<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA ACL question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/3817367#M6533</link>
    <description>&lt;P&gt;With reference to this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The acl configured at the end for dmz, why is it being placed inbound rather than outbound in the dmz interface? Shouldn't it be outbound because the traffic is leaving the dmz into the inside interface to access the dns?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:55:52 GMT</pubDate>
    <dc:creator>leowls</dc:creator>
    <dc:date>2020-02-21T16:55:52Z</dc:date>
    <item>
      <title>ASA ACL question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/3817367#M6533</link>
      <description>&lt;P&gt;With reference to this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The acl configured at the end for dmz, why is it being placed inbound rather than outbound in the dmz interface? Shouldn't it be outbound because the traffic is leaving the dmz into the inside interface to access the dns?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/3817367#M6533</guid>
      <dc:creator>leowls</dc:creator>
      <dc:date>2020-02-21T16:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/3817389#M6534</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The majority of the time an ACL will be applied INbound as packets would originate inbound on the DMZ interface. If you use an outbound ACL then the packets arrive inbound on the DMZ interface, processed for NAT, inspection etc only to be dropped after the ASA has spent more resources processing it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI, an example usage of an OUTbound ACL &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/nwaccess.html" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/3817389#M6534</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-11T13:39:46Z</dc:date>
    </item>
  </channel>
</rss>

