<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic return packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/return-packets/m-p/1776823#M64814</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anita -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would be better served by asking your firewall questions in the firewall forum.&lt;/P&gt;&lt;P&gt;Cisco's firewalls perform the "established" function by default on any TCP session that is allowed to be started from the inside interface to an outside interface. You do not have to define the return traffic properties, you only need to allow the traffic to leave (as long as the TCP session is started from the inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Oct 2011 16:26:15 GMT</pubDate>
    <dc:creator>rhermes</dc:creator>
    <dc:date>2011-10-21T16:26:15Z</dc:date>
    <item>
      <title>return packets</title>
      <link>https://community.cisco.com/t5/network-security/return-packets/m-p/1776822#M64813</link>
      <description>&lt;P&gt;Hi Expert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the concept of ACL on router, it is required the "established" ACL statement for the return packets which is from the originator. Such as the following example, there is not ACL on outbound traffic but control the inbound traffic only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! router 2811&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FE0/1&lt;/P&gt;&lt;P&gt;ip address 192.168.106.1 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group 150 in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 150 permit tcp any eq 443 host 192.168.106.105 gt 1023 established&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to config the ASA. Do I apply the similar concept to ASA? If so, which "key word" to represent the return packet? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rdgs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anita&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/return-packets/m-p/1776822#M64813</guid>
      <dc:creator>anitachoi3</dc:creator>
      <dc:date>2019-03-10T12:31:32Z</dc:date>
    </item>
    <item>
      <title>return packets</title>
      <link>https://community.cisco.com/t5/network-security/return-packets/m-p/1776823#M64814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anita -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would be better served by asking your firewall questions in the firewall forum.&lt;/P&gt;&lt;P&gt;Cisco's firewalls perform the "established" function by default on any TCP session that is allowed to be started from the inside interface to an outside interface. You do not have to define the return traffic properties, you only need to allow the traffic to leave (as long as the TCP session is started from the inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Oct 2011 16:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/return-packets/m-p/1776823#M64814</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2011-10-21T16:26:15Z</dc:date>
    </item>
  </channel>
</rss>

