05-09-2012 06:49 AM - edited 03-11-2019 04:04 PM
Hi there,
I'm new to the ASA 5505 appliance and have a few very basic questions. Hope I get some responses and not flamed for being a total newbie. :-)
Your help is greatly appreciated.
05-09-2012 07:01 AM
Hi Ralf,
1. You can follow this thread, there is a detailed description in there, but if you still have any questions, then let me know:
https://supportforums.cisco.com/message/3400624#3400624
2. Service means, which ports you want to specify in the ACL, lets say you want to block or allow traffic which is originated from a specific port on that IP address, so that's what the option is for.
Thanks,
Varun Rao
Security Team,
Cisco TAC
05-09-2012 07:20 AM
Thanks, Varun, that was speedy!
So to clarify: If we DENY all INBOUND traffic on the INSIDE interface for the HTTP service that means that once a host on the inside networks tries to open an http packet it gets dropped when trying to enter the firewall. Is that correct?
As to my second question, I was asking more specifically why there is a Service field and a separate Source Service field.
One last remark, to really understand this in detail. Why, in the above scenario, would a DENY HTTP rule configure on the INSIDE interface but for the OUTGOING direction not block http traffic? I understand that hosts would still get into the inside interface, but shouldn't the rule than block the traffic from going out?
Or would this require the rule on the outside network?
05-09-2012 07:46 AM
Hi Ralf,
Yes, if you put a deny http, it would drop all packets for destination as http port, but be mindful that when you apply an access-list on your inside interface, it automatically activates the deny ip any any right at the bottom, you would be able to see that in the ASDM. So for the users that need be allowed access to the http, needs to be explicitly allowed http access, so your correct configuration would be:
access-list inside_access_in deny tcp host 192.168.1.1 255.255.255.255 any eq http
access-list inside_access_in permit tcp any any
access-group inside_access_in interface inside
This would block 192.168.1.1 to go to internet, but allow all others.
Second question, i haven't chceked the ASDM, but just remember out of memory, that this service option should be the protocol, whether ip,tcp,udp,esp or gre etc.
Moreover always try to block connections as closed to the source as possible, this would mean, if you want to filter traffic going from inside to outside, that should be done on the inside interface not outside.
Thanks,
Varun Rao
Security Team,
Cisco TAC
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide