<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: stop conn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045457#M896694</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cl local-host &lt;PRIVATE ip="" of="" web="" server=""&gt;&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;cl xlate global &lt;HACKER address=""&gt;&lt;/HACKER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Sep 2008 16:00:42 GMT</pubDate>
    <dc:creator>suschoud</dc:creator>
    <dc:date>2008-09-09T16:00:42Z</dc:date>
    <item>
      <title>stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045456#M896692</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PIX-515E with version 6.3(4). I saw an IP address is hacking my web server in DMZ on port 80. I deny the ip address on my outside access-list. But when I do "sh conn | i x.x.x.x", I am still seeing that ip address. Could anyone tell me how to stop that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;Gene&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045456#M896692</guid>
      <dc:creator>gpan667788</dc:creator>
      <dc:date>2019-03-11T13:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045457#M896694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cl local-host &lt;PRIVATE ip="" of="" web="" server=""&gt;&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;cl xlate global &lt;HACKER address=""&gt;&lt;/HACKER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 16:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045457#M896694</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-09T16:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045458#M896695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Sushil! Could you tell me why ACL deny statement on the outside interface did not take care of the problem right the way? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 16:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045458#M896695</guid>
      <dc:creator>gpan667788</dc:creator>
      <dc:date>2008-09-09T16:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045459#M896698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way ASA processes traffic,it first looks at any existing connection.If there is one,traffic is directly sent without the acl check.So,if acl is added afterwards and a connection entry is already in place,you would need to get rid of the existing connection.Afterwards,acl check would be taken into the consideration again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your reference,here is what asa checks and in what order:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Legends:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Recieve Packet.&lt;/P&gt;&lt;P&gt;2. Existing Connection?&lt;/P&gt;&lt;P&gt;3. Permit by Inbound ACL on interface?&lt;/P&gt;&lt;P&gt;4. Match translation rule (nat, static).&lt;/P&gt;&lt;P&gt;5. NAT embedded IP and perform security checks / randomize sequence number.&lt;/P&gt;&lt;P&gt;6. NAT IP header.&lt;/P&gt;&lt;P&gt;7. Pass packet to outgoing interface.&lt;/P&gt;&lt;P&gt;8. Layer 3 route lookup?&lt;/P&gt;&lt;P&gt;9. Layer 2 next hop?&lt;/P&gt;&lt;P&gt;10. Transmit packet.           &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT ORDER OF OPERATIONS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rules are tried in order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    1) nat 0 access-list (nat-exempt)&lt;/P&gt;&lt;P&gt;    2) match against existing xlates&lt;/P&gt;&lt;P&gt;    3) static&lt;/P&gt;&lt;P&gt;       a) static nat with and without access-list (first match)&lt;/P&gt;&lt;P&gt;       b) static pat with and without access-list (first match)&lt;/P&gt;&lt;P&gt;    4) nat&lt;/P&gt;&lt;P&gt;       a) nat &lt;ID&gt; access-list (first match)&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;      Note: nat 0 access-list is not part of this command.&lt;/P&gt;&lt;P&gt;       b) nat &lt;ID&gt; &lt;ADDRESS&gt; &lt;MASK&gt; (best match)&lt;/MASK&gt;&lt;/ADDRESS&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;      Note:  When choosing a global address from multiple pools with&lt;/P&gt;&lt;P&gt;           the same nat id, the following order is tried&lt;/P&gt;&lt;P&gt;           i) if the id is 0, create an identity xlate.&lt;/P&gt;&lt;P&gt;           ii) use the global pool for dynamic NAT&lt;/P&gt;&lt;P&gt;           iii) use the global pool for dynamic PAT&lt;/P&gt;&lt;P&gt;    5) Error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0&lt;/P&gt;&lt;P&gt;  Nat 0 has two affects&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   1. nat (inside) 0 access-list 101     This works exaclty the same way as static, except bypasses NAT.  It does not require the connection to be initiated from the Higher Security Inteface before the host on the Lower Security interface can create a connection to the host on the Higher Security level interface&lt;/P&gt;&lt;P&gt;   2. nat (inside) 0 0.0.0.0 0.0.0.0     This bypasses NAT, but requires the host on the Higher Security interface to first initiate a connection to the host on the Lower Security interface before the host on the Lower Security interface can initiate a connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sushil       &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 16:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045459#M896698</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2008-09-09T16:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045460#M896700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much Sushil!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Sep 2008 17:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045460#M896700</guid>
      <dc:creator>gpan667788</dc:creator>
      <dc:date>2008-09-09T17:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: stop conn</title>
      <link>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045461#M896704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right way is use "shun" command, not the access-list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2008 07:48:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stop-conn/m-p/1045461#M896704</guid>
      <dc:creator>Ivast</dc:creator>
      <dc:date>2008-09-11T07:48:22Z</dc:date>
    </item>
  </channel>
</rss>

