<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX User Downloadable ACL Problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397171#M554632</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Paddy, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So assuming this is a very shortened version of my outside interface ACL.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list permit tcp any host 172.20.12.5 eq 80&lt;/P&gt;&lt;P&gt;access-list permit tcp any host 172.20.96.15 eq 443&lt;/P&gt;&lt;P&gt;&lt;IMPLICIT deny=""&gt;&lt;/IMPLICIT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is my user acl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host 172.20.4.130 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Due to the fact that the specific user acl or a more broad acl does not exist on my interface acl the traffic permitted in my user acl will never work correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all the help,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Nov 2004 22:21:45 GMT</pubDate>
    <dc:creator>tonynt</dc:creator>
    <dc:date>2004-11-22T22:21:45Z</dc:date>
    <item>
      <title>PIX User Downloadable ACL Problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397169#M554630</link>
      <description>&lt;P&gt;I recently opened a TAC case on an issue I was having with user downloadable acl's on a radius server.  I'm using the user acl's on a intranet pix firewall that protects some servers.  We have programmers that need special access to them and I was trying to have the acl's assigned dynamically.  It turns out that TAC said even though I had the ACLs correct and they were being applied to the user, I have to have the same acl permitting traffic on the interface that the incoming traffic is flowing.  This didn't make sense to me due to the fact that my goal was to get rid of the permanent acl's and not have to worry about using source IP addresses.  I could just have the user login via http and he/she gets the acl.  Then eventually the uauth timer activates and removes the ACL thus not leaving a hole on the PIX.  I may totally be missing the purpose of downloadable ACLs so if someone could shed some light on the subject I would appreciate it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  I anyone has a workaround or other solution to the problem I'm having please feel free to post!  Thanks ahead of time!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397169#M554630</guid>
      <dc:creator>tonynt</dc:creator>
      <dc:date>2020-02-21T07:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: PIX User Downloadable ACL Problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397170#M554631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking into this myself at the moment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at this post, it looks as though the information you are being told is correct and infact you use ACLs to restrict access on an allready present interface access-list.  The interface access-list is processed first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd6b50d/2#selected_message" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd6b50d/2#selected_message&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Paddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 20:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397170#M554631</guid>
      <dc:creator>paddyxdoyle</dc:creator>
      <dc:date>2004-11-22T20:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: PIX User Downloadable ACL Problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397171#M554632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Paddy, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So assuming this is a very shortened version of my outside interface ACL.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list permit tcp any host 172.20.12.5 eq 80&lt;/P&gt;&lt;P&gt;access-list permit tcp any host 172.20.96.15 eq 443&lt;/P&gt;&lt;P&gt;&lt;IMPLICIT deny=""&gt;&lt;/IMPLICIT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is my user acl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host 172.20.4.130 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Due to the fact that the specific user acl or a more broad acl does not exist on my interface acl the traffic permitted in my user acl will never work correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all the help,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 22:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397171#M554632</guid>
      <dc:creator>tonynt</dc:creator>
      <dc:date>2004-11-22T22:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX User Downloadable ACL Problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397172#M554633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For authentication and downloadable ACL's to work you need two ACL's on the PIX, the interface ACL and the authentication ACL. You can think of the interface ACL as a trigger for the authentication ACL in that it must allow traffic through to trigger the authentication. It must also permit the same traffic as the auth acl which means it is sometimes easier to make the interface acl more permissive and the auth acl more restrictive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. if you have users on 192.168.1.0 /24 on the inside interface and you want to authenticate them to allow terminal services access you could if you want configure the inside access list to permit all traffic from 192.168.1.0 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! inside auth trigger for 192.168.1.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but deny all in the authentication acl meaning all traffic required authentication/authorisation first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! authentication for 192.168.1.0&lt;/P&gt;&lt;P&gt;! don't authenticate DNS and ICMP&lt;/P&gt;&lt;P&gt;access-list inside_authentication deny udp 192.168.1.0 255.255.255.0 any eq 53&lt;/P&gt;&lt;P&gt;access-list inside_authentication deny icmp 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;! authenticate everything else.&lt;/P&gt;&lt;P&gt;access-list inside_authentication permit ip 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!apply access lists&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;aaa authentication match inside_authentication inside RADIUS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ACS/RADIUS ACL would them be configured to&lt;/P&gt;&lt;P&gt;! term serv&lt;/P&gt;&lt;P&gt;permit tcp 192.168.1.0 255.255.255.0 any eq 3389&lt;/P&gt;&lt;P&gt;! http&lt;/P&gt;&lt;P&gt;permit tcp 192.168.1.0 255.255.255.0 any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would provide term serv and http access to an authenticated user. Your logs would show authorization denied for all other access from that user after authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2004 16:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397172#M554633</guid>
      <dc:creator>d-g-c</dc:creator>
      <dc:date>2004-11-24T16:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: PIX User Downloadable ACL Problems</title>
      <link>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397173#M554634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey d-g-c,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That helped greatly.  Thanks for your time!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2004 21:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-user-downloadable-acl-problems/m-p/397173#M554634</guid>
      <dc:creator>tonynt</dc:creator>
      <dc:date>2004-11-24T21:42:22Z</dc:date>
    </item>
  </channel>
</rss>

