<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does NAT, Stateful connection and access-list fit togeth in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427104#M774688</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;dan_track wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused basically I've got an interface on my asa firewall that I need to ensure is locked down via an access-list. My acl will look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.242&lt;BR /&gt; description Site2&lt;/P&gt;&lt;P&gt;vlan 242&lt;BR /&gt; nameif dmz-site2&lt;BR /&gt; security-level 58&lt;BR /&gt; ip address 10.4.9.1 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list site2-acl extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then I apply it with :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group site2-acl in interface dmz-site2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I setup nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list site2-nat&lt;BR /&gt;global (dmz-site2) 2&amp;nbsp; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the above only icmp will be allowed in, any other connections will be dropped. However let's say I initiate a connection to site 2 from inside what will happen to the return traffic from site2? As I currently see it the acl "site2-acl" will block traffic from site2 as it doesn't allow any traffic in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain the process to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your acl will block any connections initiated from dmz-site2 to anywhere except for ICMP. However it will not block return traffic because that is what a stateful firewall is all about. So if you initiate a connection from inside and that traffic is allowed onto the dmz-site2 then the return traffic will not be checked against the site2-acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's the same for traffic initiated from the outside. If it is allowed onto dmz-site2 then the return traffic will be allowed back out ie. site2-acl will not be checked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above applies to protocols that a stateful firewall can keep state for. TCP/UDP have always been that way. ICMP inspection was added in version 7.x so it applies to ICMP as well now as long as you enable ICMP inspection on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are other protocols however such as GRE which are not stateful and if they are not stateful then the return traffic would be checked against the site2-acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that, the vast majority of apps going through a firewall are TCP/UDP so what i have outlined above applies to most traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Mar 2010 14:05:53 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2010-03-18T14:05:53Z</dc:date>
    <item>
      <title>How does NAT, Stateful connection and access-list fit together?</title>
      <link>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427103#M774669</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused basically I've got an interface on my asa firewall that I need to ensure is locked down via an access-list. My acl will look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.242&lt;BR /&gt; description Site2&lt;/P&gt;&lt;P&gt;vlan 242&lt;BR /&gt; nameif dmz-site2&lt;BR /&gt; security-level 58&lt;BR /&gt; ip address 10.4.9.1 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list site2-acl extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then I apply it with :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group site2-acl in interface dmz-site2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I setup nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list site2-nat&lt;BR /&gt;global (dmz-site2) 2&amp;nbsp; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the above only icmp will be allowed in, any other connections will be dropped. However let's say I initiate a connection to site 2 from inside what will happen to the return traffic from site2? As I currently see it the acl "site2-acl" will block traffic from site2 as it doesn't allow any traffic in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain the process to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427103#M774669</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2019-03-11T17:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: How does NAT, Stateful connection and access-list fit togeth</title>
      <link>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427104#M774688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;dan_track wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused basically I've got an interface on my asa firewall that I need to ensure is locked down via an access-list. My acl will look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.242&lt;BR /&gt; description Site2&lt;/P&gt;&lt;P&gt;vlan 242&lt;BR /&gt; nameif dmz-site2&lt;BR /&gt; security-level 58&lt;BR /&gt; ip address 10.4.9.1 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list site2-acl extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then I apply it with :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group site2-acl in interface dmz-site2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I setup nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list site2-nat&lt;BR /&gt;global (dmz-site2) 2&amp;nbsp; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the above only icmp will be allowed in, any other connections will be dropped. However let's say I initiate a connection to site 2 from inside what will happen to the return traffic from site2? As I currently see it the acl "site2-acl" will block traffic from site2 as it doesn't allow any traffic in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain the process to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your acl will block any connections initiated from dmz-site2 to anywhere except for ICMP. However it will not block return traffic because that is what a stateful firewall is all about. So if you initiate a connection from inside and that traffic is allowed onto the dmz-site2 then the return traffic will not be checked against the site2-acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's the same for traffic initiated from the outside. If it is allowed onto dmz-site2 then the return traffic will be allowed back out ie. site2-acl will not be checked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above applies to protocols that a stateful firewall can keep state for. TCP/UDP have always been that way. ICMP inspection was added in version 7.x so it applies to ICMP as well now as long as you enable ICMP inspection on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are other protocols however such as GRE which are not stateful and if they are not stateful then the return traffic would be checked against the site2-acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having said that, the vast majority of apps going through a firewall are TCP/UDP so what i have outlined above applies to most traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 14:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427104#M774688</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-03-18T14:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: How does NAT, Stateful connection and access-list fit togeth</title>
      <link>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427105#M774704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great insight. Much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 14:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-does-nat-stateful-connection-and-access-list-fit-together/m-p/1427105#M774704</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2010-03-18T14:24:20Z</dc:date>
    </item>
  </channel>
</rss>

