<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question/m-p/1224800#M835576</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And from a lower (DMZ) to a higher interface (inside), as long as there is an incoming rule on the &lt;B&gt;lower&lt;/B&gt; interface (DMZ) that allows the traffic through, it will be able to access devices on the higher security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;access-list DMZ_access_in extended permit tcp any any eq www&lt;/I&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow http traffic out of the DMZ, and it should be able to hit a device on the higher security 'inside' interface (or a lower security interface for that matter). Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon. Sorry for all the questions, I just want to be sure I have a clear understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 May 2009 17:41:17 GMT</pubDate>
    <dc:creator>oneirishpollack</dc:creator>
    <dc:date>2009-05-19T17:41:17Z</dc:date>
    <item>
      <title>Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224795#M835571</link>
      <description>&lt;P&gt;As I have muddled through setting up and working on a firewall, I have a couple questions:&lt;/P&gt;&lt;P&gt;1.	When you create a inbound (incoming) rule (for example permitting http traffic) from a lower security interface (DMZ)  to a higher security interface (inside), do you need to have a rule on the 'inside' interface in the outbound direction to allow the http traffic through? Or does the incoming rule on the lower security interface (DMZ) take care of that? Maybe my question is really, is there an implied outgoing ACL on the inside interface that would stopped traffic coming from a DMZ interface? &lt;/P&gt;&lt;P&gt;2.	When you apply rules to an interface, where is the best place to apply them - incoming or outgoing? I am assuming closest to the sending device correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224795#M835571</guid>
      <dc:creator>oneirishpollack</dc:creator>
      <dc:date>2019-03-11T15:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224796#M835572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) A firewall such as the pix/ASA is stateful so if you allow traffic through from a lower to higher security interface then the return traffic is automatically allowed. Note that this applies to TCP/UDP and now ICMP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for example if you wanted to allow GRE through your firewall you would need to allow it both ways as it is not stateful. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However TCP/UDP account for the vast majority of traffic and things like GRE are the exception rather than the rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) As close to source as possible is best so usually acl's are applied in an inbound direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 15:11:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224796#M835572</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-19T15:11:04Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224797#M835573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And just to be clear, there is no implicit ACL in an outbound direction is you don't specifically have one applied?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 16:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224797#M835573</guid>
      <dc:creator>oneirishpollack</dc:creator>
      <dc:date>2009-05-19T16:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224798#M835574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no implict acl in any direction from a higher to a lower security interface ie. traffic will be allowed by default from a higher to lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 17:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224798#M835574</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-19T17:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224799#M835575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And from a lower (DMZ) to a higher interface (inside), as long as there is an incoming rule on the &lt;B&gt;lower&lt;/B&gt; interface (DMZ) that allows the traffic through, it will be able to access devices on the higher security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;access-list DMZ_access_in extended permit tcp any any eq www&lt;/I&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow http traffic out of the DMZ, and it should be able to hit a device on the higher security 'inside' interface (or a lower security interface for that matter). Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon. Sorry for all the questions, I just want to be sure I have a clear understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 17:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224799#M835575</guid>
      <dc:creator>oneirishpollack</dc:creator>
      <dc:date>2009-05-19T17:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224800#M835576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And from a lower (DMZ) to a higher interface (inside), as long as there is an incoming rule on the &lt;B&gt;lower&lt;/B&gt; interface (DMZ) that allows the traffic through, it will be able to access devices on the higher security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;access-list DMZ_access_in extended permit tcp any any eq www&lt;/I&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow http traffic out of the DMZ, and it should be able to hit a device on the higher security 'inside' interface (or a lower security interface for that matter). Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon. Sorry for all the questions, I just want to be sure I have a clear understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 17:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224800#M835576</guid>
      <dc:creator>oneirishpollack</dc:creator>
      <dc:date>2009-05-19T17:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: Question</title>
      <link>https://community.cisco.com/t5/network-security/question/m-p/1224801#M835577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"access-list DMZ_access_in extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow http traffic out of the DMZ, and it should be able to hit a device on the higher security 'inside' interface (or a lower security interface for that matter). Correct?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the acl DMZ_access_in is applied inbound to the DMZ interface then yes the above would allow http traffic from any device in the DMZ to any device on the inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"or a lower security interface for that matter)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, but note that you wouldn't need an acl if you just wanted to allow traffic from the DMZ to a lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Sorry for all the questions, I just want to be sure I have a clear understanding."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No need to apologise, this is what NetPro is for. Feel free to ask as many questions as you want &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 May 2009 17:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question/m-p/1224801#M835577</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-05-19T17:45:44Z</dc:date>
    </item>
  </channel>
</rss>

