Link to home
Start Free TrialLog in
Avatar of Shark Attack
Shark Attack

asked on

asa permit statement

Hello all, I am using asa 5520 8.2

If I want to allow TCP-traffic from port 3386  out from a specific host on the inside to the internet, how would my statement look? Also, do I need any static nat for this ?
Avatar of Jan Bacher
Jan Bacher
Flag of United States of America image

Do you have an inside access list that restricts traffic from a higher security level to a lower security level?

Typically, you need to static NAT an outside-to-inside statment and your permit goes in your outside access list.  By default, the return traffic will be permitted.
Avatar of Shark Attack
Shark Attack

ASKER

I do not have access list that restricts traffic from a higher security level to a lower security level.

Thats all I have

access-list 25block line 1 extended permit ip any any (hitcnt=1374584) 0xc0935ddd
access-list 25block line 2 extended permit icmp any any (hitcnt=0) 0x21c6f828

But, here is what I am doing

I have an inside host using specific port 3386 going to IP public address. I am assuming this requires NAT ?
access-list extended inside_out permit tcp host <specific_inside_ip> any eq 3389

you will also need the following:

access-group inside_out out interface outside


Its a security best practice to filter your traffic inbound and outbound. The access list above can also use object groups which can make additional access-lists easier to manage

here is a good url;

http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/configuration/guide/conf_gd/nwaccess.html


harbor235 ;}
and no "nat" is  needed ?
First of all, call your outside access list something less cryptic like "outside_in".

You *don't* specify the inside IP in 8.2 but the outside IP.

And, yes, you need NAT.
Yes you will need nat, I assumed that part of the configuration was already present.

Also, since your question included questions regarding a flow from the inside out that's what I provided, and the other expert is correct you will need a corresponding policy for inbound traffic similar to the outbound statement.

outbound:(there was a mistake earlier in my post)
access-list extended inside_out permit tcp host <specific_inside_ip> eq 3389 any

you will also need the following:
access-group inside_out out interface outside

inbound:
access-list extended outside_in permit tcp any host <specific_global_inside_ip> eq 3389

you will also need the following for outside_in:
access-group outside_in out interface outside

regarding the NAT there are several ways to achieve this, static nat, source nat, and destination nat.


harbor235
One more type on the inbound acl

access-group outside_in in interface outside

harbor235 ;}
I just found out exactly what's needed. Keep in mind im on 8.2 Can you help with a syntax for this?

One way traffic initiated only from the host to outside server.
Source IP: 10.153.12.50
Source port : 3386
Destination port : ANY
Destination host: it's an outside IP address let's say 5.5.5.5, my question is, what if I wanted to use hostname here intead of an IP?

And how would my ACL look like for the outside interface for the above?


thank you !
(harbor) Right, but you also applied the "inside" access list to the outside interface.  And, if it were an inside access list, it would be in the format of:

access-list inside_in extended permit tcp host <inside_IP> eq 3389 any
access-group inside_in in interface in

And once you do that, you've blocked all other inside traffic unless explicitly permitted.
static (inside,outside) OUTSIDE_IP INSIDE_IP netmask 255.255.255.255
static (outside,inside) INSIDE_IP OUTSIDE_IP netmask 255.255.255.255

access-list outside_in extended permit tcp any host OUTSIDE_IP eq 3389
access-group outside_in in interface outside
Thank you Jan, in terms of the below, the inside IP i will use as the internal host and the OUTSIDE_IP would be the server IP ?correct?

static (inside,outside) OUTSIDE_IP INSIDE_IP netmask 255.255.255.255
static (outside,inside) INSIDE_IP OUTSIDE_IP netmask 255.255.255.255
(config) object-group network <hostname>
(config-network) network-object  host x.x.x.x

outbound:
access-list extended inside_out permit tcp  object-group <hostname>  eq 3389 any

you will also need the following:
access-group inside_out out interface outside

inbound:
access-list extended outside_in permit tcp any host object-group <hostname> eq 3389

you will also need the following for outside_in:
access-group outside_in in interface outside


harbor235 ;}
SOLUTION
Avatar of harbor235
harbor235
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
well thank you guys. I will make sure to use to "reload" function as this can go south very quickly. Thank you for all your help