<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL to allow everything with a ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521393#M579389</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the double post, trouble with the cisco forums...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Nov 2010 12:20:20 GMT</pubDate>
    <dc:creator>oncpicsu2010</dc:creator>
    <dc:date>2010-11-26T12:20:20Z</dc:date>
    <item>
      <title>ACL to allow everything with a ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521389#M579368</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure our ASA 5510. For now we just want to replace our old PIX with the ASA, security will come later.&lt;/P&gt;&lt;P&gt;This is why I just want to allow everything to go through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use two interfaces on the ASA, 0 is the outside interface, where we will connect the cable from our ISP, and 1 is the inside interface, where we will connect our switch. I have enabled intra-interfaces communications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our topology is like this: we have a PIX in front, a pool of public IPs that we NAT to servers behind the PIX. I have used the ASDM to configure the NAT, I got this configuration:&lt;/P&gt;&lt;P&gt;object network web1_ext &lt;BR /&gt; host 194.206.163.34&lt;BR /&gt;object network web2_ext &lt;BR /&gt; host 194.206.163.35&lt;BR /&gt;object network web3_ext &lt;BR /&gt; host 194.206.163.36&lt;/P&gt;&lt;P&gt;object network web1_int &lt;BR /&gt; host 192.168.192.34&lt;BR /&gt;object network web2_int &lt;BR /&gt; host 192.168.192.35&lt;BR /&gt;object network web3_int &lt;BR /&gt; host 192.168.192.36&lt;/P&gt;&lt;P&gt;object network web1_ext&lt;BR /&gt;&amp;nbsp; nat (any,any) static web1_int&lt;BR /&gt;object network web2_ext&lt;BR /&gt; nat (any,any) static web2_int&lt;BR /&gt;object network web3_ext&lt;BR /&gt; nat (any,any) static web3_int&lt;/P&gt;&lt;P&gt;object network web1_int&lt;BR /&gt; nat (any,any) static web1_ext&lt;BR /&gt;object network web2_int&lt;BR /&gt; nat (any,any) static web2_ext&lt;BR /&gt;object network web3_int&lt;BR /&gt; nat (any,any) static web3_ext&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, I added some access rules via the ASDM, on both interfaces (inside and outside), and on global, with source any, destination any, service ip.&lt;/P&gt;&lt;P&gt;The rules were:&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any&lt;/P&gt;&lt;P&gt;And:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I expected this to let all the traffic through the ASA, but it didn't work. I checked the command reference for access-list extended, there is this example:&lt;/P&gt;&lt;P&gt;hostname(config)# access-list ACL_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The description of the example says: "The following access list allows all hosts (on the interface to which you apply the access list) to go&lt;BR /&gt;through the adaptive security appliance"&lt;/P&gt;&lt;P&gt;I'm not a native english speaker, but I understand that this would do what I want. So what is the problem with the two rules above ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I changed the rules, using the All object-group, with allows any port on TCP-UDP, and added a rule for ICMP, which works for me, but I'd still like to know what is wrong with my rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521389#M579368</guid>
      <dc:creator>oncpicsu2010</dc:creator>
      <dc:date>2019-03-11T19:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: ACL to allow everything with a ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521390#M579376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;I have enabled intra-interfaces communications&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;What do you mean by that? By default communication from inside to outside is permitted because you're going from a high security level to a lower one&lt;/P&gt;&lt;P&gt;and furthermore if the os is recent you don't even need to nat to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this is enough for communication if only hosts from inside initiate connections to outside.&lt;/P&gt;&lt;PRE class="jive_text_macro jive_macro_quote"&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-group outside_access_in in interface outside
