<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions about implementing ACLs on Inbound Ports. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565629#M620876</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can only apply one ACL, per direction, per port. The implicit deny all is very effecient and it works 100% of the time. I don't know of any test results but there are thousands of people who found it works the hard way. Designing your ACLs depends on source, destination, and protocol. If you're restricting protocols between certain subnets, then the ACL can get long and you should map it out before implementing it. If you're just blocking protocols, then put the permits at the top and let the implicit deny do its job or put a deny at the end of the ACL for logging purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Oct 2010 13:54:52 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2010-10-21T13:54:52Z</dc:date>
    <item>
      <title>Questions about implementing ACLs on Inbound Ports.</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565628#M620875</link>
      <description>&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Calibri; "&gt;I have a requirement to implement ACLs on Inbound Ports to block and allow specific TCP, UDP, &amp;amp; ICMP services and to block and allow specific IP address ranges and hosts.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;It appears that the most efficient way to d this without having the ACL become too cumbersome to manage would be to create two or more ACLs.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;How many ACLs can be supported for each port?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;What is the search order; i.e. by the order listed under the port configuration or by ACL #/name?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;How efficient is the implicit “deny all?”&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;I.e. if I just “permit” the services I wish to allow, will all other services/ports be blocked?&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;Has this been tested?&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;Where I can I find test result information?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;If two ACLs are used, if a service or IP is blocked, expressly or implicitly; or expressly permitted in the first ACL reviewed, will the next ACL be checked?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565628#M620875</guid>
      <dc:creator>manuel.dennis</dc:creator>
      <dc:date>2019-03-11T18:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about implementing ACLs on Inbound Ports.</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565629#M620876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can only apply one ACL, per direction, per port. The implicit deny all is very effecient and it works 100% of the time. I don't know of any test results but there are thousands of people who found it works the hard way. Designing your ACLs depends on source, destination, and protocol. If you're restricting protocols between certain subnets, then the ACL can get long and you should map it out before implementing it. If you're just blocking protocols, then put the permits at the top and let the implicit deny do its job or put a deny at the end of the ACL for logging purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 13:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565629#M620876</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-10-21T13:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about implementing ACLs on Inbound Ports.</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565630#M620879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Collen, that does help. &lt;/P&gt;&lt;P&gt;One follow-on, since I can only use one ACL in and one out per port, if I allow either a service or IP address host/range, will checking continue or stop? &lt;/P&gt;&lt;P&gt;I think that any match stops checking, but just want to be 100% accurate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 14:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565630#M620879</guid>
      <dc:creator>manuel.dennis</dc:creator>
      <dc:date>2010-10-21T14:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about implementing ACLs on Inbound Ports.</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565631#M620881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I typically use ACL on the ingress.&amp;nbsp; It just makes it easy to follow.&amp;nbsp; The nice thing about the ASA is there is always an explicit deny unless you changed the default behaviour and made it a default allow which is available but have not met anyone who used that yet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one more thing to consider is that the value you place on the interfaces makes a difference as well.&amp;nbsp; If you apply acl's on all interface then no worries but if you only apply an ACL say on the external (outside) interface that gets a security-level 0 and the (inside) interace gets a value of 100.&amp;nbsp; If you do not apply ACL's on the ingress of the inside interface, by default becuase it is more secure then the external, it will allow traffic to flow to the outside interface as long as you have the correct Natting or no natting to allow the traffic to flow properly.&amp;nbsp; so be aware of the security levels if you are using more then one interface I guess is my point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 14:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565631#M620881</guid>
      <dc:creator>connectone</dc:creator>
      <dc:date>2010-10-21T14:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about implementing ACLs on Inbound Ports.</title>
      <link>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565632#M620883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to clarify one thing; you can permit/deny multiple protocols per ACL. For example you can have the following;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 10.10.10.10 any eq 25&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any any eq 25&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp host 10.10.10.10 any eq 80&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you can not do is apply both ACL 100 &amp;amp; 101 to an interface in the same direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 10.10.10.10 any eq 25&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp any any eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 deny tcp host 10.10.10.10 any eq 80&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your question, once a match is found the ACL processing is stopped for that packet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 15:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-about-implementing-acls-on-inbound-ports/m-p/1565632#M620883</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-10-21T15:34:54Z</dc:date>
    </item>
  </channel>
</rss>

