cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1227
Views
0
Helpful
3
Replies

traffic allowed by default from higher to lower security zone in firewall

rocky2024
Level 1
Level 1

Dear All,

 

In ASA, all traffic allowed by default from higher to lower zone i.e. inside to outside.

 

1) Do we need to allow return traffic on outside interface ? if yes then understanding will like this, traffic allowed by default from inside to outside but return traffic should be allowed on outside interface in inbound direction. correct?

 

2) Please clarify whether all type of traffic and all ports TCP/UDP allowed by default from inside to outside ? absolutely all traffic ??? or certain ports are not allowed by default from Inside to outside?

 

regards,

Sourabh

 

 

2 Accepted Solutions

Accepted Solutions

Hi,
The ASA is stateful and keeps a track of all outbound tcp/udp connections, so when you make a connection outbound it will automatically permit the return traffic.

An exception to this is icmp, it is not stateful like tcp/udp, so you either need to enable "inspect icmp" in the policy map or modify an ACL on the outside interface permitting the traffic.

HTH

View solution in original post

Dennis Mink
VIP Alumni
VIP Alumni

in a nutshell, access lists are applied in an ingress direction, so, if you initiate, yes initiate ttraffic for instance on port 80 and hit your inside interface to go to cnn.com the the response from cnn does NOT have to be explicitly permitted.

Please remember to rate useful posts, by clicking on the stars below.

View solution in original post

3 Replies 3

Hi,
The ASA is stateful and keeps a track of all outbound tcp/udp connections, so when you make a connection outbound it will automatically permit the return traffic.

An exception to this is icmp, it is not stateful like tcp/udp, so you either need to enable "inspect icmp" in the policy map or modify an ACL on the outside interface permitting the traffic.

HTH

Dennis Mink
VIP Alumni
VIP Alumni

in a nutshell, access lists are applied in an ingress direction, so, if you initiate, yes initiate ttraffic for instance on port 80 and hit your inside interface to go to cnn.com the the response from cnn does NOT have to be explicitly permitted.

Please remember to rate useful posts, by clicking on the stars below.

thank you very much
Review Cisco Networking for a $25 gift card