<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650727#M558686</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I allow a subnet on inside network for smtp and pop3 access and deny all other traffic without applying an ACL on inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet : 192.168.100.0/24&lt;/P&gt;&lt;P&gt;allow only traffic SMTP and POP3&lt;/P&gt;&lt;P&gt;Email Service is hosted with ISP&lt;/P&gt;&lt;P&gt;Firewall is ASA 5510 ver 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;vishal&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:15:59 GMT</pubDate>
    <dc:creator>vishal.rane</dc:creator>
    <dc:date>2019-03-11T20:15:59Z</dc:date>
    <item>
      <title>ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650727#M558686</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I allow a subnet on inside network for smtp and pop3 access and deny all other traffic without applying an ACL on inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet : 192.168.100.0/24&lt;/P&gt;&lt;P&gt;allow only traffic SMTP and POP3&lt;/P&gt;&lt;P&gt;Email Service is hosted with ISP&lt;/P&gt;&lt;P&gt;Firewall is ASA 5510 ver 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;vishal&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650727#M558686</guid>
      <dc:creator>vishal.rane</dc:creator>
      <dc:date>2019-03-11T20:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650728#M558687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;vishal.rane wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I allow a subnet on inside network for smtp and pop3 access and deny all other traffic without applying an ACL on inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnet : 192.168.100.0/24&lt;/P&gt;&lt;P&gt;allow only traffic SMTP and POP3&lt;/P&gt;&lt;P&gt;Email Service is hosted with ISP&lt;/P&gt;&lt;P&gt;Firewall is ASA 5510 ver 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;vishal&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vishal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't without a an access-list. If you don't want to apply an acl to the inside interface you could apply an acl outbound on the outside interface but i would recommend using an acl inbound on the inside interface. That is after all what firewalls are for ie. controlling access and the main way ASAs do this is by using acls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The acl would be very straightforward ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_out permit tcp 192.168.100.0 255.255.255.0 host &lt;ISP email-server=""&gt; eq 25&lt;/ISP&gt;&lt;/P&gt;&lt;P&gt;access-list inside_out permit tcp 192.168.100.0 255.255.255.0 host &lt;ISP email="" server=""&gt; eq 110&lt;/ISP&gt;&lt;/P&gt;&lt;P&gt;access-list inside_out deny ip 192.168.100.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list inside_out permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_out in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2011 12:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650728#M558687</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-04-02T12:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650729#M558688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Technical Engineer suggestd to apply ACL with a NAT statement, this would avoid applying ACL on Inside interface.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;nat (inside) 5 access-list 111&lt;BR /&gt; global (outside) 5 interface &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;access-l 111 deny&amp;nbsp; tcp 192.168.100.0 255.255.252.0 any eq 8080&lt;BR /&gt; access-l 111 deny&amp;nbsp; tcp &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;192.168.100.0&lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt; 255.255.252.0 any eq 80&lt;BR /&gt; access-l 111 deny&amp;nbsp; tcp &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;192.168.100.0 &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;255.255.252.0 any eq 443&lt;BR /&gt; access-l 111 permit ip &lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt;192.168.100.0&lt;/SPAN&gt;&lt;SPAN style="color: #333333;"&gt; 255.255.252.0 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Comments&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2011 13:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650729#M558688</guid>
      <dc:creator>vishal.rane</dc:creator>
      <dc:date>2011-04-02T13:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650730#M558689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Policy Nat is a good Approach, the access lists on that example wont get you the access that you want, but the idea is fine. I want you to be aware that this does not eliminate the option that clients can send packets on those ports, but since the IP address where they are coming from is not routable, the packet will be drop in the first ISP router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something else that you need to be aware is that you should take in consideration your other nats, because if there is already a global using the interface keyword, you may need to create the NAT statement with the same ID, and by NAT order of operation, the most specific one (The one with the ACL) should take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2011 14:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650730#M558689</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-04-02T14:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650731#M558690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Mike says this would work but i still don't fully understand why you simply don't use an acl.&amp;nbsp; Think of it like this. If another person ends up mainting the firewall and looks at the config with an acl it is obvious what you want to do. With policy NAT it may achieve the same thing but it won't be that obvious as to why it has been done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is an oblique way to deny access from the inside when you have a perfectly good way to achieve the same thing with an access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that it will stop these clients accessing anything other than what you want, although again as Mike says, not with the config you posted. So my statement saying it can't be done was wrong. Apologies for that. I just don't tend to think of NAT as a control/restriction tool rather an IP preservation tool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Apr 2011 16:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650731#M558690</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-04-02T16:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA question</title>
      <link>https://community.cisco.com/t5/network-security/asa-question/m-p/1650732#M558691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon &amp;amp; Mike thanks.&lt;/P&gt;&lt;P&gt;Jon I am convinced&amp;nbsp; on your reply so gonna apply&amp;nbsp; ACL on inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Apr 2011 05:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-question/m-p/1650732#M558691</guid>
      <dc:creator>vishal.rane</dc:creator>
      <dc:date>2011-04-03T05:25:34Z</dc:date>
    </item>
  </channel>
</rss>

