<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA firewall question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066894#M894344</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then the ASA behaves just like Cisco ACE engine&lt;/P&gt;&lt;P&gt;then.  In other words, what works in Checkpoint&lt;/P&gt;&lt;P&gt;does not work in ASA.  Bummer....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for testing this out for me.  I&lt;/P&gt;&lt;P&gt;really appreciate that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Oct 2008 15:33:15 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-10-30T15:33:15Z</dc:date>
    <item>
      <title>ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066887#M894337</link>
      <description>&lt;P&gt;Does anyone have a solution to this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host "CA" has dual NIC.  Eth0 has an IP address of 192.168.0.10/24.&lt;/P&gt;&lt;P&gt;Eth1 has an ip address of 192.168.1.10/24.  The default gateway&lt;/P&gt;&lt;P&gt;on host CA is 192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall has three interfaces.  E0 has has IP address of 10.0.0.254/24&lt;/P&gt;&lt;P&gt;E1 has IP address of 192.168.1.254/24 and E2 has IP address of 192.168.0.254/24&lt;/P&gt;&lt;P&gt;The default gateway on the firewall is 10.0.0.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host "NY" has an IP address of 172.16.1.10/24.  It has the default gateway&lt;/P&gt;&lt;P&gt;of 172.16.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current firewall is a Checkpoint firewall. There is NO NAT on the firewall.&lt;/P&gt;&lt;P&gt;Policy on the firewall is allow everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, NY can ping both 192.168.0.10 and 192.168.1.10 ip address.  Furthermore,&lt;/P&gt;&lt;P&gt;NY can access CA via either 192.168.0.10 or 192.168.1.10 and everything is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer would like to get rid of the Checkpoint firewall and replace it an ASA&lt;/P&gt;&lt;P&gt;firewall.  One of the many requirements is that after swapping the Checkpoint&lt;/P&gt;&lt;P&gt;firewall with an ASA firewall, host NY can still access host CA on both IP addresses&lt;/P&gt;&lt;P&gt;of 192.168.0.10 and 192.168.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible with ASA?  I don't have an ASA to test at the moment so I have to ask.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:04:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066887#M894337</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2019-03-11T14:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066888#M894338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any gurus here know the solution to this?  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 11:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066888#M894338</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-30T11:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066889#M894339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;  I know nothing about Checkpoint, and if there are no tricks configured on Checkpoint, here is my opinion.&lt;/P&gt;&lt;P&gt;  There is no NAT configured so source appears as itself. NY pings CA on 192.168.1.10 thats OK, but when NY pings CA on 192.168.0.10, since source is in a different subnet, it has to forward the response to default gateway, which is 192.168.1.254. That causes an assymetrical routing, but doesnt mean that connections wont establish. Connections would fail if there is 1) A device with Reverse Path Check configured on the way, 2) A statefull device configured "properly" on the way.&lt;/P&gt;&lt;P&gt;   If this way it works is OK, then ASA can do the same job with permit statements for assymetrical return traffics and RPF check disabled. But my suggestion is NATing the traffic destined for 192.168.0 network to interface IP of ASA (192.168.0.254) so there wont be any assymetrical routing issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 12:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066889#M894339</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-10-30T12:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066890#M894340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;  I think you are about to do a sugegstion or consultation to someone and need certain answers. I have been there so I loaded your scenario to my lab. Here are the results&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS=7.2(2),PIX515E&lt;/P&gt;&lt;P&gt;issued commands&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;no ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are no NAT rules in place and traffic from any source to any destination is permitted inboun in E0 interface (10.0.0.254)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NY can ping CA's both IP addresses, but as I proposed, the traffic from NY to CA 192.168.0.10 flows through an assymetrical route. Return traffic is passed to default gateway of CA, which is 192.168.1.254, the inside interface of PIX. When I enable "ip verify reverse-path interface inside" firewall blocks this assymetrical flow and no connection between NY and CA 192.168.0.10 can be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 14:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066890#M894340</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-10-30T14:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066891#M894341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue is that this asymetric routing&lt;/P&gt;&lt;P&gt;is working on Checkpoint.  Customer does NOT &lt;/P&gt;&lt;P&gt;want to make any modifications. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA, RPF and anti-spoofing will be &lt;/P&gt;&lt;P&gt;disabled.  Due to the ASA "stateful", will it&lt;/P&gt;&lt;P&gt;work like Checkpoint?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know for a fact that it will NOT work on ACE&lt;/P&gt;&lt;P&gt;because ACE will inspect "per" flow.  