<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ACL Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798334#M1006368</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Live Internet Interface&lt;/P&gt;&lt;P&gt; nameif Live_Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 195.167.187.230 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Customer Network &lt;/P&gt;&lt;P&gt; nameif Customer_Net&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 172.17.4.2 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Protected Network&lt;/P&gt;&lt;P&gt; nameif Protected_Net&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.9.224.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Live Network Interface &lt;/P&gt;&lt;P&gt; nameif Live_Net&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.9.230.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;banner exec Welcome to the ASA&lt;/P&gt;&lt;P&gt;banner login Welcome to the ASA&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service ISAKMP udp&lt;/P&gt;&lt;P&gt; port-object eq isakmp&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit 195.167.187.224 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list Live_Net_access_in extended permit icmp any 192.9.230.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 192.9.224.4 eq www &lt;/P&gt;&lt;P&gt;access-list Live_Internet_access_in extended permit tcp any host 195.167.187.230 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Protected_Net) 1 192.9.224.4&lt;/P&gt;&lt;P&gt;static (Live_Internet,Protected_Net) 192.9.224.4 195.167.187.230 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group Live_Internet_access_in in interface Live_Internet&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl_1&lt;/P&gt;&lt;P&gt; default-domain value cognito.co.uk&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; banner none&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server none&lt;/P&gt;&lt;P&gt; dhcp-network-scope none&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec webvpn&lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp disable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs disable&lt;/P&gt;&lt;P&gt; ipsec-udp disable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; intercept-dhcp 255.255.255.255 disable&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout 30&lt;/P&gt;&lt;P&gt; nac disable&lt;/P&gt;&lt;P&gt; nac-sq-period 300&lt;/P&gt;&lt;P&gt; nac-reval-period 36000&lt;/P&gt;&lt;P&gt; nac-default-acl none&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;  functions url-entry&lt;/P&gt;&lt;P&gt;  html-content-filter none&lt;/P&gt;&lt;P&gt;  homepage none&lt;/P&gt;&lt;P&gt;  keep-alive-ignore 4&lt;/P&gt;&lt;P&gt;  http-comp gzip&lt;/P&gt;&lt;P&gt;  filter none&lt;/P&gt;&lt;P&gt;  url-list none&lt;/P&gt;&lt;P&gt;  customization value DfltCustomization&lt;/P&gt;&lt;P&gt;  port-forward none&lt;/P&gt;&lt;P&gt;  port-forward-name value Application Access&lt;/P&gt;&lt;P&gt;  sso-server none&lt;/P&gt;&lt;P&gt;  svc none&lt;/P&gt;&lt;P&gt;  svc keep-installer installed&lt;/P&gt;&lt;P&gt;  svc keepalive none&lt;/P&gt;&lt;P&gt;  svc rekey time none&lt;/P&gt;&lt;P&gt;  svc rekey method none&lt;/P&gt;&lt;P&gt;  svc dpd-interval client none&lt;/P&gt;&lt;P&gt;  svc dpd-interval gateway none&lt;/P&gt;&lt;P&gt;  svc compression deflate&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Live_Internet&lt;/P&gt;&lt;P&gt;http 192.9.200.0 255.255.255.0 Live_Net&lt;/P&gt;&lt;P&gt;snmp-server host Live_Net 192.9.200.185 community cognito&lt;/P&gt;&lt;P&gt;snmp-server location Park Royal CAB1 &lt;/P&gt;&lt;P&gt;snmp-server contact Cognito Network Operations&lt;/P&gt;&lt;P&gt;snmp-server community cognito&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Apr 2007 06:32:08 GMT</pubDate>
    <dc:creator>cksrealm</dc:creator>
    <dc:date>2007-04-25T06:32:08Z</dc:date>
    <item>
      <title>ASA ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798331#M1006365</link>
      <description>&lt;P&gt;HI All, we have just bought two Cisco ASA's that I have setup in a failover pair, Having some issues with the Access Lists however.&lt;/P&gt;&lt;P&gt;I have created an access-list that permits any source to access a web server on the DMZ (Using NAT) However when I browse the the "real" natted address I am getting errors on the ASA saying that the request has been blocked by the implicit deny any statement, I totally understand that however why if I have created an access list that allows http traffic to the Internet address of the webserver should I be getting it, I can post config if required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Idea?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798331#M1006365</guid>
      <dc:creator>cksrealm</dc:creator>
