<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic block internet access Cisco asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864090#M6096</link>
    <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;DIV&gt;I'm new to IT security world and Cisco as well.&lt;/DIV&gt;&lt;DIV&gt;I want to block my inside network (servers) to access the outside world (internet) which is allowed by default in factory-default config of asa 5505.&lt;/DIV&gt;&lt;DIV&gt;It is how I get it done:&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;ciscoasa(config)# object network insidenet&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config-network-object)# subnet 192.168.1.0 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config-network-object)# exit&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)# access-list Restrictinsidenet extended deny ip object insidenet any&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)# access-g Restrictinsidenet out interface outside&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;is it ok?&lt;/DIV&gt;&lt;DIV&gt;I will appreciate sharing your ideas with me.&lt;/DIV&gt;&lt;DIV&gt;Thank you so much. Good luck.&lt;/DIV&gt;&lt;DIV&gt;BR/&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:10:33 GMT</pubDate>
    <dc:creator>AliMahm00di</dc:creator>
    <dc:date>2020-02-21T17:10:33Z</dc:date>
    <item>
      <title>block internet access Cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864090#M6096</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;&lt;DIV&gt;I'm new to IT security world and Cisco as well.&lt;/DIV&gt;&lt;DIV&gt;I want to block my inside network (servers) to access the outside world (internet) which is allowed by default in factory-default config of asa 5505.&lt;/DIV&gt;&lt;DIV&gt;It is how I get it done:&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV&gt;ciscoasa(config)# object network insidenet&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config-network-object)# subnet 192.168.1.0 255.255.255.0&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config-network-object)# exit&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)# access-list Restrictinsidenet extended deny ip object insidenet any&lt;/DIV&gt;&lt;DIV&gt;ciscoasa(config)# access-g Restrictinsidenet out interface outside&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;is it ok?&lt;/DIV&gt;&lt;DIV&gt;I will appreciate sharing your ideas with me.&lt;/DIV&gt;&lt;DIV&gt;Thank you so much. Good luck.&lt;/DIV&gt;&lt;DIV&gt;BR/&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864090#M6096</guid>
      <dc:creator>AliMahm00di</dc:creator>
      <dc:date>2020-02-21T17:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: block internet access Cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864112#M6099</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would be better to apply the acl to the inside interface ie. -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group Restrictinsidenet in interface inside&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Jon&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 21:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864112#M6099</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-05-28T21:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: block internet access Cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864222#M6100</link>
      <description>&lt;P&gt;Thanks Jon;&lt;/P&gt;&lt;P&gt;May you please explain why it would be better?&lt;/P&gt;&lt;P&gt;it wouldn't block inside to DMZ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks so much.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 05:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864222#M6100</guid>
      <dc:creator>AliMahm00di</dc:creator>
      <dc:date>2019-05-29T05:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: block internet access Cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864278#M6102</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry, didn't think about a DMZ &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tend to apply acls closest to the source so the firewall does not need to process the packets any more than it has to so I would modify the acl and allow traffic from inside to the DMZ then deny to internet as you have done and apply to the inside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However you can do what you are proposing, there is nothing wrong with that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It comes down to personal preference a lot of the time.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 07:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-internet-access-cisco-asa/m-p/3864278#M6102</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2019-05-29T07:10:10Z</dc:date>
    </item>
  </channel>
</rss>

