03-05-2020 07:08 PM - edited 03-05-2020 07:14 PM
Hi Everyone,
We are using a shared Cisco ASA firewall that is managed by an external ISP.
I'm trying to get my head around the confusing terminology for the outbound and inbound interfaces that have ACL permit rules as follows:
OUTBOUND
company_out applied to COMPANY interface as an outbound access list.
access-list company_out line
ACLs are always permit <external IP> to <internal Company IP> eq port
Question: Shouldn't it be the other way round so we are permitting/allowing the internal IP 'out to' the external IP?
INBOUND
company_in Applied to COMPANY interface as an inbound access list.
access-list company_in line
ACLs are always permit ip <Company internal IP> to <External IP> eq port
Question: Shouldn't it be the other way round so we are permitting/allowing the external IP 'in to' the internal IP?
Thanks in advance.
03-05-2020 09:05 PM
03-05-2020 09:11 PM
Thank you Francesco for the reply.
Would you have any good source links with images explaining the above?
I have found a few below, but still not 100% clear unless I can visualise the interfaces!
Steve
https://blog.router-switch.com/2014/02/cisco-acls-in-and-out-on-cisco-asa/
http://www.techspacekh.com/access-control-list-acl-with-cisco-asa-firewall-appliance/
https://daveonsecurity.wordpress.com/2017/02/20/cisco-asa-fundamentals-part-2/
03-05-2020 09:23 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide