<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ACL seems to be being bypassed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544765#M630886</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So last night I was working on this and thinking about what could be happening. It suddenly occurred to me that in some instances I was using the wrong IP address in the ACL. I figured out that part of my mistake was that I was using the IP address of the website where the requests originate instead of the IP address of the web server itself. That was a stupid mistake on my part. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today I started modifying my ACLs to structure them so that they are using the actual IP address of the server as well as the real IP address of the internal network server. It appears that these new ACLs are now being used. YAYYYYY!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I did notice is that in some cases where the NATd IP is used instead of the real IP from the internal server is used the ACL is showing hits. Why do some work this way while others don't? In this same case I see hits on both the old and the new ACL. If I move the new ACL above the old ACL all of my hits go to the new ACL and the counts on the old go to 0. Wierd....why would this happen? Is this supposed to happen?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Sep 2010 15:40:57 GMT</pubDate>
    <dc:creator>snowmizer</dc:creator>
    <dc:date>2010-09-16T15:40:57Z</dc:date>
    <item>
      <title>ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544755#M630876</link>
      <description>&lt;P&gt;I'm trying to set up my ASA (running v8.3(1)) to allow traffic from my web server on my DMZ to access one of my internal servers (server B) over port 80. I have configured the static translation to translate from my DMZ ip address scheme to the IP address of the internal server (server B). I have also set up an ACL that allows traffic from my web server to server B over port 80 (access list is high in order before any deny statements). When I try to access the internal server the packet is getting dropped because of the implicit "deny any any" ACL. It's as though the ACL I've created is getting completely ignored.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sample config is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-web&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; nat (inside,dmz) static 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;obj-web address is 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_allow_dmz extended permit tcp host 2.2.2.2 host 1.1.1.1 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544755#M630876</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2019-03-11T18:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544756#M630877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like the access-list you have configured is using the translated IP, not the real IP. Assume that the inside server IP is 192.168.1.100 and the DMZ range is 172.16.1.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-web&lt;/P&gt;&lt;P&gt;host 192.168.1.100&lt;/P&gt;&lt;P&gt;nat (inside,dmz) static 172.16.1.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above configuration, you are mapping 192.168.1.100 to 172.16.1.100. Now, if you want to allow a specific host on the DMZ, say 172.16.1.20, to have access to the inside server, then your access-list will look like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip host 172.16.1.20 host 192.168.1.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here, even though you have mapped the inside IP to 172.16.1.100 on DMZ, due to changes in 8.3 code, you will need to use the real IP in the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544756#M630877</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-15T21:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544757#M630878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had also tried adding the access list using the real inside ip but it didn't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544757#M630878</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2010-09-15T21:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544758#M630879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please share the actual configuration related to this communication here? Also include the ouput of "show run access-group" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544758#M630879</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-15T21:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544759#M630880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the config information. The only thing I changed was the IP addresses because we can't give those out. The access-group is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;web-server IP: 1.1.1.1&lt;/P&gt;&lt;P&gt;internal server (server B): 2.2.2.2&lt;/P&gt;&lt;P&gt;NATd address: 3.3.3.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-2.2.2.2&lt;/P&gt;&lt;P&gt;host 2.2.2.2&lt;/P&gt;&lt;P&gt;description Internal server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-2.2.2.2&lt;/P&gt;&lt;P&gt;nat (inside,dmz) static 3.3.3.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_dmz extended permit tcp host 1.1.1.1 host 2.2.2.2 eq www&lt;/P&gt;&lt;P&gt;access-list acl_dmz extended permit tcp host 1.1.1.1 host 2.2.2.2 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_dmz in interface DMZ&lt;/P&gt;&lt;P&gt;access-group acl_outside in interfae outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config accounts for the changes to allow the real IP address. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544759#M630880</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2010-09-15T21:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544760#M630881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration sample you have provided seems to be correct. If this is not working, then there could be a conflict in the configuration. Is 3.3.3.3 address part of DMZ subnet? Can you run the packet tracer command on the firewall and see if the firewall allows the packet or if it is getting dropped somewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz tcp 1.1.1.1 1024 3.3.3.3 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace the IP's with the actual IP's and see where exactly it breaks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544760#M630881</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-15T21:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544761#M630882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes 3.3.3.3 is part of the DMZ subnet. Here's the weird part...if I run the packet tracer in the ASDM from&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface: DMZ&lt;/P&gt;&lt;P&gt;source ip: web server&lt;/P&gt;&lt;P&gt;dest: real address of internal server&lt;/P&gt;&lt;P&gt;port: 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet is allowed and the rules are getting selected as expected. I'm going to also run a wireshark to see if I can get some information on what else might be happening. But this is strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544761#M630882</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2010-09-15T21:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544762#M630883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you run the packet tracer for reverse flow as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface: Inside&lt;/P&gt;&lt;P&gt;Source: Server B&lt;/P&gt;&lt;P&gt;Destination: Web Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Sep 2010 21:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544762#M630883</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-15T21:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544763#M630884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reverse packet trace allowed the packet as well. The translations and everything worked as I would expect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 00:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544763#M630884</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2010-09-16T00:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544764#M630885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets put the capture on the firewall to see if the packet is traversing through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit ip host &lt;DMZ server="" ip=""&gt; host &lt;INSIDE server="" ip=""&gt;&lt;/INSIDE&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit ip host &lt;INSIDE server="" ip=""&gt; host &lt;DMZ server="" ip=""&gt;&lt;/DMZ&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capin interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capdmz permit ip host &lt;DMZ server="" ip=""&gt; host &lt;INSIDE server=""&gt;&lt;/INSIDE&gt;&lt;/DMZ&gt;&lt;/P&gt;&lt;P&gt;access-list capdmz permit ip host &lt;INSIDE server=""&gt; host &lt;DMZ server="" ip=""&gt;&lt;/DMZ&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capdmz access-list capdmz interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you configure above lines, please try sending some data from DMZ server to the inside server. Now we can verify if the traffic traversed through the firewall or not using the "show capture &lt;CAPTURE name=""&gt;" output.&lt;/CAPTURE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture capin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps us in determining the root cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 12:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544764#M630885</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-09-16T12:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL seems to be being bypassed</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544765#M630886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So last night I was working on this and thinking about what could be happening. It suddenly occurred to me that in some instances I was using the wrong IP address in the ACL. I figured out that part of my mistake was that I was using the IP address of the website where the requests originate instead of the IP address of the web server itself. That was a stupid mistake on my part. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today I started modifying my ACLs to structure them so that they are using the actual IP address of the server as well as the real IP address of the internal network server. It appears that these new ACLs are now being used. YAYYYYY!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I did notice is that in some cases where the NATd IP is used instead of the real IP from the internal server is used the ACL is showing hits. Why do some work this way while others don't? In this same case I see hits on both the old and the new ACL. If I move the new ACL above the old ACL all of my hits go to the new ACL and the counts on the old go to 0. Wierd....why would this happen? Is this supposed to happen?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Sep 2010 15:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-seems-to-be-being-bypassed/m-p/1544765#M630886</guid>
      <dc:creator>snowmizer</dc:creator>
      <dc:date>2010-09-16T15:40:57Z</dc:date>
    </item>
  </channel>
</rss>

