<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 general questions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032347#M895365</link>
    <description>&lt;P&gt;1. Do I need to nat translate all of my internal networks back to the same addresses to get to internal DMZ's in oreder for communications to take place.  It seemed that I had to do this to get it to work&lt;/P&gt;&lt;P&gt;2. I am converting from Checkpoint to ASA 5520 and am taking each rule in the Checkpoint and trying to add an equivalent access list command in the ASA.  In Checkpoint, all rules are just added with no interface specified, but in the ASA it wants an interface to assign it to.  So the question is this:  When converting these Checkpoint rules to the ASA, what direction should the converted access list be (inbound or outbound), and, what interface would I apply it to?  I've included a snapshot of a few of the Checkpoint rules for reference in this conversation.  Rule #2 source inex2-owa is in the DMZ and the dest. FDBSID is on the inside.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:54:37 GMT</pubDate>
    <dc:creator>broeder</dc:creator>
    <dc:date>2019-03-11T13:54:37Z</dc:date>
    <item>
      <title>ASA 5520 general questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032347#M895365</link>
      <description>&lt;P&gt;1. Do I need to nat translate all of my internal networks back to the same addresses to get to internal DMZ's in oreder for communications to take place.  It seemed that I had to do this to get it to work&lt;/P&gt;&lt;P&gt;2. I am converting from Checkpoint to ASA 5520 and am taking each rule in the Checkpoint and trying to add an equivalent access list command in the ASA.  In Checkpoint, all rules are just added with no interface specified, but in the ASA it wants an interface to assign it to.  So the question is this:  When converting these Checkpoint rules to the ASA, what direction should the converted access list be (inbound or outbound), and, what interface would I apply it to?  I've included a snapshot of a few of the Checkpoint rules for reference in this conversation.  Rule #2 source inex2-owa is in the DMZ and the dest. FDBSID is on the inside.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032347#M895365</guid>
      <dc:creator>broeder</dc:creator>
      <dc:date>2019-03-11T13:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 general questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032348#M895367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;0) I don't necessarily believe in security by obscurity, but you should never share your firewall rules to the public at large...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You can use NAT exemption to handle this.  It is not necessarily required if you use no nat-control, which is the default unless you upgraded your ASA from an earlier configuration where no nat-control was not available.  I'd recommend NAT exemption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) There is a tool available to convert a Checkpoint config to an ASA config.  I'd recommend using that and then tweaking the configuration by hand - never use the converted configuration without tweaking.  As far as ACL direction, the usual approach is to apply inbound ACL's on all interfaces.  Outbound ACL's are generally used to further tweak the policy if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fred Reimer&lt;/P&gt;&lt;P&gt;Senior Network Engineer&lt;/P&gt;&lt;P&gt;Coleman Technologies, Inc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2008 11:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032348#M895367</guid>
      <dc:creator>Frederick Reimer</dc:creator>
      <dc:date>2008-10-08T11:23:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 general questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032349#M895371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for ACL use the following general guides&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any traffic sourced from higher security level to lower security level u dont need ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the traffic from lower to higher u need ACL to permit that traffic and nating as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let take simple example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say u have DMZ 192.168.1.0/24&lt;/P&gt;&lt;P&gt;and inside 192.168.10.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside sec level 100 DMZ sec level 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now we can make communication between those two networks as follow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, DMZ) 192.168.1.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is one way and i found it simple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for nating and access to internet from inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.10.0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if u have host withc public address on the DMZ needed to be accessed from internet u can make static nat like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say the host IP is 192.168.1.1 on DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;public IP 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ, outside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface outisde&lt;/P&gt;&lt;P&gt;here we allwoed http access to a host in the DMZ through the internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2008 11:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032349#M895371</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-08T11:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 general questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032350#M895373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"0) I don't necessarily believe in security by obscurity, but you should never share your firewall rules to the public at large..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is perfectly fine.  Do you know the IP addresses of these devices with&lt;/P&gt;&lt;P&gt;this security policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've some experience with Checkpoint so hopefully what I am saying here will make some senses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security policy you share with us is not complete.  In order to know how things work, we need&lt;/P&gt;&lt;P&gt;to know the following information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- How many interfaces does this firewall have?&lt;/P&gt;&lt;P&gt;- Do you have "hide" NAT (aka PAT) and "static NAT?  If so, can you share the NAT table?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The complexity of the conversion really depends on how many interfaces you have on the &lt;/P&gt;&lt;P&gt;Checkpoint firewall.  Furthermore, it also depends on how complex NATting you do on the &lt;/P&gt;&lt;P&gt;checkpoint firewall.  Remember that Checkpoint has NO security level on its interface.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't I give you an example with your security policy by looking at rule #4:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say you have 10 interfaces on the Checkpoint firewalls.  If you look at rule #4,&lt;/P&gt;&lt;P&gt;you then will have to create 9 different access-list names to apply on 9 different&lt;/P&gt;&lt;P&gt;interfaces that you will allow traffics to get to your INEX2-OWA.  Now you get the idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there, the problem can get only worse.  If  you have complex NAT in Checkpoint it will&lt;/P&gt;&lt;P&gt;get ugly in converting it over to Cisco.  Let me give you another example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assume that your INEX2-OWA has an IP address of 192.168.1.1 and you NAT it 1.1.1.1.&lt;/P&gt;&lt;P&gt;Now you want everyone to get to this host as 1.1.1.1 BUT you want source 129.174.1.0/24&lt;/P&gt;&lt;P&gt;get to this host as 1.1.1.2 and that you want outbound traffics from 192.168.1.1 be seen&lt;/P&gt;&lt;P&gt;as 1.1.1.4 if it is trying to get to 4.2.2.2.  Now you get the idea how complex it has&lt;/P&gt;&lt;P&gt;become.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to offer you this advise:  Be VERY careful when you do this because there is &lt;/P&gt;&lt;P&gt;a very likelyhood you will cause a network outtage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2008 13:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-general-questions/m-p/1032350#M895373</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-08T13:34:37Z</dc:date>
    </item>
  </channel>
</rss>

