<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quick question re Access-lists Outside &amp; Inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/quick-question-re-access-lists-outside-inside/m-p/1244304#M840860</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Short answer: No you don't&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long answer: Cisco ASA firewalls are stateful, therefore when a connection is built in 1 direction, the other direction is automatically allowed. Also, a connection iniating from inside (high security interface) to outside (low security) is automatically allowed through so long as an accompanying NAT rule is in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate posts if they help you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 May 2009 09:19:32 GMT</pubDate>
    <dc:creator>handsy</dc:creator>
    <dc:date>2009-05-22T09:19:32Z</dc:date>
    <item>
      <title>Quick question re Access-lists Outside &amp; Inside</title>
      <link>https://community.cisco.com/t5/network-security/quick-question-re-access-lists-outside-inside/m-p/1244303#M840859</link>
      <description>&lt;P&gt;New to networking so just need someone to confirm this please regarding ASA firwall. If I have created an access-list on the outside interface which allows an outside device to to create a connection to a specific ip address and port on the inside do I also need to create an entry on the inside interface access-list to allow the return traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quick-question-re-access-lists-outside-inside/m-p/1244303#M840859</guid>
      <dc:creator>darrenriley5</dc:creator>
      <dc:date>2019-03-11T15:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Quick question re Access-lists Outside &amp; Inside</title>
      <link>https://community.cisco.com/t5/network-security/quick-question-re-access-lists-outside-inside/m-p/1244304#M840860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Short answer: No you don't&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long answer: Cisco ASA firewalls are stateful, therefore when a connection is built in 1 direction, the other direction is automatically allowed. Also, a connection iniating from inside (high security interface) to outside (low security) is automatically allowed through so long as an accompanying NAT rule is in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate posts if they help you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 May 2009 09:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quick-question-re-access-lists-outside-inside/m-p/1244304#M840860</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-22T09:19:32Z</dc:date>
    </item>
  </channel>
</rss>

