06-17-2013 08:55 PM - edited 03-11-2019 06:59 PM
I have a DMZ on my firewall. DMZ interface is Sec-Level 50. I want the hosts in this DMZ to have unrestricted internet access, and very controlled access to inside hosts. My question, and I'm sure this has been asked before, is what should my ACL look like given that my global policy is an implicit Deny, and as soon as I create a policy to allow DMZ->INSIDE access, it removes the implicit policy that would allow access to the internet.
So I guess my question is, do I have to create policy to 1) PERMIT the desired access from DMZ->INSIDE, DENY the remaining/undesired access from DMZ->INSIDE, and then PERMIT access from DMZ->ANY? This seems ridiculous given the number of network objects that will sit off of my INSIDE interface. To have to remember to add them to some object group that has to exist specifically to suit this DENY is not feasible. Am I missing something, or do I really have to do this?
Thanks
06-17-2013 11:36 PM
Hi,
I dont really know if there is any other way.
What I usually suggest
So for example if you had 3 LAN networks and the single DMZ network you could do
object-group network DMZ-BLOCKED-NETWORKS
network-object 10.10.10.0 255.255.255.0
network-object 10.10.20.0 255.255.255.0
network-object 10.10.30.0 255.255.255.0
access-list DMZ-IN remark Allow connections from DMZ to INSIDE
access-list DMZ-IN permit tcp host 192.168.10.10 host 10.10.10.10 eq
access-list DMZ-IN permit udp host 192.168.10.10 host 10.10.10.10 eq
access-list DMZ-IN remark Block ALL connections from DMZ to INSIDE
access-list DMZ-IN deny ip any object-group DMZ-BLOCKED-NETWORKS
access-list DMZ-IN remak Allow ALL other connections from DMZ
access-list DMZ-IN permit ip 192.168.10.0 255.255.255.0 any
That should pretty much be the basic frame of the ACL
- Jouni
06-19-2013 02:38 PM
Thanks Jouni. That's what I ended up doing, I was just wondering if there was a way to have it allow access to lower security networks like it does if no policy is in place while still having an ACL for higher-security resources. That way I could just specify the DMZ->INSIDE access I want in my policies, while still allowing the internet access as a default behavior. Not a big deal, just thought I'd ask.
thanks again!
06-19-2013 02:43 PM
Hi,
I guess these could always be things that could be changed/added if there was enough interested from many Cisco users. But somehow I imagine it wouldnt be that high priority on Ciscos list.
Please do mark the reply as the correct answer if it answered your question.
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide