<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827595#M6447</link>
    <description>&lt;P&gt;bluebelt,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what does your acl look like that permits this traffic?&amp;nbsp; and, if the destination changes, it is not part of the same connection anymore.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2019 22:49:21 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2019-03-27T22:49:21Z</dc:date>
    <item>
      <title>Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA?</title>
      <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827506#M6445</link>
      <description>&lt;P&gt;While looking at Wireshark captures for users who use some APP on a machine which communicates with some remote server, I&amp;nbsp; noticed multiple remote IPs. Would these IPs need to be added to an ACL as well if it is part of the same TCP connection?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827506#M6445</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T16:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA?</title>
      <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827551#M6446</link>
      <description>&lt;P&gt;Yes. ASA build 5 tuple connections based on Source IP, Destination IP, Protocol, Source Port and Destination Port. If any of these is different in a packet, it counts as a new connection. Your ACL's would need to be built accordingly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 21:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827551#M6446</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-03-27T21:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA?</title>
      <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827595#M6447</link>
      <description>&lt;P&gt;bluebelt,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what does your acl look like that permits this traffic?&amp;nbsp; and, if the destination changes, it is not part of the same connection anymore.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 22:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827595#M6447</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-03-27T22:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA?</title>
      <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827658#M6448</link>
      <description>So basically there is a rule as such:&lt;BR /&gt;ip access-list inside_in extended permit object-group server_ports 100.1.1.50 255.255.255.0 object-group remote_servers&lt;BR /&gt;and another rule like:&lt;BR /&gt;access-list inside_in extended permit object-group internet_ports object-group internal_lan any&lt;BR /&gt;The thing is when traffic is initiated it hits the first second rule but I would really like it it hit the first rule. Server_ports just has a bunch of different ports and remote_servers has a bunch of server host IPs.&lt;BR /&gt;My guess is it is using the 2nd rule because not all the IPs that are used by the remote servers are part of that group and same goes for the server_ports group not having all the ports - the second rule has an any statement. I am basically trying to determine what all IPs and ports are required during this remote server application communication and edit the first rule. Am I making sense?&lt;BR /&gt;</description>
      <pubDate>Thu, 28 Mar 2019 00:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827658#M6448</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-28T00:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Additional IP traffic for same TCP bi-directional traffic have to be allowed in ACLs on ASA?</title>
      <link>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827659#M6449</link>
      <description>Awesome!&lt;BR /&gt;&lt;BR /&gt;So basically there is a rule as such:&lt;BR /&gt;ip access-list inside_in extended permit object-group server_ports 100.1.1.50 255.255.255.0 object-group remote_servers&lt;BR /&gt;and another rule like:&lt;BR /&gt;access-list inside_in extended permit object-group internet_ports object-group internal_lan any&lt;BR /&gt;The thing is when traffic is initiated it hits the first second rule but I would really like it it hit the first rule. Server_ports just has a bunch of different ports and remote_servers has a bunch of server host IPs.&lt;BR /&gt;My guess is it is using the 2nd rule because not all the IPs that are used by the remote servers are part of that group and same goes for the server_ports group not having all the ports - the second rule has an any statement. I am basically trying to determine what all IPs and ports are required during this remote server application communication and edit the first rule. Am I making sense?</description>
      <pubDate>Thu, 28 Mar 2019 00:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/additional-ip-traffic-for-same-tcp-bi-directional-traffic-have/m-p/3827659#M6449</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-03-28T00:55:59Z</dc:date>
    </item>
  </channel>
</rss>