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your nat statements are quite weird because when we nat it's from an interface to anotherlike in to out or out to in but never saw any to any and furthermore you must state that web1ext is an object-group and also in your nat you must have the 2 IPs each time which is not the case in what you posted.&lt;/P&gt;&lt;P&gt; Can you console in and enter these commands:&lt;/P&gt;&lt;P&gt;-show run interface&lt;/P&gt;&lt;P&gt;-show run nat&lt;/P&gt;&lt;P&gt;-show access-list&lt;/P&gt;&lt;P&gt;and post the ouput here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 11:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521390#M579376</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-26T11:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACL to allow everything with a ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521391#M579383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I must confess I was a little blown away by this 8.3 config style and&amp;nbsp; i meesed up with pre 8.3 but anyway concerning the ACL you can consider what I said right and for your static nat you take a look at the examples given in the nat tutorial for 8.3 here and you will find your luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 12:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521391#M579383</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2010-11-26T12:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACL to allow everything with a ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521392#M579387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;What do you mean by that? By default communication from inside to 
outside is permitted because you're going from a high security level to a
 lower one&lt;/P&gt;&lt;P&gt;and furthermore if the os is recent you don't even need to nat to communicate.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, I didn't change the security levels of my interfaces, so I allowed in ASDM the communication between two interfaces of same security levels.&lt;/P&gt;&lt;P&gt;I guess I could change the security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;So this is enough for communication if only hosts from inside initiate connections to outside.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand that. Do you mean the rules I posted allow only connections initiated by the inside ?&lt;/P&gt;&lt;P&gt;What I want to do, is allow everything, regardless of which hosts initiated the connection. It would be like there is no firewall, but I'm planning to add restricting rules later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding my NAT statements, well I used only ASDM to do that. I added my hosts in Network Objects window, and activated the NAT options in the dialog when you add the object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what you asked.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 194.74.163.33 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.74.192.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network bub1_ext&lt;BR /&gt; nat (any,any) static bub1_int&lt;BR /&gt;object network bub2_ext&lt;BR /&gt; nat (any,any) static bub2_int&lt;BR /&gt;object network bub3_ext&lt;BR /&gt; nat (any,any) static bub3_int&lt;BR /&gt;object network bub4_ext&lt;BR /&gt; nat (any,any) static bub4_int&lt;BR /&gt;object network internet_ext&lt;BR /&gt; nat (any,any) static internet_int&lt;BR /&gt;object network locaware_ext&lt;BR /&gt; nat (any,any) static locaware_int&lt;BR /&gt;object network mail_ext&lt;BR /&gt; nat (any,any) static mail_int&lt;BR /&gt;object network ns1_ext&lt;BR /&gt; nat (any,any) static ns1_int&lt;BR /&gt;object network ns2_ext&lt;BR /&gt; nat (any,any) static ns2_int&lt;BR /&gt;object network thor_ext&lt;BR /&gt; nat (any,any) static thor_int&lt;BR /&gt;object network web1_ext&lt;BR /&gt; nat (any,any) static web1_int&lt;BR /&gt;object network web2_ext&lt;BR /&gt; nat (any,any) static web2_int&lt;BR /&gt;object network web3_ext&lt;BR /&gt; nat (any,any) static web3_int&lt;BR /&gt;object network bub1_int&lt;BR /&gt; nat (any,any) static bub1_ext&lt;BR /&gt;object network bub2_int&lt;BR /&gt; nat (any,any) static bub2_ext&lt;BR /&gt;object network bub3_int&lt;BR /&gt; nat (any,any) static bub3_ext&lt;BR /&gt;object network bub4_int&lt;BR /&gt; nat (any,any) static bub4_ext&lt;BR /&gt;object network internet_int&lt;BR /&gt; nat (any,any) static internet_ext&lt;BR /&gt;object network locaware_int&lt;BR /&gt; nat (any,any) static locaware_ext&lt;BR /&gt;object network mail_int&lt;BR /&gt; nat (any,any) static mail_ext&lt;BR /&gt;object network ns1_int&lt;BR /&gt; nat (any,any) static ns1_ext&lt;BR /&gt;object network ns2_int&lt;BR /&gt; nat (any,any) static ns2_ext&lt;BR /&gt;object network thor_int&lt;BR /&gt; nat (any,any) static thor_ext&lt;BR /&gt;object network web1_int&lt;BR /&gt; nat (any,any) static web1_ext&lt;BR /&gt;object network web2_int&lt;BR /&gt; nat (any,any) static web2_ext&lt;BR /&gt;object network web3_int&lt;BR /&gt; nat (any,any) static web3_ext&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show access-list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list inside_access_in; 1 elements; name hash: 0x433a1af1&lt;BR /&gt;access-list inside_access_in line 2 extended permit ip any any log debugging interval 300 (hitcnt=0) 0xa925365e &lt;BR /&gt;access-list outside_access_in; 27 elements; name hash: 0x6892a938&lt;BR /&gt;access-list outside_access_in line 2 extended permit ip object-group trusted_ips any 0x60b9db6e &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 2 extended permit ip host 82.244.195.239 any (hitcnt=0) 0x6f5801d1 &lt;BR /&gt;access-list outside_access_in line 4 extended permit tcp any