05-11-2011 01:09 PM - edited 03-11-2019 01:32 PM
Dear Support,
Can somebody clarify for me the difference between creating rules using Access rules and using ACL Manager?
when i create a rule graphically, i see it on ASDM and when i create the same rule using cli, i cannot see it on Access rules, i can, only see it on ACL Manager, so it's not clear for between access rules and ACL Manger.
Cout on you
Thanks
Solved! Go to Solution.
05-12-2011 11:45 PM
Dear Anisha,
Many Thanks for your help, this really help me
Regards
05-13-2011 11:30 PM
Dear Anisha,
Thanks for you help, but i want to know what is the difference between theses lines:
access-group test in interface inside
access-group test out interface inside
when we need to use IN and when to use OUT ?
Regards
05-14-2011 12:06 AM
Hi Zain,
Its the difference of the direction of traffic flow out of the interface,i if the traffic is in ingress direction, then we use in interafce inside but if we want to apply
ACL for traffic going out of the interface we use out interface inside. Here is a sdmqall diagram:
outside-------------------ASA--------------------Inside
-------------------------->
out interafce inside
outside--------------------ASA-------------------Inside
<-------------------------------
in interafce inside
I hope this would help you in understanding it better.
Thanks,
Varun
05-14-2011 12:11 AM
Hi Zain,
This should clear out things better:
http://www.cisco.com/en/US/partner/docs/security/asa/asa82/command/reference/a1.html#wp1558618
Thanks,
Varun
05-14-2011 12:23 AM
Hi Varun,
it's very clear and thanks,
in my case, i want to allow outside trafic comming from Internet to my web server located in dmz, the direction of trafic will be out interface outside?
Internet-----------ASA------------dmz
-------------------------------------> trafic is from internet to my asa
here is my access-list and access-group
access-list outside_access_in extended permit tcp any host
access-group outside_access_in in interface out
why the access-group is in "IN" ?
05-14-2011 12:44 AM
Hi Zain,
the access-group should be "in interface outside" only because you are blocking tarffic going ingress the outside interafce of the ASA, you can also do out int dmz, but thats not the best practise, you should always block traffic closer to the source, and moreover its not logical to first allow traffic inside your firewall and then block it on dmz interface.
Let me know if you have any questions.
Thanks,
Varun
05-14-2011 12:58 AM
Dear varun
Thanks, It's now clear for me,
my confused was in ingress and outgress.
I understand now
Regards
05-14-2011 01:31 AM
Dear Varun excuse, but i have a strange situation
from my asa, i caanot ping any others nodes which are in the subnet that interface gi0/2
interface GigabitEthernet0/0
nameif out
security-level 0
ip address public-ip 255.255.255.248
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 10.3.4.209 255.255.252.0
!
interface GigabitEthernet0/2
nameif dmz1
security-level 50
ip address 192.168.46.1 255.255.255.0
but, from ASA, i cannot ping 192.168.46.2 (server1) and cannot also ping 192.168.46.3 (server2)
ther interface gi0/2 is in the same vlan that server1 and server 2
Do you have an idea?
05-14-2011 03:11 AM
Zain,
Please anser the following questions:
++ What is your topology, is it something like this?
ASA------------router---------------servers
++ Can you ping the firewall inside IP from the servers?
++ Plz turn off any firewall or anti-virus runnuing on the servers.
++ Can you ping the next hope from the ASA?
Plz let me know the answers, we'll move forward on it.
Thanks,
Varun
05-14-2011 03:30 AM
Hi, Varun,
my topology like this
Internet----------internet-router----------ASA-----------Swicth---------servers (located in dmz and inside depond on port vlan)
from inside, i can ping inside interface of firewall and browsing well
but from servers which are in dmz, i cannot ping asa dmz interface.
the servers has asa dmz interface as gateway.
May be the issue is windows firewall, i will check it
05-14-2011 04:34 AM
Zain,
You might need to add the following commands on firewall:
icmp permit any dmz
try pinging after that, let me know how it goes.
Thanks,
Varun
05-14-2011 05:03 AM
Dear,
It's working fine now
Thanks
Regards
05-16-2011 03:38 AM
Dear Varun,
Please help me on which need to be opened for allowing Cisco SSL VPN Client to pass through firewall.
Regards
05-14-2011 08:22 AM
Hi Zain,
The IN is used when you want the access-list to be applied for traffic coming towards the box on that interface.
The OUT is used when you want the access-list to be applied for traffic going away from the box on that interface.
Hope this helps.
Regards,
Anisha
P.S.: please mark this thread as answered if you feel your query is resolved. Do rate helpful posts.
05-16-2011 03:36 AM
Dear Anisha,
Can you help me on which ports need to be opened on Cisco ASA to allowed SSL VPN to pass.
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide