09-04-2017 03:51 PM - edited 02-21-2020 06:16 AM
Hi,
How can I block all ports from inside to outside and allow only specific traffic towards outside.
What is the best practice to do that? Should I use ACL or global_policy?
Solved! Go to Solution.
09-04-2017 04:39 PM
09-05-2017 03:35 PM
Hi
Here are 2 examples.
If your 2 subnets are behind the same interface, it would be easier to create the acl for this interface, let's say it's named inside:
object network LAN-10
subnet 10.10.10.0 255.255.255.0
object network LAN-20
subnet 10.10.20.0 255.255.255.0
object-group service TEST-TCP tcp
port-object eq ftp
port-object eq smtp
access-list inside_access_in line 1 extended permit tcp object LAN-10 any object-group TEST-TCP
access-list inside_access_in line 2 extended permit ip object LAN-20 any
access-group inside_access_in in interface inside
If those subnets are over multiple interfaces, you can also choose to create a global policy. But be sure to not override this by a local acl attached to the interface. As soon as you have an interface acl, this one will take precedence over the global one:
object network LAN-10
subnet 10.10.10.0 255.255.255.0
object network LAN-20
subnet 10.10.20.0 255.255.255.0
object-group service TEST-TCP tcp
port-object eq ftp
port-object eq smtp
access-list global_access line 1 extended permit tcp object LAN-10 any object-group TEST-TCP
access-list global_access line 2 extended permit ip object LAN-20 any
access-group global_access global
Hope that answers your question.
PS: Please don't forget to rate and select as accepted answer if this answered your question
09-04-2017 04:39 PM
09-05-2017 05:39 AM
09-05-2017 03:35 PM
Hi
Here are 2 examples.
If your 2 subnets are behind the same interface, it would be easier to create the acl for this interface, let's say it's named inside:
object network LAN-10
subnet 10.10.10.0 255.255.255.0
object network LAN-20
subnet 10.10.20.0 255.255.255.0
object-group service TEST-TCP tcp
port-object eq ftp
port-object eq smtp
access-list inside_access_in line 1 extended permit tcp object LAN-10 any object-group TEST-TCP
access-list inside_access_in line 2 extended permit ip object LAN-20 any
access-group inside_access_in in interface inside
If those subnets are over multiple interfaces, you can also choose to create a global policy. But be sure to not override this by a local acl attached to the interface. As soon as you have an interface acl, this one will take precedence over the global one:
object network LAN-10
subnet 10.10.10.0 255.255.255.0
object network LAN-20
subnet 10.10.20.0 255.255.255.0
object-group service TEST-TCP tcp
port-object eq ftp
port-object eq smtp
access-list global_access line 1 extended permit tcp object LAN-10 any object-group TEST-TCP
access-list global_access line 2 extended permit ip object LAN-20 any
access-group global_access global
Hope that answers your question.
PS: Please don't forget to rate and select as accepted answer if this answered your question
09-06-2017 11:24 AM
09-06-2017 11:37 AM - edited 09-06-2017 11:56 AM
I have a question regarding VPN, my IPSec site-to-site keep disconnecting if it's idle. I tried to put lifetime 0 and lifetime 84600 but it disconnects after a while.
And then I have to re-initiate the traffic from both ends and it connects back.
Also below is the logs what are these logs?
17:14:57 [IKEv1]Group = 1.1.1.1, IP = 1.1.1.1, Removing peer from correlator table failed, no match!
Sep 06 17:32:37 [IKEv1]Group = 1.1.1,1, IP = 1.1.1.1, Automatic NAT Detection Status: Remote end is NOT behind a NAT device This end is NOT behind a NAT device
FW-COLUMBUS-01# show running-config | inc nat
nat (inside,outside) source static IPSEC-L2L-LAN IPSEC-L2L-LAN destination static IPSEC-L2L-REMOTE IPSEC-L2L-REMOTE
nat (inside,outside) source static ANYCONNECT-LOCAL ANYCONNECT-LOCAL destination static ANYCONNECT-REMOTE ANYCONNECT-REMOTE no-proxy-arp route-lookup
nat (inside,outside) after-auto source dynamic any interface
09-06-2017 01:26 PM
09-06-2017 06:01 PM
09-07-2017 05:35 AM - edited 09-07-2017 12:28 PM
.
09-07-2017 12:27 PM
09-07-2017 05:12 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide