<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: when is Permit IP any any OK in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468841#M708199</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Stuart,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound filtering on trusted interface is acceptable, however best practice is saying - filtering should be done close to the source and not destination.&lt;/P&gt;&lt;P&gt;If you're already filtering on Inner ASA (closer to source), doing same filtering on Outer ASA can be omited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Jul 2010 16:21:51 GMT</pubDate>
    <dc:creator>Marcin Latosiewicz</dc:creator>
    <dc:date>2010-07-06T16:21:51Z</dc:date>
    <item>
      <title>when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468838#M708196</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Hi, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;I am after a general consensus on permit ip any any, is this command ever acceptable ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;A PCI audit has just taken place on our network and a permit ip any any was found, since then all hell has broken lose.&amp;nbsp; Please see below explanation for the design.&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt;Our Network is based on a multi tier approach, which is based on the following. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt;LAN – Access Lists applied to the layer three SVI’s.&amp;nbsp; the purpose of this ACL is to control LAN based traffic for example access to DC’s, ISA, Exchange etc.&amp;nbsp; at the end of this ACL under the deny to anything LAN, is an IP any any, this permits access destined to anything not internal in LAN, this is then filtered at the Inner ASA. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt;Inner ASA – Most restrictive Access lists are placed at this layer on the inside, outside thrid party and DMZ interfaces.&amp;nbsp; This controls access from LAN to External based connections such as the Internet and MPLS connections.&amp;nbsp; We also control what traffic can come in from the outside in terms of VPN’s.&amp;nbsp;&amp;nbsp; This layer is treated as our strongest layer of traffic control. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt;Outer ASA – Due to the restrictive filtering on the Inner ASA, we trust the traffic that is sourced from the inside network as it has already been filtered by the Inner layer.&amp;nbsp; The main purpose of the Outer layer is to be a termination point for VPN’s and control traffic that is connecting from the Internet towards the servers that are in the DMZ.&amp;nbsp; To secure further we also NAT to a completely separate private range on the Outer Layer for anything that is accessible from the Internet. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #000000;"&gt;Each layer of Firewalls have a distinct purpose as by design and I feel they are performing in an efficient way to provide a high level of data throughput.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;The ip any any is actually by design and has been placed on the Outer ASA's inside interface,&amp;nbsp; the thought process behind this is mainly for supportability in terms of making changes etc, as i do not see the benefit of replicating the rule base from my Inner to my Outer, as this in theory would be the same as an ip any any as it is only possible for my inside network to traverse this interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0cm 0cm 0pt;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Any comments would be greatly appreciated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468838#M708196</guid>
      <dc:creator>leach_stuart</dc:creator>
      <dc:date>2019-03-11T18:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468839#M708197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;(Mind you) I'm not familiar with the exact design so I assume it's linear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;users --- LAN ACLs ---- Inner ASA ----outer ASA --- WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a disclaimer I want to say that I'm just saying what makes sense to me and it's in no way a statment by Cisco &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Applying inbound filtering on inside of outer ASA makes little sense, traffic is incoing from more trusted devices going towards the less trusted WAN.&lt;/P&gt;&lt;P&gt;That's why indeed Cisco assume that traffic is to be allowed. Since ASA is stetful we know that only return traffic will be allowed (or whatever we allow on the outside access-list).&lt;/P&gt;&lt;P&gt;I understand that there is no untrusted device between the two ASAs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've seen a similar problem from auditors before, for the most part they do understand that firewalls now are stateful, and protection does not come from ACLs.&lt;/P&gt;&lt;P&gt;That being said there's rarely a point in arguing with audit, for you own piece of mind comply with them. Apply an access-list there and deny traffic to auditor's company HQ &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, even if you permit any any at the end you can always justify that it's there to block know abusive hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 14:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468839#M708197</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T14:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468840#M708198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marcin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it is linear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much for your reply, what is your opion on the never use a permit ip any any on a firewall, in my opion if the infrastructure is secure then a permit ip any any is acceptible, but I am not sure if this goes against best practice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stuart&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 16:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468840#M708198</guid>
      <dc:creator>leach_stuart</dc:creator>
      <dc:date>2010-07-06T16:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468841#M708199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Stuart,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound filtering on trusted interface is acceptable, however best practice is saying - filtering should be done close to the source and not destination.&lt;/P&gt;&lt;P&gt;If you're already filtering on Inner ASA (closer to source), doing same filtering on Outer ASA can be omited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 16:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468841#M708199</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T16:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468842#M708200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so permit ip any any in this scenario does not go against best practice.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 16:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468842#M708200</guid>
      <dc:creator>leach_stuart</dc:creator>
      <dc:date>2010-07-06T16:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468843#M708201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Again, this is not Cisco official statement (I don't have this power) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One can argue that a firewall sandwitch is probably not the best design in the best place &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I do not see anything wrong with having permit on inside in case of firewall sandwich&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 17:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468843#M708201</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T17:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: when is Permit IP any any OK</title>
      <link>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468844#M708202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your comments&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 07:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-is-permit-ip-any-any-ok/m-p/1468844#M708202</guid>
      <dc:creator>leach_stuart</dc:creator>
      <dc:date>2010-07-07T07:33:02Z</dc:date>
    </item>
  </channel>
</rss>

