?
Solved

ASA:  Rule Application

Posted on 2007-03-21
1
Medium Priority
?
283 Views
Last Modified: 2010-04-12
Hello Experts,

New to Cisco ASA appliancs and I am wondering, when you are in the Security Policy window and you see the interfaces listed and under each interface are from what it seems are rules that apply to the interface.  Are the rules applied as packets enter the interface?  Can someone provide an overview as to how these applies to the interface?

As always, thank you in advance for your time on this matter.
0
Comment
Question by:coperator
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 28

Accepted Solution

by:
batry_boy earned 2000 total points
ID: 18763288
You are correct in your statement that the rules listed under each interface apply to that interface.  You can apply two sets of rules to each interface...one in an inbound direction and one in an outbound direction.  In the ASDM, the direction of the rule application is listed under the column "Rule Appled to Traffic"...it will say either "incoming" or "outgoing".  If it says "incoming" for a particular rule then that rule is applied to packets as they enter that interface.  If it says "outgoing" for a particular rule then that rule is applied to packets as they exit the interface, meaning other functions such as NAT have already taken place before the rule is applied.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question