cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
258
Views
0
Helpful
4
Replies

Need Help to create access-list based on traffic logs

sindbandgi
Level 1
Level 1

Hello,

We didn't have any Firewall in our network, we recently implemented  Cisco ASA (Context) firewall in our network with any  any permit rule .

 

Our intension is to collect the source, destination, protocol & ports based on the traffic logs and then implement the access-lists , once we confirmed all the rule will added to the firewall we want remove any any permit rule .

 

I need some suggestion regarding this how we can proceed on this plan, any suggestions appreciated

Rajkumar

4 Replies 4

nkarthikeyan
Level 7
Level 7

Hi Sind,

It is not a fair idea to create filters based on the logs in firewall. If so then you will be allowing unwanted traffic as well. So you need to identify the service by service from the business requirement. add the specific rule on top of permit ip any any and add the required rule on top of that... then monitor the hits for each access you have identified and provided.... then at last stage you can remove the permit ip any any from FW ACL.

 

Regards

Karthik

 

 

Thank you, I agree it is not fare idea however doyou have any specific steps to follow the identify the services as business users were not in position to provide any inforamation about the Services.

 

I need to find this out from the Firewall traffi rules only.

 

Any suggestions appreciated.

 

Regards

Rajkumar

 

Hi Rajkumar,

 

That is not the ideal way of doing... this will lead to a provisioning an unauthorized person to access for something he is not authorized to.

 

How many users do you have in your network? Try to categorize users based on their present authorization level of access.... say Team A users need to access everything... then you need to group them and provide full access..... Team B users need to be provided with only restricted access.... then group them and provide restricted access....

 

If your case is something like this.... all users need unrestricted intranet access and certain users alone requires internet acceess... then you can define rules accordingly....

 

Regards

Karthik

 

Regards

Karthik

I agree with Karthik. Creating rules based on logs and existing connections is not ideal. However, if you want to monitor what is passing through, you can log your ACL entries and use "Show conn" command to see what is already established. 
Thank you for rating helpful posts! 
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card