<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Object groups - Best practise and limitations in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718132#M1022717</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you group differnet protocols together,you can setup different tcp/udp/icmp ports together too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the limitation :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;protocols: tcp/udp/icmp&lt;/P&gt;&lt;P&gt;ports : 23/24/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then access-list will open these ports for all the protocols which you define in protocol object group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes,there's no better way of doing this.&lt;/P&gt;&lt;P&gt;i suggested a workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sushil&lt;/P&gt;&lt;P&gt;cisco tac&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Mar 2007 14:57:32 GMT</pubDate>
    <dc:creator>suschoud</dc:creator>
    <dc:date>2007-03-23T14:57:32Z</dc:date>
    <item>
      <title>Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718129#M1022708</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say that I want to permit this in an access-list:&lt;/P&gt;&lt;P&gt;source:&lt;/P&gt;&lt;P&gt;   192.168.1.0/24&lt;/P&gt;&lt;P&gt;   192.168.2.0/24&lt;/P&gt;&lt;P&gt;destination:&lt;/P&gt;&lt;P&gt;   10.0.1.0/24&lt;/P&gt;&lt;P&gt;   10.0.2.0/24&lt;/P&gt;&lt;P&gt;ports:&lt;/P&gt;&lt;P&gt;tcp/22&lt;/P&gt;&lt;P&gt;tcp/23&lt;/P&gt;&lt;P&gt;udp/53&lt;/P&gt;&lt;P&gt;udp/555&lt;/P&gt;&lt;P&gt;icmp echo (ping)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With object-grouping i should solve it like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network my-source&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network my-dest&lt;/P&gt;&lt;P&gt; network-object 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.0.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service my-ports-TCP tcp&lt;/P&gt;&lt;P&gt; port-object eq 22&lt;/P&gt;&lt;P&gt; port-object eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service my-ports-UDP udp&lt;/P&gt;&lt;P&gt; port-object eq 53&lt;/P&gt;&lt;P&gt; port-object eq 555&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl permit tcp object-group my-so?rce object-group my-dest object-group my-ports-TCP&lt;/P&gt;&lt;P&gt;access-list acl permit udp object-group my-so?rce object-group my-dest object-group my-ports-UDP&lt;/P&gt;&lt;P&gt;access-list acl permit icmp object-group my-so?rce object-group my-dest echo	&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is: Is there a better way to do it in Pix/ASA v7.x? I think there is a great limitation in the fact that tcp, udp and icmp traffic cannot be grouped into the same service object-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I could place tcp/22, tcp/23, udp/53, udp555 and icmp echo (0/8) into the same object-group the acl should be shortened into one single line. This is possible in other brands of firewalls...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please comment!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Jimmy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718129#M1022708</guid>
      <dc:creator>jilahbg</dc:creator>
      <dc:date>2019-03-11T09:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718130#M1022712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use the protocol object group in order to specify a protocol(s) that you want to define in an ACL or conduit. You can use this object group as the protocol type only in the associated ACL or conduit. Note that the allowed protocols for this object group are only the standard PIX protocol names allowed in an access-list or conduit command, such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Generic Routing Encapsulation (GRE), Enhanced Interior Gateway Routing Protocol (EIGRP), Encapsulating Security Payload (ESP), Authentication Header (AH), and so on. Protocols that sit on top of TCP or UDP cannot be specified with a protocol object group. Instead, these protocols use an object group, as shown in this example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# object-group protocol proto_grp_1&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(config-protocol)# protocol-object udp&lt;/P&gt;&lt;P&gt;(config-protocol)# protocol-object tcp&lt;/P&gt;&lt;P&gt;(config-protocol)# protocol-object esp&lt;/P&gt;&lt;P&gt;(config-protocol)# exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# access-list 102 permit object-group proto_grp_1 any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;_________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i guess u got it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2007 14:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718130#M1022712</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2007-03-23T14:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718131#M1022715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean that there is no easier/better way to do it than what I wrote? I am not interrested in grouping different IP protocols, but grouping different tcp and udp ports in one single group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Jimmy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2007 14:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718131#M1022715</guid>
      <dc:creator>jilahbg</dc:creator>
      <dc:date>2007-03-23T14:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718132#M1022717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you group differnet protocols together,you can setup different tcp/udp/icmp ports together too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the limitation :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;protocols: tcp/udp/icmp&lt;/P&gt;&lt;P&gt;ports : 23/24/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then access-list will open these ports for all the protocols which you define in protocol object group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes,there's no better way of doing this.&lt;/P&gt;&lt;P&gt;i suggested a workaround.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sushil&lt;/P&gt;&lt;P&gt;cisco tac&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2007 14:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718132#M1022717</guid>
      <dc:creator>suschoud</dc:creator>
      <dc:date>2007-03-23T14:57:32Z</dc:date>
    </item>
    <item>
      <title>Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718133#M1022720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anyone can suggest how many IP addresses can configure under a object-group network? (ASA 5550 ver 8.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My customer wants to configure 6000 IPs under a object-group and add the deny rule for this group. Any best practise for that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks ahead,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 03:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718133#M1022720</guid>
      <dc:creator>yenaungoo</dc:creator>
      <dc:date>2013-11-14T03:27:16Z</dc:date>
    </item>
    <item>
      <title>Object groups - Best practise and limitations</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718134#M1022723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H3 style="color: #000000;"&gt;Q. What is the maximum number of ACLs that can be configured on the ASA?&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote" style="color: #000000; font-family: arial, helvetica, sans-serif; font-size: 11.818181991577148px;"&gt;&lt;P&gt;&lt;STRONG&gt;A. &lt;/STRONG&gt;There is no defined limit for the number of ACLs that can be configured on the ASA. It depends on the memory present in the ASA.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same applies to object-group settings&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Nov 2013 04:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-best-practise-and-limitations/m-p/718134#M1022723</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-14T04:00:07Z</dc:date>
    </item>
  </channel>
</rss>

