Lab Minutes Forum

Technical Discussion => Security => Topic started by: LoboPR on April 16, 2024, 08:38:01 AM

Title: FTD - Access Control Policy - Implicit Deny any any
Post by: LoboPR on April 16, 2024, 08:38:01 AM
Hi,
I come from the ASA side of firewalls. Have a few questions.
1- In the ASA ACL you would have an implicit Deny any any at the end of the ACL. That would block all traffic not explicitly permitted in the ACL. Best practice would be to enter it as an ACE at the last position with the log option.

Is this the same with the ACP on the FTD?

2-With just configuring NAT on the ASA. The traffic from the higher security level can pass to the lever security lever (ex inside (100) outside (0))

On the FTD I notice that the security levels are all level 0 and no place to change this.

Do we have to explicitly permit outgoing traffic before the deny?

Thanks,
Title: Re: FTD - Access Control Policy - Implicit Deny any any
Post by: MC on April 18, 2024, 07:45:28 PM
1. Access Policy in FTD has a configurable default rule at the bottom. You can set it to deny or allow.

2. There is no concept of Security Level in FTD. All interfaces would show as 0 on CLI. You need to create a zone, assign to each interface, and come up with an Access Policy that will control traffic between zone. By default, traffic is not allowed between interfaces.
Title: Re: FTD - Access Control Policy - Implicit Deny any any
Post by: LoboPR on April 19, 2024, 11:27:19 AM
Ok,

So what would be like the best practice:

First Pre-filters - Like you mention on the video training. Then
ACP:
1- Allow inbound traffic to static NAT (inside Servers)
2- Monitor - all Traffic (for discovery)
3- Allow outgoing traffic from users (Url, application, malware and IPS)
4- Deny Any Any
 
Does the stateful feature still apply?
If I allow a packet to go out, would the return traffic make it in?)
Title: Re: FTD - Access Control Policy - Implicit Deny any any
Post by: MC on April 21, 2024, 09:13:05 PM
Pre-filter is like an interface ACL. It can only match IP/Port/Protocol and is stateless so it should only be used to match simple traffic and has rules that are fairly static.

For ACP, traffic is matched by zone pair first so their orders do not really matter. Within the same zone pair, more specific rules should go to the top. ACP is always stateful.
SimplePortal 2.3.7 © 2008-2024, SimplePortal