but why? And which traffic direction should be used if any and why? I am using a Cisco ASA5505 8.4(2)/6.4(5) (ASA/ASDM). Once these ACL's are created how does one test them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance is greatly appreciated. Any examples of ALS being applied to an inside interface is even more greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:21:41 GMT</pubDate>
    <dc:creator>Douglas Sensenig</dc:creator>
    <dc:date>2019-03-11T21:21:41Z</dc:date>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758467#M531575</link>
      <description>&lt;P&gt;Good Morning!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been tasked with creating an extended named access-list(s) which blocks unecessary/unused/unneeded destination ports of all traffic going to public IP addresses from any inside IP address (any any eq xxx). I believe the access rule is applied to the outside interface but why? And which traffic direction should be used if any and why? I am using a Cisco ASA5505 8.4(2)/6.4(5) (ASA/ASDM). Once these ACL's are created how does one test them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any guidance is greatly appreciated. Any examples of ALS being applied to an inside interface is even more greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758467#M531575</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2019-03-11T21:21:41Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758468#M531576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Douglas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's what you can do, let suppose for the traffic coming from outside to inside you have the following acl's to allow access to your internal servers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit tcp any host 1.1.1.1 eq 443&lt;/P&gt;&lt;P&gt;access-list test permit tcp any host 1.1.1.1 eq 25&lt;/P&gt;&lt;P&gt;access-list test permit tcp any host 1.1.1.1 eq 21&lt;/P&gt;&lt;P&gt;access-list test permit tcp any host 1.1.1.1 eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you can add a deny acl at the last to drop any traffic which is not allowed by:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and apply it to the outside interface in the 'in' direction&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group test in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the logic is we are applying the test acl to traffic which is coming into the outside interface, hence 'in' keyword.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Similarly for traffic initiated from inside interface to outside, you can apply acl's. Lets assume you just want the hosts in the subnet 10.1.1.0 to access internet and no other host should go to internet, then:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list in_to_out permit ip 10.1.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list in_to_out deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group in_to_out in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it means acl is applied for traffic coming into the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this was helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 15:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758468#M531576</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-07T15:25:38Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758469#M531578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the quick reply. Would there ever be a situation where you would apply the ACL traffic going "out" the inside or outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be easier to make a list of all the allowed ports and deny the rest? Considering I am using ASA software 8.4(5) can I&amp;nbsp; or should I make one object-group of all of the ports I want to keep open or block?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 15:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758469#M531578</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-09-07T15:37:26Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758470#M531580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Douglas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry it was dinner time for me &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use 'out' as well, but I would recommend you to always block traffic closer to the source hence use 'in' acl's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, in fact you should make an object-group of ports to be allowed and deny the rest, this way you are reducing considerable overhead and make the config look good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 17:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758470#M531580</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-07T17:33:19Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758471#M531581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for all your help. Regarding your reply above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;/P&gt;&lt;P&gt;You can use 'out' as well, but I would recommend you to always block traffic closer to the source hence use 'in' acl's.&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I tried applying an ACL (block TCP&amp;amp;UDP port 102) on the inside interface instead of the outside interface, the implicit ALC "Any (inside) to Any less secure networks" changes to "Any to Any with the action Deny". This results in all traffic being blocked. Any suggestions on how to block on the inside interface instead of the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 14:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758471#M531581</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-09-09T14:04:45Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758472#M531582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Doug,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA, higher security to lower is implicitly allowed, but if you apply any ACL on inside interafce then ASA automatically adds a deny ACL at the bottom, which means now every host would need to be defined on the acl to allow internet access, so if the entitre internal lan needs to access internet then you shoudl not apply any acl on isnide interface or use the ACL with any any option. For eg you have two subnets 10.1.1.0 and 10.1.2.0 and you apply acl for first subnet, this means now 2nd subnet would now not e able to access internet. So you would need to add acl for 10.1.2.0 subnet as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 14:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758472#M531582</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-09T14:13:51Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758473#M531583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Evening Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick question regarding block ports on the outside interface. The direction of the traffic flow is from the Inside interface towards the Outside Interface. Which is the correct syntax when applying the access-list to the "outside interface"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface outside&lt;/P&gt;&lt;P&gt;OR &lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for all your help and guidance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 01:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758473#M531583</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-09-12T01:06:19Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758474#M531584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Doug,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question is a bit contradicting, if the direction of traffic is from inside to outside, we would need to apply access-list on inside interface not outside. But what you are trying to say is, if you want to restrict access to intyernal machines for traffic coming from outside internet, then definitely the synatx for access-group would be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this is what you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 04:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758474#M531584</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T04:04:52Z</dc:date>
    </item>
    <item>
      <title>Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758475#M531585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What "in" and "out" can mean depends on the direction of the traffic flow, does it not. I am trying to picture the Inside and Outside Interfaces as the sides of one or two piece of paper. If if one piece of paper, then in my example of traffic flowing from inside to outside, one side of the paper would be in and the other out. Since per your statement above&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;/P&gt;&lt;P&gt;On ASA, higher security to lower is implicitly allowed, &lt;STRONG&gt;but if you apply&amp;nbsp; any ACL on inside interafce then ASA automatically adds a deny ACL at&amp;nbsp; the bottom&lt;/STRONG&gt;, which means now every host would need to be defined on the&amp;nbsp; acl to allow internet access,&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;Then I would use:&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the I should visualize this as two piece of paper, with each interface as a sheet, one side is "in" and one side as "out", then would the syntax be:&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing in my logic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, all responses are greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 10:12:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758475#M531585</guid>
      <dc:creator>Douglas Sensenig</dc:creator>
      <dc:date>2011-09-12T10:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access-Lists:Removing the veil of ignorance</title>
      <link>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758476#M531586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Doug,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do not get confused in the traffic flow, its like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside (ASA) inside&amp;nbsp; &amp;lt;----------------------------------------- "in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is "in", since traffic is coming into the inside interface, so the moment the traffic hits the inside interface , firewall would check the acl.&lt;/P&gt;&lt;P&gt;Second point, by default firewall would not check any acl on inside interface, but lets say out of 10 networks on inside, you just want one network 10.1.1.0 to access internet, and apply the ACL as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now everytime the traffic hits the inside interface it woudl check for an acl, if not found any allow acl, drop the packet. thats what FW would do now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"out"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside (ASA) inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --------------------------------------&amp;gt; "out"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This acl woudl be applied to traffic going out of the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why we prefer in acl is, because it is always advisable to block traffic as close the source as possible, hence your access-group:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;looks good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic that is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would be same as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group BLOCK-PORTS out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But preferred woudl be in interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I was able to clear out your confusion, but if you have any questions do let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 11:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lists-removing-the-veil-of-ignorance/m-p/1758476#M531586</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-12T11:02:31Z</dc:date>
    </item>
  </channel>
</rss>

