<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What DOESN'T 'permit IP any any' allow? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946587#M918464</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have permit ip any any on both interfaces , you make the firewall a fire-router. But having said that, they really have to be careful about the inspections/fixup/ALGs performed by most commercial firewalls now. So try to run a pilot version and try to test these inspected protocols e.g. FTP, TFTP, H.323, SIP, MGCP etc. These fixups end of breaking a lot of legitimate connections. For example a Polycom product would not work with the H.323 inspection of the ASA, a Nortel phone would not work with the SIP inspection enabled etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jun 2008 14:16:51 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2008-06-12T14:16:51Z</dc:date>
    <item>
      <title>What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946586#M918461</link>
      <description>&lt;P&gt;A service provider customer wants to install a pair of fail-over multi-context firewalls in the least disruptive configuration (permit ip any any, inbound and outbound). Over time and according to a multi-phased plan, they will tighten the filtering, filtering that can impact many different customers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question is, what protocols won't pass a typical perimeter firewall with permit IP any any in place. I'm thinking of things like ESP. Any other common ones to consider?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Comments welcome.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946586#M918461</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2019-03-11T12:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946587#M918464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have permit ip any any on both interfaces , you make the firewall a fire-router. But having said that, they really have to be careful about the inspections/fixup/ALGs performed by most commercial firewalls now. So try to run a pilot version and try to test these inspected protocols e.g. FTP, TFTP, H.323, SIP, MGCP etc. These fixups end of breaking a lot of legitimate connections. For example a Polycom product would not work with the H.323 inspection of the ASA, a Nortel phone would not work with the SIP inspection enabled etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 14:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946587#M918464</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-12T14:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946588#M918467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good answers.  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you aware of any routing protocols that do some communicating not covered by IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;m.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946588#M918467</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2008-06-12T15:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946589#M918470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander, can you please elucidate this question a little more:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"routing protocols that do some communicating not covered by IP"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946589#M918470</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-12T15:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946590#M918472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had some other responses from other information sources eluding to this. I'm going to guess this could perhaps be something like non-IP routing protocol security (not IPSec) used for peer validation for table exchanges or perhaps some updates.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946590#M918472</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2008-06-12T15:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946591#M918475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps the old NON-IP routing protocols, things related to IPX etc.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946591#M918475</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-12T15:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946592#M918478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah, yeah I suppose that's what the reference was about - that won't be an issue in my customer's case (and hopefully not for anyone else, at least on perimeter firewalls ;-}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;m.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946592#M918478</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2008-06-12T15:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946593#M918481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other protocol that fits the description of having its update traffic not carried in IP would be ISIS which sends its updates using CLNP (rather than IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 15:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946593#M918481</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2008-06-12T15:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946594#M918483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sweet!  Good one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 16:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946594#M918483</guid>
      <dc:creator>mprescher</dc:creator>
      <dc:date>2008-06-12T16:09:15Z</dc:date>
    </item>
    <item>
      <title>Re: What DOESN'T 'permit IP any any' allow?</title>
      <link>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946595#M918485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is from the documentation with what can go in the 'protocol' portion of the ACL:&lt;/P&gt;&lt;P&gt;Name or number of an Internet protocol. It can be one of the keywords eigrp, gre, icmp, igmp, ip, ipinip, nos, ospf, pim, tcp, or udp, or an integer in the range from 0 to 255 representing an Internet protocol number. To match any Internet protocol (including ICMP, TCP, and UDP) use the ip keyword. Some protocols allow further qualifiers described below. &lt;/P&gt;&lt;P&gt;......&lt;/P&gt;&lt;P&gt;so anything that is not IP/tcp/udp, you must explicitly specifiy.&lt;/P&gt;&lt;P&gt;this is for IOS, btw, not PIX/ASA.  the ICMP part above doesn't apply to pix/asa.&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;you can use the protocol numbers or names in asa/pix:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ports.html#wpxref39421" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ports.html#wpxref39421&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jun 2008 16:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-doesn-t-permit-ip-any-any-allow/m-p/946595#M918485</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2008-06-12T16:48:24Z</dc:date>
    </item>
  </channel>
</rss>

