<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quick ACL question on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717866#M557999</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the response.&amp;nbsp; That was what I thought was going to happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also thanks for reminding me about the access-group.&amp;nbsp; Guess I should wake up a bit more before asking questions!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Apr 2011 12:40:38 GMT</pubDate>
    <dc:creator>galloway13</dc:creator>
    <dc:date>2011-04-13T12:40:38Z</dc:date>
    <item>
      <title>Quick ACL question on ASA</title>
      <link>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717864#M557996</link>
      <description>&lt;P&gt;I think I know the answer to this but just wanted to confirm it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am using an ASA5505, and I have a configuration similar to below, I see that the untrusted interface is only allowed to ftp to 192.168.1.5. Since the trusted interface is not limited to ftp only can it basically run any protocol it wants to 10.20.30.2, or does it get limited to only ftp by the other ACL on returning packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, is the ACL applied to the interface because the ACL's name is the name of the interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gig1/1&lt;/P&gt;&lt;P&gt;nameif trusted&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gig1/2&lt;/P&gt;&lt;P&gt;nameif untrusted&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ipaddress 10.20.30.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list trusted extended permit ip host 192.168.1.5 host 10.20.30.2&lt;/P&gt;&lt;P&gt;access-list untrusted extended permit tcp host 10.20.30.2 host 192.168.1.5 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717864#M557996</guid>
      <dc:creator>galloway13</dc:creator>
      <dc:date>2019-03-11T20:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Quick ACL question on ASA</title>
      <link>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717865#M557998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access-list needs to be applied to an interface. You use the &lt;STRONG&gt;access-group&lt;/STRONG&gt; command to do that.&lt;/P&gt;&lt;P&gt;access-group &lt;ACCESS-LIST name=""&gt; &lt;DIRECTION&gt; interface &lt;INTERFACE name=""&gt;&lt;/INTERFACE&gt;&lt;/DIRECTION&gt;&lt;/ACCESS-LIST&gt;&lt;/P&gt;&lt;P&gt;ex: access-group trusted in interface trusted would apply the "trusted" access-list on the trusted interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For TCP traffic, the replies are allowed without checking the ACL entry. So it is not restricted to only FTP for the trusted side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is, that a connection entry already exists when the initial SYN packet goes from trusted to untrusted.&lt;/P&gt;&lt;P&gt;When return traffic comes, first the connection table is looked up. If a connection entry is not found,&amp;nbsp; then only will the access-list be checked. If the entry is found, then traffic is allowed to go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thus for things like ICMP(which is non-TCP), you need to have "inspect icmp" in the global policy map, else the ICMP replies are denied, since only ftp is allowed from untrusted to trusted access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark the question as answered, if it has been resolved. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2011 12:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717865#M557998</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-13T12:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Quick ACL question on ASA</title>
      <link>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717866#M557999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for the response.&amp;nbsp; That was what I thought was going to happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also thanks for reminding me about the access-group.&amp;nbsp; Guess I should wake up a bit more before asking questions!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2011 12:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quick-acl-question-on-asa/m-p/1717866#M557999</guid>
      <dc:creator>galloway13</dc:creator>
      <dc:date>2011-04-13T12:40:38Z</dc:date>
    </item>
  </channel>
</rss>

