<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: newbie question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111225#M895513</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the reply. &lt;/P&gt;&lt;P&gt;Let me clarify some. We start by only allowing all our internal systems a limited amount of out bound services so from there i need to allow anything that this or that system may need to use. Here is an example of what id need to do:&lt;/P&gt;&lt;P&gt;I have a group of internal servers that need to connect to a group of external servers, remembering that above i have already only allowed certain traffic such as 80 &amp;amp; 443 out using the deny any any to block everything else. here is an example of the rule to allow the two server groups to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp object-group Internal_Secure-FTP-Client-Systems object-group External_Secure-FTP-Servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to make sure my logic isn't flawed. And will the fact that the return traffic is essentially established do I need reverse rules or is this not needed.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Oct 2008 20:01:23 GMT</pubDate>
    <dc:creator>sahlim</dc:creator>
    <dc:date>2008-10-03T20:01:23Z</dc:date>
    <item>
      <title>newbie question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111223#M895500</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I'm switching from a checkpoint firewall to an asa5500. I have 2 question's that i hope don't sound to stupid. In writing rules first do i apply the rule to the interface closest to the source device as an incoming rule, and second do i need to write reverse rules also? Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:52:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111223#M895500</guid>
      <dc:creator>sahlim</dc:creator>
      <dc:date>2019-03-11T13:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: newbie question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111224#M895504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generally you'd want to make your outside interface "security 0", create an access-list and then bind it to the interface using the access-group command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For simplicity you don't need an ACL on the inside interface which would be "security 100".  All traffic is permitted from high to low security by default.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2008 18:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111224#M895504</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-10-03T18:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: newbie question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111225#M895513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the reply. &lt;/P&gt;&lt;P&gt;Let me clarify some. We start by only allowing all our internal systems a limited amount of out bound services so from there i need to allow anything that this or that system may need to use. Here is an example of what id need to do:&lt;/P&gt;&lt;P&gt;I have a group of internal servers that need to connect to a group of external servers, remembering that above i have already only allowed certain traffic such as 80 &amp;amp; 443 out using the deny any any to block everything else. here is an example of the rule to allow the two server groups to communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp object-group Internal_Secure-FTP-Client-Systems object-group External_Secure-FTP-Servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to make sure my logic isn't flawed. And will the fact that the return traffic is essentially established do I need reverse rules or is this not needed.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2008 20:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111225#M895513</guid>
      <dc:creator>sahlim</dc:creator>
      <dc:date>2008-10-03T20:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: newbie question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111226#M895523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First of all, welcome to Cisco's world.  You're&lt;/P&gt;&lt;P&gt;going to a platform with excellent management&lt;/P&gt;&lt;P&gt;capability (Checkpoint) to a platform that is&lt;/P&gt;&lt;P&gt;not that great in terms of management &lt;/P&gt;&lt;P&gt;capability (Cisco).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, Your logic is good.  &lt;/P&gt;&lt;P&gt;Furthermore, I also put in stealth and clean-up&lt;/P&gt;&lt;P&gt;rules, since you're familiar with Checkpoint,&lt;/P&gt;&lt;P&gt;on the ASA for better troubleshooting if I &lt;/P&gt;&lt;P&gt;were you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access deny ip any Firewall _Inside_ip_address log&lt;/P&gt;&lt;P&gt;access-list inside_access deny any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access deny ip any Firewall_outside_ip_address log&lt;/P&gt;&lt;P&gt;access-list outside_access deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easy right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Oct 2008 20:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111226#M895523</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-03T20:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: newbie question</title>
      <link>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111227#M895530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, &lt;/P&gt;&lt;P&gt;your ACL&lt;/P&gt;&lt;P&gt;"access-list inside_access_in extended permit tcp object-group Internal_Secure-FTP-Client-Systems object-group External_Secure-FTP-Servers"&lt;/P&gt;&lt;P&gt;will allow all 65356 tcp ports for your external users. In order to open only certain group of ports, you need to modify your ACL like &lt;/P&gt;&lt;P&gt;"access-list inside_access_in extended permit tcp object-group Internal_Secure-FTP-Client-Systems object-group External_Secure-FTP-Servers object-group ports-for-internal-to-external-server"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Oct 2008 02:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/newbie-question/m-p/1111227#M895530</guid>
      <dc:creator>mohsin.khan</dc:creator>
      <dc:date>2008-10-07T02:56:09Z</dc:date>
    </item>
  </channel>
</rss>