Will&lt;/P&gt;&lt;P&gt;ASA behave the same as ACE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can NOT modify the existing network in &lt;/P&gt;&lt;P&gt;any shapes or forms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anymore ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 14:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066891#M894341</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-30T14:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066892#M894342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It worked in the lab I mentioned above, no modification needed in existing network. Let me try it with a TCP connection instead ICMP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 15:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066892#M894342</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-10-30T15:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066893#M894343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Deny TCP (no connection) from 192.168.0.10/3389 to 172.16.1.10/1045 flags SYN ACK  on interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; ,we have some issues with state table&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 15:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066893#M894343</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-10-30T15:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066894#M894344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then the ASA behaves just like Cisco ACE engine&lt;/P&gt;&lt;P&gt;then.  In other words, what works in Checkpoint&lt;/P&gt;&lt;P&gt;does not work in ASA.  Bummer....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for testing this out for me.  I&lt;/P&gt;&lt;P&gt;really appreciate that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 15:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066894#M894344</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-30T15:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066895#M894345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are welcome &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Oct 2008 15:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066895#M894345</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-10-30T15:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066896#M894346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Howcome this works on the checkpoint? How does a stateful firewall allow a 'new' connection/packet with the SYN+ACK flags set in it without the session already being in its state table? Or you have some special command to exclude this particular flow?&lt;/P&gt;&lt;P&gt;I'm sorry ...not that good with CheckP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 14:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066896#M894346</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-10T14:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066897#M894347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about using the "Nailed" option under the static configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Optional) Allows TCP sessions for asymmetrically routed traffic. This option allows inbound traffic to traverse the security appliance without a corresponding outbound connection to establish the state. This command is used in conjunction with the failover timeout command. The failover timeout command specifies the amount of time after a system boots or becomes active that the nailed sessions are accepted. If not configured, the connections cannot be reestablished.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note Adding the nailed option to the static command causes TCP state tracking and sequence checking to be skipped for the connection. Using the asr-group command to configure asymmetric routing support is more secure than using the static command with the nailed option and is the recommended method for configuring asymmetric routing support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s8_72.html#wp1202525" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s8_72.html#wp1202525&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 17:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066897#M894347</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-11-10T17:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066898#M894348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint is a stateful firewall, just like&lt;/P&gt;&lt;P&gt;ASA.  If you look at the diagram I posted,&lt;/P&gt;&lt;P&gt;both interfaces of the Server is connected&lt;/P&gt;&lt;P&gt;to the firewall.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming you turn OFF anti-spoofing, the &lt;/P&gt;&lt;P&gt;connection come from the "source" getting&lt;/P&gt;&lt;P&gt;to the target, the firewall has that connection, so the firewall know.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, since this is Checkpoint&lt;/P&gt;&lt;P&gt;Secureplatform (aka CP+Linux), the linux &lt;/P&gt;&lt;P&gt;kernel has a parameter  net.ipv4.conf.all.rp_filter = 1 and that this&lt;/P&gt;&lt;P&gt;parameter inside the Linux kernel that &lt;/P&gt;&lt;P&gt;controls the aysmetric route.  If this option&lt;/P&gt;&lt;P&gt;is set to 1, asymetric will NOT be possible,&lt;/P&gt;&lt;P&gt;does not matter what Checkpoint does.  If&lt;/P&gt;&lt;P&gt;this parameter is set to 0, asymetric route&lt;/P&gt;&lt;P&gt;is possible with antispoofping disable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 19:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066898#M894348</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-11-10T19:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA firewall question</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066899#M894349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are not using any static so "nailed" does not&lt;/P&gt;&lt;P&gt;apply in this situation.  We use &lt;/P&gt;&lt;P&gt;"no nat-control" in this situation, just routed&lt;/P&gt;&lt;P&gt;mode through the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 19:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-question/m-p/1066899#M894349</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-11-10T19:22:37Z</dc:date>
    </item>
  </channel>
</rss>

