<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX -- Filtering outbound traffic? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629024#M558880</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gavin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have both inbound and outbound ACLs applied to the same interface. In most scenarios though, inbound ACLs are enough to acheive what you want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 31 Mar 2011 12:08:22 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-03-31T12:08:22Z</dc:date>
    <item>
      <title>PIX -- Filtering outbound traffic?</title>
      <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629020#M558866</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to filter some outbound traffic but becoming confused!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; I have a network on the DMZ interface, eg 192.168.1.0/24, by default&amp;nbsp; the implicit rules allow all traffic on this network to the outside&amp;nbsp; interface but deny access to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I want to block an address in the DMZ from outside access I can use....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list inside_access_in extended deny ip host 192.168.1.38 any&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.........but this overrides the implicit rule that allows&amp;nbsp; all traffic to the outside (lower security) interface and now all&amp;nbsp; traffic is blocked.&lt;/P&gt;&lt;P&gt;If I add...........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list inside_access_in extended permit ip host any any&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;.........now I am blocking only the one IP address but I have&amp;nbsp; overridden the 'deny any any' rule that stops traffic flowing to a&amp;nbsp; higher security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I block a single address or subnet from the DMZ to the outside without permitting DMZ access to the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629020#M558866</guid>
      <dc:creator>gavinfoster</dc:creator>
      <dc:date>2019-03-11T20:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX -- Filtering outbound traffic?</title>
      <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629021#M558868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gavin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simplest way to do this is to put an explicit deny statement with a destination of your inside subnet inbound on the DMZ interface. For example, if your inside subnet is 192.168.0.0/24, the ACL on the DMZ interface would look like this:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list dmz_access_in deny ip host 192.168.1.38 any&lt;BR /&gt;access-list dmz_access_in deny ip any 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list dmz_access_in permit ip any any&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;The above ACL would prevent 192.168.1.38 from getting to the outside, stop all hosts from accessing the inside subnet, and still allow all remaining access to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also do it using an outbound ACL on the inside interface, but this is much less commonly used. The ACL would look like this, which would deny any traffic from leaving the ASA on the inside interface that was sourced from a DMZ host, but allow all other traffic:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list inside_access_out deny ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list inside_access_out permit ip any any&lt;BR /&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More information about the ACL configurations can be found here:&lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/traffic.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/traffic.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 16:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629021#M558868</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-30T16:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX -- Filtering outbound traffic?</title>
      <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629022#M558870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Removing duplicate post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mirober2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 16:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629022#M558870</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-30T16:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX -- Filtering outbound traffic?</title>
      <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629023#M558872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It all makes perfect sense when someone else says it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found it confusing that once I had added my own ACL the implicit rules are overridden and in order to keep traffic flowing I had to add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which seems contradictory to the implicit rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outbound acl is interesting, must admit I have never seen that before. Can you still only have one acl per interface, either inbound or outbound or can you have one of each?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gavin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Mar 2011 10:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629023#M558872</guid>
      <dc:creator>gavinfoster</dc:creator>
      <dc:date>2011-03-31T10:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: PIX -- Filtering outbound traffic?</title>
      <link>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629024#M558880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gavin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have both inbound and outbound ACLs applied to the same interface. In most scenarios though, inbound ACLs are enough to acheive what you want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Mar 2011 12:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-filtering-outbound-traffic/m-p/1629024#M558880</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-03-31T12:08:22Z</dc:date>
    </item>
  </channel>
</rss>

