Solved

ASA:  Rule Application

Posted on 2007-03-21
1
277 Views
Last Modified: 2010-04-12
Hello Experts,

New to Cisco ASA appliancs and I am wondering, when you are in the Security Policy window and you see the interfaces listed and under each interface are from what it seems are rules that apply to the interface.  Are the rules applied as packets enter the interface?  Can someone provide an overview as to how these applies to the interface?

As always, thank you in advance for your time on this matter.
0
Comment
Question by:coperator
1 Comment
 
LVL 28

Accepted Solution

by:
batry_boy earned 500 total points
ID: 18763288
You are correct in your statement that the rules listed under each interface apply to that interface.  You can apply two sets of rules to each interface...one in an inbound direction and one in an outbound direction.  In the ASDM, the direction of the rule application is listed under the column "Rule Appled to Traffic"...it will say either "incoming" or "outgoing".  If it says "incoming" for a particular rule then that rule is applied to packets as they enter that interface.  If it says "outgoing" for a particular rule then that rule is applied to packets as they exit the interface, meaning other functions such as NAT have already taken place before the rule is applied.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ACS propagation to secondaries in cluster 2 59
By pass website on ASA for Websense 4 85
Login into my PC 5 47
Creating a Vendor Admin user 23 81
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question