<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Permit traffic to inside via MAC - address? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684143#M558299</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was about 99.999% that was the case. But sometimes the gurus out there come up with a way i haven't thought of.&amp;nbsp; I apprecaite your quick response!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Apr 2011 20:08:18 GMT</pubDate>
    <dc:creator>Scott Payne</dc:creator>
    <dc:date>2011-04-07T20:08:18Z</dc:date>
    <item>
      <title>Permit traffic to inside via MAC - address?</title>
      <link>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684141#M558288</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;&lt;P&gt;I have a handheld device that will be used for inventory outside of our office. It has 3g capabilities. Is there anyway I can permit traffic from this device from the outside world coming into my network?&amp;nbsp; I need to open a couple of ports so it can hit the server. But I have no intention to open these ports up to the entire world.&amp;nbsp; I use an ASA 5520 with a managed router from our provider. I looked around on the Cisco site and the only information I found was for permitting and denying traffic from devices that are within the network.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684141#M558288</guid>
      <dc:creator>Scott Payne</dc:creator>
      <dc:date>2019-03-11T20:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Permit traffic to inside via MAC - address?</title>
      <link>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684142#M558295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not possible to do what you are trying to acheive, not because the ASA doesn't support it, but because the way a packet travels in a network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets suppose you have the following topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A------------B(router1)C---------D(router2)E---------F&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A is you mobile and F your server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When A wants to communicate with F, the packet header goes as: IP(A),IP(F),MAC(A),MAC(B)&lt;/P&gt;&lt;P&gt;Then beyond router1: IP(A),IP(F),MAC(C),MAC(D)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAC(A) is already lost, and cannot be used to regulate traffic on the next router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thus the ASA would see most of internet traffic with the source MAC of its next hop gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So one option for you, if the hand held device can do remote access VPN: is to configure the ASA for remote access vpn, and then connect to the ASA in that fashion. So only those who know the username password etc, will be able to have access.&lt;/P&gt;&lt;P&gt;But then, if I am not mistaken, you would need to purchase certain licenses for the ASA to support that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternately, you would have to open the ports to the internet, which as you have mentioned, would let it become accessible by anyone.&lt;/P&gt;&lt;P&gt;However, if you could configure a login mechanism for those services on the server, and per client tcp connection limits (of say 5) on the ASA, then you should be well guarded in my opinion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shrikant&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.: Please mark the question resolved, if it has been answered. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Apr 2011 20:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684142#M558295</guid>
      <dc:creator>Shrikant Sundaresh</dc:creator>
      <dc:date>2011-04-07T20:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Permit traffic to inside via MAC - address?</title>
      <link>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684143#M558299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was about 99.999% that was the case. But sometimes the gurus out there come up with a way i haven't thought of.&amp;nbsp; I apprecaite your quick response!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Apr 2011 20:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/permit-traffic-to-inside-via-mac-address/m-p/1684143#M558299</guid>
      <dc:creator>Scott Payne</dc:creator>
      <dc:date>2011-04-07T20:08:18Z</dc:date>
    </item>
  </channel>
</rss>

