Solved

ASA:  Rule Application

Posted on 2007-03-21
1
274 Views
Last Modified: 2010-04-12
Hello Experts,

New to Cisco ASA appliancs and I am wondering, when you are in the Security Policy window and you see the interfaces listed and under each interface are from what it seems are rules that apply to the interface.  Are the rules applied as packets enter the interface?  Can someone provide an overview as to how these applies to the interface?

As always, thank you in advance for your time on this matter.
0
Comment
Question by:coperator
1 Comment
 
LVL 28

Accepted Solution

by:
batry_boy earned 500 total points
ID: 18763288
You are correct in your statement that the rules listed under each interface apply to that interface.  You can apply two sets of rules to each interface...one in an inbound direction and one in an outbound direction.  In the ASDM, the direction of the rule application is listed under the column "Rule Appled to Traffic"...it will say either "incoming" or "outgoing".  If it says "incoming" for a particular rule then that rule is applied to packets as they enter that interface.  If it says "outgoing" for a particular rule then that rule is applied to packets as they exit the interface, meaning other functions such as NAT have already taken place before the rule is applied.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sql server Memory Issue 5 66
UNIX SCP 5 76
File Sharing Using Windows 2012 Server 12 92
Script for Password Expire Notifications 7 118
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

774 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question