      <dc:date>2019-03-11T10:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798332#M1006366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;post config...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2007 21:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798332#M1006366</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-04-24T21:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798333#M1006367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably missing the static command from your config.&lt;/P&gt;&lt;P&gt;Try the static command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;syntax:&lt;/P&gt;&lt;P&gt;static (inside, DMZ) 'inside_subnet' 'inside_subnet' netmask 'subnet_mask'&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;static (inside, DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2007 21:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798333#M1006367</guid>
      <dc:creator>gwong</dc:creator>
      <dc:date>2007-04-24T21:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798334#M1006368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Live Internet Interface&lt;/P&gt;&lt;P&gt; nameif Live_Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 195.167.187.230 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Customer Network &lt;/P&gt;&lt;P&gt; nameif Customer_Net&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 172.17.4.2 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Protected Network&lt;/P&gt;&lt;P&gt; nameif Protected_Net&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.9.224.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Live Network Interface &lt;/P&gt;&lt;P&gt; nameif Live_Net&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.9.230.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;banner exec Welcome to the ASA&lt;/P&gt;&lt;P&gt;banner login Welcome to the ASA&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-19-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service ISAKMP udp&lt;/P&gt;&lt;P&gt; port-object eq isakmp&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit 195.167.187.224 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list Live_Net_access_in extended permit icmp any 192.9.230.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host 192.9.224.4 eq www &lt;/P&gt;&lt;P&gt;access-list Live_Internet_access_in extended permit tcp any host 195.167.187.230 eq www &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Protected_Net) 1 192.9.224.4&lt;/P&gt;&lt;P&gt;static (Live_Internet,Protected_Net) 192.9.224.4 195.167.187.230 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group Live_Internet_access_in in interface Live_Internet&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl_1&lt;/P&gt;&lt;P&gt; default-domain value cognito.co.uk&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; banner none&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server none&lt;/P&gt;&lt;P&gt; dhcp-network-scope none&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec webvpn&lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp disable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs disable&lt;/P&gt;&lt;P&gt; ipsec-udp disable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; intercept-dhcp 255.255.255.255 disable&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout 30&lt;/P&gt;&lt;P&gt; nac disable&lt;/P&gt;&lt;P&gt; nac-sq-period 300&lt;/P&gt;&lt;P&gt; nac-reval-period 36000&lt;/P&gt;&lt;P&gt; nac-default-acl none&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;  functions url-entry&lt;/P&gt;&lt;P&gt;  html-content-filter none&lt;/P&gt;&lt;P&gt;  homepage none&lt;/P&gt;&lt;P&gt;  keep-alive-ignore 4&lt;/P&gt;&lt;P&gt;  http-comp gzip&lt;/P&gt;&lt;P&gt;  filter none&lt;/P&gt;&lt;P&gt;  url-list none&lt;/P&gt;&lt;P&gt;  customization value DfltCustomization&lt;/P&gt;&lt;P&gt;  port-forward none&lt;/P&gt;&lt;P&gt;  port-forward-name value Application Access&lt;/P&gt;&lt;P&gt;  sso-server none&lt;/P&gt;&lt;P&gt;  svc none&lt;/P&gt;&lt;P&gt;  svc keep-installer installed&lt;/P&gt;&lt;P&gt;  svc keepalive none&lt;/P&gt;&lt;P&gt;  svc rekey time none&lt;/P&gt;&lt;P&gt;  svc rekey method none&lt;/P&gt;&lt;P&gt;  svc dpd-interval client none&lt;/P&gt;&lt;P&gt;  svc dpd-interval gateway none&lt;/P&gt;&lt;P&gt;  svc compression deflate&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Live_Internet&lt;/P&gt;&lt;P&gt;http 192.9.200.0 255.255.255.0 Live_Net&lt;/P&gt;&lt;P&gt;snmp-server host Live_Net 192.9.200.185 community cognito&lt;/P&gt;&lt;P&gt;snmp-server location Park Royal CAB1 &lt;/P&gt;&lt;P&gt;snmp-server contact Cognito Network Operations&lt;/P&gt;&lt;P&gt;snmp-server community cognito&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2007 06:32:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798334#M1006368</guid>
      <dc:creator>cksrealm</dc:creator>
      <dc:date>2007-04-25T06:32:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798335#M1006369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issue has been resolved, had issue with the natting function which I have resolved and it all working a treat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Apr 2007 11:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-question/m-p/798335#M1006369</guid>
      <dc:creator>cksrealm</dc:creator>
      <dc:date>2007-04-25T11:37:51Z</dc:date>
    </item>
  </channel>
</rss>