object-group http_servers_ext eq www 0x34e96a48 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.60 eq www (hitcnt=0) 0xc758b984 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.61 eq www (hitcnt=0) 0xc4e12358 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.59 eq www (hitcnt=0) 0x21310377 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.58 eq www (hitcnt=0) 0x27fe81d3 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.34 eq www (hitcnt=0) 0xdc352f9e &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.35 eq www (hitcnt=0) 0xff9a2f82 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.36 eq www (hitcnt=0) 0xc411a7a3 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.40 eq www (hitcnt=0) 0x33d7f4fd &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 4 extended permit tcp any host 194.74.163.41 eq www (hitcnt=0) 0xfc7cb67d &lt;BR /&gt;access-list outside_access_in line 6 extended permit tcp any object-group https_servers_ext eq https 0xf55bdd4f &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 6 extended permit tcp any host 194.74.163.58 eq https (hitcnt=0) 0x5396a940 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 6 extended permit tcp any host 194.74.163.41 eq https (hitcnt=0) 0xf1b25ffd &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 6 extended permit tcp any host 194.74.163.35 eq https (hitcnt=0) 0x579e7ef8 &lt;BR /&gt;access-list outside_access_in line 8 extended permit tcp any object bub2_ext object-group DM_INLINE_TCP_1 0x172ce7b1 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 8 extended permit tcp any host 194.74.163.61 eq 7654 (hitcnt=0) 0xa19f2e71 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 8 extended permit tcp any host 194.74.163.61 eq 8765 (hitcnt=0) 0x92a5ae82 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 8 extended permit tcp any host 194.74.163.61 eq 9876 (hitcnt=0) 0x342a8f87 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 8 extended permit tcp any host 194.74.163.61 eq ssh (hitcnt=0) 0xd4d7173f &lt;BR /&gt;access-list outside_access_in line 10 extended permit icmp object-group trusted_ips any 0x50f0b045 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 10 extended permit icmp host 82.244.195.239 any (hitcnt=0) 0xdf59191e &lt;BR /&gt;access-list outside_access_in line 12 extended permit object-group TCPUDP any object-group dns_strascom_ext eq domain 0x5f4812cf &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 12 extended permit udp any host 194.74.163.38 eq domain (hitcnt=0) 0xa8fc33eb &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 12 extended permit udp any host 194.74.163.39 eq domain (hitcnt=0) 0x812e3df4 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 12 extended permit tcp any host 194.74.163.38 eq domain (hitcnt=0) 0x357a7dfd &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 12 extended permit tcp any host 194.74.163.39 eq domain (hitcnt=0) 0x567bb051 &lt;BR /&gt;access-list outside_access_in line 14 extended permit ip object inside_network any 0xdda3ff0c &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 14 extended permit ip 192.168.192.0 255.255.255.0 any (hitcnt=0) 0xdda3ff0c &lt;BR /&gt;access-list outside_access_in line 16 extended permit tcp any object-group smtp_servers_ext eq smtp 0x9343c173 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 16 extended permit tcp any host 194.74.163.40 eq smtp (hitcnt=0) 0x879200fb &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 16 extended permit tcp any host 194.74.163.55 eq smtp (hitcnt=0) 0xe81706ee &lt;BR /&gt;access-list outside_access_in line 18 extended permit tcp any object-group pop3_servers_ext eq pop3 0x45f22ee7 &lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 18 extended permit tcp any host 194.74.163.55 eq pop3 (hitcnt=0) 0xe2e30f21 &lt;BR /&gt;access-list outside_access_in line 19 extended permit ip any any log debugging interval 300 (hitcnt=0) 0x7e78c5c4 &lt;BR /&gt;access-list global_access; 1 elements; name hash: 0xbd6c87a7&lt;BR /&gt;access-list global_access line 1 extended permit ip any any (hitcnt=0) 0x7b3c7918&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, while I was saving those config, I tested again using the "ip" service in ASDM, and now it works. I don't really understand why it didn't work in the first place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 12:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521392#M579387</guid>
      <dc:creator>oncpicsu2010</dc:creator>
      <dc:date>2010-11-26T12:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: ACL to allow everything with a ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521393#M579389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the double post, trouble with the cisco forums...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Nov 2010 12:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-to-allow-everything-with-a-asa-5510/m-p/1521393#M579389</guid>
      <dc:creator>oncpicsu2010</dc:creator>
      <dc:date>2010-11-26T12:20:20Z</dc:date>
    </item>
  </channel>
</rss>

