<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277856#M816435</link>
    <description>&lt;P&gt;Hello, New to ASA&lt;/P&gt;&lt;P&gt;trying to understand how to allow traffic for specific host from LAN to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My needs&lt;/P&gt;&lt;P&gt;* Desktop 192.168.3.80 which needs tcp port 999 to download internation newspaper using secured application.&lt;/P&gt;&lt;P&gt;* Desktop 192.168.3.88 which gets stocks update,I donno what ports it needs? how&amp;amp;What to allow.&lt;/P&gt;&lt;P&gt;* Finance Desktop 192.168.5.7 traffic to send outside on port 6919 to get bank updates using customized application.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA is production, so scared to fiddle with it:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA Configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname JT-ASA&lt;/P&gt;&lt;P&gt;domain-name JTI.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description ISP&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 195.73.42.10 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.100 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT2IN extended permit tcp any host 195.73.42.15 eq smtp &lt;/P&gt;&lt;P&gt;access-list ACL_OUT2IN extended permit tcp any host 195.73.42.16 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp any host 192.168.2.25 eq smtp &lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp any host 192.168.2.26 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 2 interface&lt;/P&gt;&lt;P&gt;nat (INSIDE) 2 192.168.2.5 255.255.255.255&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) 195.73.42.15  192.168.2.25 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) 195.73.42.16 192.168.2.26 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL_OUT2IN in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group ACL_IN2OUT in interface INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router ospf 2&lt;/P&gt;&lt;P&gt;network 192.168.1.0 255.255.255.0 area 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect skinny  &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect sip  &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:29:11 GMT</pubDate>
    <dc:creator>joe.marcelo9</dc:creator>
    <dc:date>2019-03-11T16:29:11Z</dc:date>
    <item>
      <title>New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277856#M816435</link>
      <description>&lt;P&gt;Hello, New to ASA&lt;/P&gt;&lt;P&gt;trying to understand how to allow traffic for specific host from LAN to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My needs&lt;/P&gt;&lt;P&gt;* Desktop 192.168.3.80 which needs tcp port 999 to download internation newspaper using secured application.&lt;/P&gt;&lt;P&gt;* Desktop 192.168.3.88 which gets stocks update,I donno what ports it needs? how&amp;amp;What to allow.&lt;/P&gt;&lt;P&gt;* Finance Desktop 192.168.5.7 traffic to send outside on port 6919 to get bank updates using customized application.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA is production, so scared to fiddle with it:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ASA Configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname JT-ASA&lt;/P&gt;&lt;P&gt;domain-name JTI.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description ISP&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 195.73.42.10 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.100 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_OUT2IN extended permit tcp any host 195.73.42.15 eq smtp &lt;/P&gt;&lt;P&gt;access-list ACL_OUT2IN extended permit tcp any host 195.73.42.16 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp any host 192.168.2.25 eq smtp &lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp any host 192.168.2.26 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 2 interface&lt;/P&gt;&lt;P&gt;nat (INSIDE) 2 192.168.2.5 255.255.255.255&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) 195.73.42.15  192.168.2.25 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) 195.73.42.16 192.168.2.26 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL_OUT2IN in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group ACL_IN2OUT in interface INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router ospf 2&lt;/P&gt;&lt;P&gt;network 192.168.1.0 255.255.255.0 area 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect skinny  &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect sip  &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277856#M816435</guid>
      <dc:creator>joe.marcelo9</dc:creator>
      <dc:date>2019-03-11T16:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277857#M816445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to add lines to the ACLIN2OUT which is applied to your inside interface ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp host 192.168.3.80 host &lt;REMOTE server=""&gt; eq 999&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit tcp host 192.168.5.7 host &lt;REMOTE server_1=""&gt; eq 6919&lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the one you don't know the ports on - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ACL_IN2OUT extended permit ip host 192.168.3.88 host &lt;REMOTE server=""&gt; &lt;/REMOTE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that is very open but you could temporarily log the matches for that line and work out what ports are being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will also have to NAT the internal IP's as they go out to the Internet ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that will NAT all inside addresses to the IP address on your outside interface. If you want to you can lock down the NAT to only the 3 internal hosts but remember that you are limiting what is allowed outbound with your inside acl anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Oct 2009 19:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277857#M816445</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-10-21T19:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277858#M816456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon thank you very much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But Its unclear "How to log matches" what does that mean.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I do NAT and dont allow on inside ACL it will not send traffic outside, do you ment this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is different between Static-NAT and NAT statment you added, I am totally confused on this?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Oct 2009 19:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277858#M816456</guid>
      <dc:creator>joe.marcelo9</dc:creator>
      <dc:date>2009-10-21T19:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277859#M816470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Logging matches just means you can log what has been allowed anytime the rule within the acl has been matched. See the ASA config guide if you need to setup logging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If I do NAT and dont allow on inside ACL it will not send traffic outside, do you ment this."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly. But you could just as easily setup your NAT as &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.3.80 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.3.88 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.7 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"What is different between Static-NAT and NAT statment you added, I am totally confused on this????? "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes NAT can be confusing on Cisco devices. There is a lot to know but put simply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static NAT is used when the connection can come from either way eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 195.17.17.1 10.10.10.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) that when the inside host with an IP of 10.10.10.1 sends out traffic to the outside of the ASA the source address is translated from 10.10.10.1 ro 195.17.17.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it also means&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) that when a device on the outside sends traffic to the address of 195.17.17.1 this address is then changed to 10.10.10.1 and sent to the inside host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With a static command the connection can be initiated from either the inside host to outside or from the outside to the inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the NAT commands i supplied if the internal devices connect to devices on the Internet then they will be translated to the outside IP address of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT - if the connection is initiated from the Internet it won't work because the ASA does not know which inside address to translate to. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that it is all to do with which side initiated the connection. If the inside device initiates a connection to the outside using the NAT commands i supplied then a NAT entry is built on the firewall so the return traffic will get back to the right client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In simpler terms - statics are used when you need to allow access both ways, access in terms of who initiates the connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic NAT is good for inside to outside connections or more specifically one way initiation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a bit more complex than this and there are still some exceptions to what i have written but that is an overall general rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Oct 2009 19:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277859#M816470</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-10-21T19:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277860#M816493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Jon.&lt;/P&gt;&lt;P&gt;Explanation was very very clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we limit the traffic for host from inside-to-outside and also limit from outside-to-inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Limit SMTP traffic from outside-to-inside to 512KB&lt;/P&gt;&lt;P&gt;Limit SMTP traffic from inside-to-outside to 256Kb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Oct 2009 20:23:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277860#M816493</guid>
      <dc:creator>joe.marcelo9</dc:creator>
      <dc:date>2009-10-21T20:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: New on ASA</title>
      <link>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277861#M816510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA does support QOS policies, see this guide for full details - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/qos.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/qos.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Oct 2009 20:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-on-asa/m-p/1277861#M816510</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-10-21T20:28:19Z</dc:date>
    </item>
  </channel>
</rss>

