<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access-list for internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249009#M793069</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Endende that by creating an outbound access-list we would have another access-list to be read and this would affect the access time to the devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 29 Sep 2009 20:54:23 GMT</pubDate>
    <dc:creator>luciano_rangel</dc:creator>
    <dc:date>2009-09-29T20:54:23Z</dc:date>
    <item>
      <title>Access-list for internet</title>
      <link>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249007#M793016</link>
      <description>&lt;P&gt;Good afternoon &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a firewall with three interfaces (outside, inside "172.16.0.0/16" and dmz "10.1.1.0/24") and I need access from inside network to internet on port 80 as access-list below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 172.16.0.0 255.255.0.0 0.0.0.0 0.0.0.0 eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the best practice for the machines in network inside dont access others networks on port 80, already destination is any?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a deny rule in the middle of the example below&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip 172.16.0.0 255.255.0.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 172.16.0.0 255.255.0.0 0.0.0.0 0.0.0.0 eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create outbound access-list on interface dmz?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249007#M793016</guid>
      <dc:creator>luciano_rangel</dc:creator>
      <dc:date>2019-03-11T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list for internet</title>
      <link>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249008#M793040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luciano&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doesn't make a huge amount of difference. Personally i would go with your first example ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip 172.16.0.0 255.255.0.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 172.16.0.0 255.255.0.0 0.0.0.0 0.0.0.0 eq http &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Sep 2009 20:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249008#M793040</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-09-29T20:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list for internet</title>
      <link>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249009#M793069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Endende that by creating an outbound access-list we would have another access-list to be read and this would affect the access time to the devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Sep 2009 20:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249009#M793069</guid>
      <dc:creator>luciano_rangel</dc:creator>
      <dc:date>2009-09-29T20:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access-list for internet</title>
      <link>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249010#M793091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Luciano&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"that by creating an outbound access-list we would have another access-list to be read and this would affect the access time to the devices."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes but probably not that noticeable. However there is an argument to say drop the traffic on the nearest interface to the source. That way the traffic does not have to go from the inside to the DMZ interface before being dropped. That's why i would go with your first option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Sep 2009 21:04:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-for-internet/m-p/1249010#M793091</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-09-29T21:04:02Z</dc:date>
    </item>
  </channel>
</rss>

