<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix basics in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324840#M551393</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Natraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are right... by default the ASA allows everything from inside to outside and denies everything from outside to inside...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no harm leaving the inside interface without any access-list.. all traffic will be passed.. but this might be harmful..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for eg.. lets assume some PC on ur inside netwrok is affected with nachi virus.. it sends icmp ping sweep to the pix which allows the traffic onto the outside router. due to this, the router's link might get choked and the CPU might hit peak.. all these are unnecessary traffic.. If you dont put any access-list all these are allowed... my advice always is to have an access-list on the inside and permit only required traffic.. for eg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;etc etc.. whatever u need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do not include access-list inside permit ip any any here, which will again allow all traffic..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope u got it..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Feb 2005 08:15:17 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2005-02-17T08:15:17Z</dc:date>
    <item>
      <title>pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324837#M551387</link>
      <description>&lt;P&gt;Dear All ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does we require the following  in any case , in a Pix firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this necessary ?? can anybody throw something on this.. thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Nataraj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324837#M551387</guid>
      <dc:creator>nataraj_v</dc:creator>
      <dc:date>2020-02-21T07:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324838#M551389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nooooooo.. there is no use of having a PIX then.. Ip any any, permits all traffic, which will dumb the use of the PIX ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even from inside to outside, by default it is ip any any.. I would always insist everyone to put access restrictions even on inside interface.. Security is really important and we have to follow some guidelines for obtaining maximum security...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 07:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324838#M551389</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-02-17T07:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324839#M551392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Sachin Raja,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanx for the reply , but one doubt , any way pix allows everthing out side and denies everything inside by default. Then y this access-list inside ip any any..r some restrictions on inside ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;nataraj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 08:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324839#M551392</guid>
      <dc:creator>nataraj_v</dc:creator>
      <dc:date>2005-02-17T08:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324840#M551393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Natraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are right... by default the ASA allows everything from inside to outside and denies everything from outside to inside...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no harm leaving the inside interface without any access-list.. all traffic will be passed.. but this might be harmful..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for eg.. lets assume some PC on ur inside netwrok is affected with nachi virus.. it sends icmp ping sweep to the pix which allows the traffic onto the outside router. due to this, the router's link might get choked and the CPU might hit peak.. all these are unnecessary traffic.. If you dont put any access-list all these are allowed... my advice always is to have an access-list on the inside and permit only required traffic.. for eg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;etc etc.. whatever u need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do not include access-list inside permit ip any any here, which will again allow all traffic..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope u got it..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 08:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324840#M551393</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-02-17T08:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324841#M551394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear SachinRaja&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnx , one more doubt on the same issue , so as per ASA having access-list inside ip any any  not required at all. its presence no matter at all..is this rt ?  pls confirm ne this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now in my firewall we already blocked some ports &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq netbios-ssn&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 593&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 5554&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 9996&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq 135&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq netbios-ns&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq netbios-dgm&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq 445&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq 4444&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is our present configuration .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;im having 172.16.0.0 internal lan  and..192.168.0.0 dmz ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so.. now..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service lnt tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port-object eq 80 21 25 443 etc &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp 172.16.0.0 255.255.240.0 any object-group lnt &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this ok ..giving access-list to whole network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnx again 4 ur quic reply.and helpful ans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;nataraj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 09:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324841#M551394</guid>
      <dc:creator>nataraj_v</dc:creator>
      <dc:date>2005-02-17T09:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324842#M551395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey nataraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACLs in PIX work the same as any other ACLs.. If you put a permit ip any any at the last, there is no use of defining access-list inside.. If you dont have it, its an implicit deny after the last ACL line.. it wont allow any other traffic or unnecessary broadcasts to go out of PIX.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope u got it.. rate replies if found useful..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 09:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324842#M551395</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-02-17T09:07:28Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324843#M551396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside deny udp any any eq 4444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;suppose if we have above 2 access list in pix..now my doubt is , if a connection going out on udp port 4444 will be denied at first access-list only ( this is wht im thinking ) as per my knowledge this connection nt at all further process access list . suppose if any other connection comes it is matched by second access-list na so it will be allowed.  is this is rt ? r am i in wrong thinking ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;Nataraj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 09:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324843#M551396</guid>
      <dc:creator>nataraj_v</dc:creator>
      <dc:date>2005-02-17T09:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: pix basics</title>
      <link>https://community.cisco.com/t5/network-security/pix-basics/m-p/324844#M551397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Natraj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are 100 % right.. thats the way it happens...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i was telling you all the while is, you allow all the traffic which really needs to go out of the PIX.. thats it.. all other traffic are denied.. it should be this way.. not the other way around, denying all traffic and giving ip any any at the end, as you suggested...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so, for http,https,ftp etc put a permit as shown in my previous post.. there will be an implicit deny (access-list inside deny ip any any) at the end of the access-list by default.. let all the unnecessary traffic be denied by this ACL and not permitted.. If you need more help, you can always refer to CCO on the usage of the ACLs with PIX.. I donno if I can explian this anymore.. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2005 10:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-basics/m-p/324844#M551397</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-02-17T10:01:29Z</dc:date>
    </item>
  </channel>
</rss>

