<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can ASA do this? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580684#M566015</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, thanks for bringing this up. I hope we clear this doubt for many people.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Feb 2011 00:57:13 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-02-22T00:57:13Z</dc:date>
    <item>
      <title>Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580677#M566008</link>
      <description>&lt;P&gt;I am in the process of converting a customer firewall from Checkpoint over to Cisco ASA&lt;/P&gt;&lt;P&gt;and I am encountering this issue I am not sure if the ASA can solve this issue.&amp;nbsp; The ASA&lt;/P&gt;&lt;P&gt;was sold to the customer by a VAR and that their engineer told the customer that this can&lt;/P&gt;&lt;P&gt;be done but I am not so sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No NAT on the firewall.&amp;nbsp; Everything is routed.&amp;nbsp; I have "permit ip any any log" on all interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The checkpoint firewall has three interfaces, external (eth2), dmz1 (eth0) and dmz2 (eth1).&lt;/P&gt;&lt;P&gt;IP address is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth2:&amp;nbsp; 1.1.2.254/24&amp;nbsp; --- becomes outside on ASA&lt;/P&gt;&lt;P&gt;eth0:&amp;nbsp; 1.1.0.254./24 --- becomes inside on ASA&lt;/P&gt;&lt;P&gt;eth1:&amp;nbsp; 1.1.1.254/24&amp;nbsp; --- becomes dmz on ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a Linux host, X, behind the firewall with two NICs, eth0 and eth1.&amp;nbsp; eth0 is connected to the dmz1&lt;/P&gt;&lt;P&gt;and eth1 is connected to dmz2.&amp;nbsp; The default gateway of host X is 1.1.0.254 (dmz1).&amp;nbsp; IP address of host&lt;/P&gt;&lt;P&gt;X is eth0:&amp;nbsp; 1.1.0.1/24, eth1:&amp;nbsp; 1.1.1.1/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently users on the Internet can access either IP address of 1.1.0.1 or 1.1.1.1 of host X&lt;/P&gt;&lt;P&gt;without any issues if the firewall is Checkpoint.&amp;nbsp; If I replace the Checkpoint firewall with ASA, access&lt;/P&gt;&lt;P&gt;to host X via IP address 1.1.1.1 is no longer available. Only access to host X via IP address 1.1.0.1 is still&lt;/P&gt;&lt;P&gt;available.&amp;nbsp; I also have "permit ip any any log" on outside, inside and dmz interface of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take out the ASA and put the checkpoint firewall back in, access to both 1.1.0.1 and 1.1.1.1 is ok again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can ASA do this?&amp;nbsp; Btw, ASA version is 8.2(1)&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580677#M566008</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2019-03-11T19:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580678#M566009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way I can see this possible would be with TCP state bypass and it would only work for TCP traffic.This is a huge security breach, since the ASA wont be inspecting the traffic over the layer4...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would be converting your ASA into a router with ACL's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Feb 2011 14:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580678#M566009</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-19T14:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580679#M566010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1- The example you provided showed two ASAs.&amp;nbsp; Therefore, will this example work on a single ASA with dual interfaces on the internal?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- While this may be a huge security risk, this is not an issue with Checkpoint firewall since host X interfaces are connected to the same Checkpoint&lt;/P&gt;&lt;P&gt;firewall and because Checkpoint has no concept of security level on the interface, it can handle asymetric route where as the ASA can not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you're telling me is that it is not possible with this setup for the ASA, correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Feb 2011 22:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580679#M566010</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2011-02-19T22:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580680#M566011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security levels dont have anything to do&amp;nbsp; with the asymmetric routing... the problem that the ASA cannot handle it&amp;nbsp; is because he gets lost on the TCP sequence number... therefore, anyone&amp;nbsp; who can guess the next sequence number can introduce a packet and by&amp;nbsp; that doing an attack.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That what I sent you is just an example of how to work with asymmetric routing, you can use it on your example as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#asym"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#asym&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you need help with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Feb 2011 00:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580680#M566011</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-20T00:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580681#M566012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"the problem that the ASA cannot handle it&amp;nbsp; is because he gets lost on the TCP sequence number."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can disable TCP sequence number randomization on the ASA and that will solve this issue right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The example you sent me "&lt;STRONG&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;/STRONG&gt;" has to do with two ASA and based on what I am reading, it does not apply to my situation.&amp;nbsp; Think about it in my scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a host on the internet 5.5.5.5 tries to access ip address 1.1.1.1.&amp;nbsp; The SYN connection will go from outside interface of the ASAto the dmz interface of the ASA and to the host X on interface eth1.&amp;nbsp; The host X then replies with the SYN-ACK from eth1 but the traffics will leave interface eth0 of host X and enter inside interface of the ASA.&amp;nbsp; Now because the ASA keeps track of the connection table, it will not allow the SYN-ACK from entering the inside interface thus the connection will be dropped by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The link you provided above "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b2d922.shtml&lt;/A&gt;&lt;SPAN&gt;", because traffics come in from one ASA and leave another ASA, there is no connection table to keep track therefore the TCP bypass may work but not in my scenario.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's why when I say it does not work in the ASA is because of the security level interface.&amp;nbsp; Traffic flow comes in outside interface, leave inside interface must comes back into the inside and leaving outside interface or it will not work.&amp;nbsp; Checkpoint firewall does not have this issue because it has no concept of security level interface.&amp;nbsp; Checkpoint firewall is nothing but a routing device with security policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Feb 2011 03:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580681#M566012</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2011-02-20T03:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580682#M566013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are totally right. This wont work, the bypass only will work for the same interface only. I did this on a lab and he will have a Routing failed to locate next hop when he gets the SYN-ACK packet on the interface which has the default gateway. He builds the second local host with the real IP on the second interface and the connection will be build with the Bypass flah, however, he will have problems trying to route the packet once it is up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this clarifies your queries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 00:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580682#M566013</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-22T00:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580683#M566014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From what I am seeing so far, this limitation is not only limited to the ASA but only to the ACE as well.&amp;nbsp; It seems like both the ASA and the ACE use very similar code.&amp;nbsp; The ACE behaves exactly the same way as the ASA in my scenario.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 00:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580683#M566014</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2011-02-22T00:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580684#M566015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, thanks for bringing this up. I hope we clear this doubt for many people.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 00:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580684#M566015</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-22T00:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can ASA do this?</title>
      <link>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580685#M566016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco IOS does not suffer from this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Feb 2011 02:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-asa-do-this/m-p/1580685#M566016</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2011-02-22T02:22:48Z</dc:date>
    </item>
  </channel>
</rss>

