<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: stateless filter in ASA5500 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663044#M561932</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Junjie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case, no this is not possible with the ASA alone. If the security policy allows the first SYN packet, a conn will built and added to the ASA's conn table. When the SYN-ACK comes back, the ASA will first check if there is an existing conn that matches the traffic (which there will be). Once it finds a match, it skips over the ACL check and allows the packet through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA's perspective, if the security policy allows the SYN, we would expect the SYN-ACK to be allowed as well (assuming it is legitimate response to the SYN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To do this, you'd need a device which is not stateless, such as a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 May 2011 13:22:36 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-05-24T13:22:36Z</dc:date>
    <item>
      <title>stateless filter in ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663041#M561929</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does ASA 5500 has stateless filter to drop packet even when 3-way handshake is finished&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1: 3-way handshake is done&lt;/P&gt;&lt;P&gt;2:client send data to server&lt;/P&gt;&lt;P&gt;3:I apply a statless filter to the incoming interface to drop the packet from the client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663041#M561929</guid>
      <dc:creator>caojunjie</dc:creator>
      <dc:date>2019-03-11T20:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: stateless filter in ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663042#M561930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Junjie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share some more details on what you're trying to achieve? On what criteria are you trying to drop the packet from the client if you're security policy allows it to complete the 3-way handshake? Something specific in the payload?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, the only way to achieve this on the ASA would be to apply an application-layer inspection engine to the traffic. Of course, this is only possible for known protocols that the ASA has inspection engines for. The full list of these engines can be found here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html#wp1536127"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_overview.html#wp1536127&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 16:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663042#M561930</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-05-23T16:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: stateless filter in ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663043#M561931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,M&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;irober2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;The case I want to achieve is like this&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;In general,firewall works in stateful status,it means it will check the session and ACL to permit or drop a packet,for example&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;client1 ------|untrust-------trust|-------client2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;If client want to visit client2,we only need to permit traffic in one direction,permit source-ip client1 des-ip client2 .When response from client2 to client,firewall will permit this packet due to it is a stateful firewall and record the sesion from client1 to client2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;Now ,due to some test,I wanna do something different&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;syn is permitted &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;client1 ------&amp;gt;|untrust-------trust|-------&amp;gt;client2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;sync/ack should be droped&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;client1 &amp;lt;------or drop here|untrust-------trust|drop here&amp;lt;-------client2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-bidi-language: AR-SA; mso-fareast-language: ZH-CN; : ; mso-bidi-font-family: 'Times New Roman'; sans-serif&amp;quot;: ; mso-ascii-theme-font: minor-latin; mso-bidi-font-size: 11.0pt; color: #000000; font-size: 10.5pt; mso-ansi-language: EN-US; mso-hansi-theme-font: minor-latin; font-family: Calibri; mso-fareast-theme-font: minor-fareast; , &amp;quot;: ; mso-fareast-font-family: 宋体; mso-bidi-theme-font: minor-bidi; Calibri&amp;quot;: ; "&gt;this is what I mean "stateless"&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 02:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663043#M561931</guid>
      <dc:creator>caojunjie</dc:creator>
      <dc:date>2011-05-24T02:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: stateless filter in ASA5500</title>
      <link>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663044#M561932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Junjie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In that case, no this is not possible with the ASA alone. If the security policy allows the first SYN packet, a conn will built and added to the ASA's conn table. When the SYN-ACK comes back, the ASA will first check if there is an existing conn that matches the traffic (which there will be). Once it finds a match, it skips over the ACL check and allows the packet through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA's perspective, if the security policy allows the SYN, we would expect the SYN-ACK to be allowed as well (assuming it is legitimate response to the SYN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To do this, you'd need a device which is not stateless, such as a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 13:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stateless-filter-in-asa5500/m-p/1663044#M561932</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-05-24T13:22:36Z</dc:date>
    </item>
  </channel>
</rss>

