01-12-2013 08:51 AM - edited 03-11-2019 05:46 PM
I've to lockdown the firewall by ip address and port.
i.e. I've to lock down the firewall from OUTSIDE to INSIDE based on ip address & port. we don't know what ports we need to lock down so we would have to do logging and than find out which desinate ip and port those source IP addresses communicate to.
what logging do we have to enable to get that level of detail?
01-12-2013 08:58 AM
Hi,
If you have an ACL permitting some traffic from the OUTSIDE to INSIDE, all the rest of the traffic should already be blocked by the Implicit Deny at the end of every ACL (doesnt show in the CLI format of the configuration but shows on the ASDM side)
Is you OUTSIDE interface ACL very open at the moment?
Your logging level should be atleast "informational"
This would mean configurations like
logging on
logging device-id hostname
logging timestamp
logging trap informational
logging host
Which would
- Jouni
01-12-2013 07:37 PM
Is this ASA or FWSM? If this is ASA then, high to low security traffic (inside to outside) is automatically allowed without an ACL applied on the inside interface. From outside to inside, you would have to allow what is needed via ACL.
If you have webservers behind the ASA then, you would have allow people on the internet to be able to access it and can't restrict it based on source IP addresses on the internet unless you know who you need to allow permission from the internet to access your web server.
As far as logging is concerned, pls. follow what Jouni has suggested.
Pls. join me on Tuesday.
https://supportforums.cisco.com/community/netpro/expert-corner#view=webcasts
Upcoming Live Webcast in English: January 15, 2013
Troubleshooting ASA and Firewall Service Modules
Register today for this Cisco Support Community live webcast.
-Kureli
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide