<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ensure NetBios traffic is not permitted to leave our network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3852013#M6193</link>
    <description>&lt;P&gt;Like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282553"&gt;@johnd2310&lt;/a&gt;&amp;nbsp;said, we deny traffic incoming on the inside interface. That drops it as soon as it is received by the ASA and keeps it from being processed further (thus no need for an outbound ACL entry).&lt;/P&gt;
&lt;P&gt;So add a new rule before the current line 1. Best is to create a service object group when building the rule to equal NetBIOS (tcp/445 and tcp/139). To do that, note that the GUI allows you to "add new group" when specifying the destination port(s)/service(s).&lt;/P&gt;
&lt;P&gt;Also ensure you haven't allowed the traffic inbound from the Internet. That is the more high risk threat by far. I have seen customers allow all ports to a given Windows server thus exposing it to exploits and, by extension, compromising their entire internal network. Once you can "own" a given server from the outside you can usually use it to springboard to other resources.&lt;/P&gt;</description>
    <pubDate>Wed, 08 May 2019 02:11:58 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-05-08T02:11:58Z</dc:date>
    <item>
      <title>Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851121#M6187</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been asked to verify that NetBios traffic is not able to leave our network; specifically ports 445 and 139. My basic understanding makes me think that is the case but I'm not sure how to verify that. We are using ASA5525's in a HA configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The request is to make sure NetBios traffic is blocked from leaving our network. Is that not already the default?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851121#M6187</guid>
      <dc:creator>krubb</dc:creator>
      <dc:date>2020-02-21T17:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851189#M6188</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configure an access list on the firewall and you will be sure the traffic is not leaving the network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 01:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851189#M6188</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2019-05-07T01:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851204#M6189</link>
      <description>&lt;P&gt;By default all traffic is allowed to transit from a higher security level (inside) to a lower security level (outside).&lt;/P&gt;
&lt;P&gt;If there is an ACL applied to the inside interface, an implicit deny is then used for any traffic not specified.&lt;/P&gt;
&lt;P&gt;You can always check an ASA firewall's handling of a given traffic flow using the packet tracer utility. for example:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input inside tcp &amp;lt;some inside address&amp;gt; 1025 &amp;lt;any outside address - e.g. 8.8.8.8&amp;gt; 445&lt;/PRE&gt;
&lt;P&gt;...will check if tcp/445 is allowed outbound.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 02:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851204#M6189</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-05-07T02:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851534#M6190</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did the packet tracing and that traffic is certainly able to get out of our network. I started looking at creating an ACL to block Netbios but I'm struggling to figure that out. I'm not a CLI wizard by any stretch and mostly work from within the ASDM. When I go to ACL Manager I can create a new ACL but I don't see where I configure that ACL. All I can do is name it. Thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 13:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851534#M6190</guid>
      <dc:creator>krubb</dc:creator>
      <dc:date>2019-05-07T13:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851563#M6191</link>
      <description>&lt;P&gt;Just for understanding, this is a screen grab of my Firewall --&amp;gt; Access Rules. There are 2 rules, each allowing ANY/ANY. However, this ACL is labeled as "Incoming". Shouldn't I be seeing "Outgoing" somewhere?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL_Incoming.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/36301iA3D3B08B2DFBE552/image-size/large?v=v2&amp;amp;px=999" role="button" title="ACL_Incoming.PNG" alt="ACL_Incoming.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 13:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851563#M6191</guid>
      <dc:creator>krubb</dc:creator>
      <dc:date>2019-05-07T13:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851994#M6192</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Incoming is correct. You need to deny the traffic inbound on the Inside interface.Create a rule on line 1 and only deny the ports you require.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 00:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3851994#M6192</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2019-05-08T00:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: Ensure NetBios traffic is not permitted to leave our network</title>
      <link>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3852013#M6193</link>
      <description>&lt;P&gt;Like&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/282553"&gt;@johnd2310&lt;/a&gt;&amp;nbsp;said, we deny traffic incoming on the inside interface. That drops it as soon as it is received by the ASA and keeps it from being processed further (thus no need for an outbound ACL entry).&lt;/P&gt;
&lt;P&gt;So add a new rule before the current line 1. Best is to create a service object group when building the rule to equal NetBIOS (tcp/445 and tcp/139). To do that, note that the GUI allows you to "add new group" when specifying the destination port(s)/service(s).&lt;/P&gt;
&lt;P&gt;Also ensure you haven't allowed the traffic inbound from the Internet. That is the more high risk threat by far. I have seen customers allow all ports to a given Windows server thus exposing it to exploits and, by extension, compromising their entire internal network. Once you can "own" a given server from the outside you can usually use it to springboard to other resources.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 02:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ensure-netbios-traffic-is-not-permitted-to-leave-our-network/m-p/3852013#M6193</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-05-08T02:11:58Z</dc:date>
    </item>
  </channel>
</rss>

