<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Bidirectional rule for ASA 5585 Access-rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351119#M979344</link>
    <description>&lt;P&gt;Hello, I built a rule that allows server 1.1.1.1(source) access to server 2.2.2.2(destination) on port 8400 and I tested the rule to make sure it works.&amp;nbsp; I understand that firewalls are statefull and should agree on both directions, but lets say that this time server 2.2.2.2 needs to access server 1.1.1.1 on port 8400.&amp;nbsp; Would that work without an additional rule?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:32:08 GMT</pubDate>
    <dc:creator>Amafsha1</dc:creator>
    <dc:date>2020-02-21T15:32:08Z</dc:date>
    <item>
      <title>Bidirectional rule for ASA 5585 Access-rule</title>
      <link>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351119#M979344</link>
      <description>&lt;P&gt;Hello, I built a rule that allows server 1.1.1.1(source) access to server 2.2.2.2(destination) on port 8400 and I tested the rule to make sure it works.&amp;nbsp; I understand that firewalls are statefull and should agree on both directions, but lets say that this time server 2.2.2.2 needs to access server 1.1.1.1 on port 8400.&amp;nbsp; Would that work without an additional rule?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351119#M979344</guid>
      <dc:creator>Amafsha1</dc:creator>
      <dc:date>2020-02-21T15:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: Bidirectional rule for ASA 5585 Access-rule</title>
      <link>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351130#M979345</link>
      <description>Stateful FW means you don't need the "mirror FW rule" in regard to the already "established traffic".&lt;BR /&gt;&lt;BR /&gt;So if 1.1.1.1 initiates traffic towards 2.2.2.2 then the stateful FW will allow the mirror traffic, but your current rule will NOT allow traffic INITIATED by 2.2.2.2 towards 1.1.1.1</description>
      <pubDate>Mon, 19 Mar 2018 19:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351130#M979345</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-03-19T19:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Bidirectional rule for ASA 5585 Access-rule</title>
      <link>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351133#M979346</link>
      <description>&lt;P&gt;Ok, so than I need to build an additional rule to accomplish this?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 19:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351133#M979346</guid>
      <dc:creator>Amafsha1</dc:creator>
      <dc:date>2018-03-19T19:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Bidirectional rule for ASA 5585 Access-rule</title>
      <link>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351178#M979347</link>
      <description>The answer is a little complicated, but basically, yes, you might need a second rule.  It depends on how many access-lists you have applied to the interfaces and what the interface security levels rare.  In a trivial firewall setup with ingress rules on the outside interface, and an inside interface with a higher security level, and no other access-lists, you might get the 2.2.2.2 to 1.1.1.1 direction for free.  In a more complicated setup with both ingress and egress lists on both interfaces, or more interfaces, you might have to modify two or more lists to allow the traffic.  It depends on things like whether the lists have a default allow (permit any any) or default deny (deny any any) stance at the end, for example.  The packet-tracer command can help you figure out if a rule is needed, by simulating packet traffic and telling you if it would be allowed, or where it would be blocked if denied.</description>
      <pubDate>Mon, 19 Mar 2018 20:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bidirectional-rule-for-asa-5585-access-rule/m-p/3351178#M979347</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2018-03-19T20:31:00Z</dc:date>
    </item>
  </channel>
</rss>

