<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access-list questions inside to DMZ interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742817#M980471</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean the the traffic is allowed both ways? In the first example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic can flow from 192.168.100.5, any port TO 10.1.10.15 on port 2100,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and 10.1.10.15 port 2100 can send traffic TO 192.168.100.5 on any port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also&lt;/P&gt;&lt;P&gt;Say for example the traffic was in the other direction, that the host on the DMZ was sending information to the inside interface and the source was port 2100, would it look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 eq 2100 host 10.1.10.15  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 May 2007 23:53:16 GMT</pubDate>
    <dc:creator>wilson_1234_2</dc:creator>
    <dc:date>2007-05-17T23:53:16Z</dc:date>
    <item>
      <title>access-list questions inside to DMZ interfaces</title>
      <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742815#M980469</link>
      <description>&lt;P&gt;I have some questions regarding an access-list applied tinbound to a DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If the firewall is stateful, and the NAT statements are set up correctly, then anyone from an inside interface should be able to access anything on the DMZ interface, with no access-applied correct?&lt;/P&gt;&lt;P&gt;2. the access-list that only permits certain hosts on the inside interface to access the DMZ, is put in place to prevent just anyone on the "inside" interface from accessing the DMZ correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. The below access-list, if it were applied inbound to the DMZ interface goes which way?&lt;/P&gt;&lt;P&gt;How can you tell which direction the traffic flows by looking at the access-list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ interface address is 192.168.100.1&lt;/P&gt;&lt;P&gt;Inside interface is 1&lt;/P&gt;&lt;P&gt;0.1.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access is :&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742815#M980469</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2019-03-11T10:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: access-list questions inside to DMZ interfaces</title>
      <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742816#M980470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Wilson,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are answers to your questions-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Correct.&lt;/P&gt;&lt;P&gt;2. Correct.&lt;/P&gt;&lt;P&gt;3. access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this access-list is applied using following command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group dmz in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it would imply that host 192.168.100.5 is allowed to initiate connection to host 10.1.10.15 on port 2100. However, as 10.1.10.15 is on a higher security-level interface (inside), to permit the connection through, we would also need following static command in place-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.10.15 10.1.10.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if the "dmz" ACL contains only one line, all the traffic except what is defined in the list will be denied due to implicit deny at the end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 22:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742816#M980470</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-05-17T22:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: access-list questions inside to DMZ interfaces</title>
      <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742817#M980471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean the the traffic is allowed both ways? In the first example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic can flow from 192.168.100.5, any port TO 10.1.10.15 on port 2100,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and 10.1.10.15 port 2100 can send traffic TO 192.168.100.5 on any port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also&lt;/P&gt;&lt;P&gt;Say for example the traffic was in the other direction, that the host on the DMZ was sending information to the inside interface and the source was port 2100, would it look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 eq 2100 host 10.1.10.15  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 23:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742817#M980471</guid>
      <dc:creator>wilson_1234_2</dc:creator>
      <dc:date>2007-05-17T23:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: access-list questions inside to DMZ interfaces</title>
      <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742818#M980472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ACL as applied on the DMZ interface as inbound, only controls the traffic initiated from the DMZ and not the traffic initiated from the inside. Once this traffic is initiated, the return traffic from inside to DMZ will automatically flow, PIX being a stateful firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To control what traffic can be initiated from inside interface to other networks, you need ACL applied on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence, this ACL-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 host 10.1.10.15 eq 2100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does not control what ports can 10.1.10.15 can initiate connection to 192.168.100.5, this can be controlled by ACL applied on inside interface of PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--quoting--&lt;/P&gt;&lt;P&gt;Say for example the traffic was in the other direction, that the host on the DMZ was sending information to the inside interface and the source was port 2100, would it look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit tcp host 192.168.100.5 eq 2100 host 10.1.10.15 &lt;/P&gt;&lt;P&gt;-----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely correct .. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2007 12:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742818#M980472</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-05-18T12:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: access-list questions inside to DMZ interfaces</title>
      <link>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742819#M980473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great dialogue!  To fill in the gaps, is it fair to assume the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.  To allow the inside host to travese from inside to dmz that there was the following statement nat statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.1.10.5 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.  Would there also need to be a similar statement for the dmz host like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 0 192.168.100.5 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Timothy Bogie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 04:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-questions-inside-to-dmz-interfaces/m-p/742819#M980473</guid>
      <dc:creator>tbogie_gvds</dc:creator>
      <dc:date>2007-05-31T04:48:29Z</dc:date>
    </item>
  </channel>
</rss>

