<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow PortScan to Guest Subnets - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628295#M595132</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy New Year to you too...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that you would like the port scanner to scan the guest subnets, however, I don't understand your statement on "without allowing the guest subnet to send any traffic back tothe scanner."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you like to perform a successful port scan or you would actually like to block port scan towards the guest subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why I ask is because ASA is performing a stateful connection, ie: ACL is only required on the direction of where the traffic is initiated from, and the return traffic will be allowed through. So if your port scan is scanning the guest subnets, the return traffic from guest subnets towards the port scan will be allowed through. However, if you don't configure ACL to allow guest subnet to initiate connection to port scan, the guest subnet will not have accessed to initiate connection towards the port scan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Jan 2011 12:10:22 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-06T12:10:22Z</dc:date>
    <item>
      <title>Allow PortScan to Guest Subnets - ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628294#M595126</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy new year &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help me with a quick one. I have a requirement to run a portscanner/discovery node (similar to nessus)&lt;/P&gt;&lt;P&gt;to scan a guest subnet across our ASA.&lt;/P&gt;&lt;P&gt;The guest subnet is allowed outbound internet access only and is restricted to this by a simple ACL inbound on the guest subinterface. (and relevant NAT of course)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny IP (CorporateSubnets)&lt;/P&gt;&lt;P&gt;Allow IP any any&lt;/P&gt;&lt;P&gt;Easy!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to allow this scanner to ping and tcp/udp scan all hosts in the guest subnet without allowing the guest subnet to send any traffic back to&lt;/P&gt;&lt;P&gt;the scanner. Guest subnet is on a lower sec interface. I am thinking a simple ACLas follows outbound on the guest subinterface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow IP (Scanner) Any&lt;/P&gt;&lt;P&gt;Deny IP (CorporateSubnets) ANY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My rational is that the scanner can access all hosts on the guest subnet through this ACL. The inbound ACL prevents access to the corp. subnets and&lt;/P&gt;&lt;P&gt;internet access is not an issue because of the 'Allow IP any any' in the inbound ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking at the MPF for a solution also, but would appreciate anyones help, thoughts, and even realworld experience of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628294#M595126</guid>
      <dc:creator>stephen.stack</dc:creator>
      <dc:date>2019-03-11T19:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allow PortScan to Guest Subnets - ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628295#M595132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Happy New Year to you too...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand that you would like the port scanner to scan the guest subnets, however, I don't understand your statement on "without allowing the guest subnet to send any traffic back tothe scanner."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you like to perform a successful port scan or you would actually like to block port scan towards the guest subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why I ask is because ASA is performing a stateful connection, ie: ACL is only required on the direction of where the traffic is initiated from, and the return traffic will be allowed through. So if your port scan is scanning the guest subnets, the return traffic from guest subnets towards the port scan will be allowed through. However, if you don't configure ACL to allow guest subnet to initiate connection to port scan, the guest subnet will not have accessed to initiate connection towards the port scan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jan 2011 12:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628295#M595132</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-06T12:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allow PortScan to Guest Subnets - ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628296#M595136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply Jennifer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess, by '"without allowing the guest subnet to send any traffic back to the scanner."' i mean that the guest hosts should not be able to initiate 'any' type of connection back to the corporate network. The current config ensures this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to preform a sucessful port scan into the guest subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think, i pretty much understand the statefulness aspect of the firewall, but i had some doubts when reading up on the application inspection element. The port scanner would have to scan all ports, and conduct ICMP sweeps. With an ACL allowing the scanner to scan and sweep in one direction i.e. from it towards the guest subnet&lt;SPAN style="font-family: courier new,courier;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Allow ip [scanner] any --&amp;gt; outbound on the guest subinterface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;will default application inspection allow this, or is there a need to reconfigure application inspection to allow TCP/UDP application inspection to permit a sucessful port scan??? I hope this makes sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More concisely, will default application inspection allow a port scan to complete , completely?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an add-on, if i need to edit inspection to allow the port scan, can i lock it down to a single host?&lt;/P&gt;&lt;P&gt;i.e. TCP/UDP inspection&amp;nbsp; from [scanner] only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe i'm going to far into this, in relation to application inspection, but i'm just not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jan 2011 12:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628296#M595136</guid>
      <dc:creator>stephen.stack</dc:creator>
      <dc:date>2011-01-06T12:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allow PortScan to Guest Subnets - ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628297#M595139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, if the current configuration already ensures that guest subnet can't access port scanner, then it won't be able to initiate connection towards the port scanner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in summary, you have both inbound and outbound ACL applied to all interfaces?&lt;/P&gt;&lt;P&gt;Assuming you have the following:&lt;/P&gt;&lt;P&gt;Port scanner interface: inbound and outbound ACL&lt;/P&gt;&lt;P&gt;Guest interface: inbound and outbound ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow port scanner to scan guest interface, you must have the following:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Inbound ACL&lt;/STRONG&gt;&lt;/SPAN&gt; on &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;port scanner interface&lt;/STRONG&gt;&lt;/SPAN&gt;: access-list &lt;ACL-NAME&gt; permit ip host &lt;PORT-SCANNER-IP&gt; &lt;GUEST-SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/GUEST-SUBNET&gt;&lt;/PORT-SCANNER-IP&gt;&lt;/ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Outbound ACL&lt;/STRONG&gt;&lt;/SPAN&gt; on &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;guest interface&lt;/STRONG&gt;&lt;/SPAN&gt;: needs to have exactly the same configuration as above:&lt;/P&gt;&lt;P&gt;access-list &lt;ACL-NAME&gt; permit ip host &lt;PORT-SCANNER-IP&gt; &lt;GUEST-SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/GUEST-SUBNET&gt;&lt;/PORT-SCANNER-IP&gt;&lt;/ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that outbound ACL on port scanner interface and inbound ACL on guest interface is configured to &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;not &lt;/STRONG&gt;&lt;/SPAN&gt;allow connection from guest network towards port scanner network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further to that, if you configure "IP" that would include ICMP, TCP and UDP protocols.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 03:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628297#M595139</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-07T03:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Allow PortScan to Guest Subnets - ASA</title>
      <link>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628298#M595146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jennifer.&lt;/P&gt;&lt;P&gt; Needed clarity on this and your info helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 09:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-portscan-to-guest-subnets-asa/m-p/1628298#M595146</guid>
      <dc:creator>stephen.stack</dc:creator>
      <dc:date>2011-01-07T09:01:35Z</dc:date>
    </item>
  </channel>
</rss>

