<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access-list on asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638552#M1036232</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat is there..your suggestion is ok...but i will be having problem coz theres another xxx_2 that should be filtered to go out on the dmz interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx_2 is also part of inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Dec 2006 22:15:12 GMT</pubDate>
    <dc:creator>cfajardo1_2</dc:creator>
    <dc:date>2006-12-01T22:15:12Z</dc:date>
    <item>
      <title>access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638548#M1036227</link>
      <description>&lt;P&gt;i have ASA5510 with the ff access-list_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where:&lt;/P&gt;&lt;P&gt;xxx= inside subnet&lt;/P&gt;&lt;P&gt;xxx_1=allowed internet access&lt;/P&gt;&lt;P&gt;yyy=public host hosting mail server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_in permit ip xxx any&lt;/P&gt;&lt;P&gt;access-group in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list permit tcp xxx_1 any eq http&lt;/P&gt;&lt;P&gt;access-list permit ip xxx_2 host yyy&lt;/P&gt;&lt;P&gt;access-group out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my purpose of havving this access list is to allow only xxx_1 to access the internet and allow xxx to access mail. but if i have the above configuration, no one can access anything, either mail or internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whats wrong in my configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638548#M1036227</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2019-03-11T09:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638549#M1036229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A couple of things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if xxx and xxx_1 are both on the inside interface, you should really do something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list from_inside permit tcp host xxx any eq 25&lt;/P&gt;&lt;P&gt;access-list from_inside permit tcp host xxx_1 eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then apply it to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other issues you have could be with security levels on the interfaces (if they are the same) or more likely, you have a nat issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check to make sure that the entire xxx network has nat in place to allow access to the internet:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not those types of statements, then something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate this message if it helped solve some or all of your issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2006 13:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638549#M1036229</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-12-01T13:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638550#M1036230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a reference document on Cisco.com. The issue is probably the network address specified in the xxx_1. It should be the address of the translated network(s) since the ACL is applied outbound. At this point, the inside addresses have been translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_guide_chapter09186a008063705a.html" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_guide_chapter09186a008063705a.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2006 16:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638550#M1036230</guid>
      <dc:creator>danrodri</dc:creator>
      <dc:date>2006-12-01T16:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638551#M1036231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thats interesting..ok theres a NAT. how will i control the access then if iam having a dynamic nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx is the full inside network allowed for mail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx_1 is portion of xxxx allowed for internet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2006 22:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638551#M1036231</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2006-12-01T22:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638552#M1036232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat is there..your suggestion is ok...but i will be having problem coz theres another xxx_2 that should be filtered to go out on the dmz interface..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx_2 is also part of inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Dec 2006 22:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638552#M1036232</guid>
      <dc:creator>cfajardo1_2</dc:creator>
      <dc:date>2006-12-01T22:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: access-list on asa</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638553#M1036233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To allow only specific inside host (xxx_1) to access internet, while allows others to access only email, use (example):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit udp any any eq 53 -&amp;gt; permit all inside host for dns query, both internet and external email server&lt;/P&gt;&lt;P&gt;access-list inside permit tcp host 192.168.1.10 any eq www -&amp;gt; permit 1 host to access web&lt;/P&gt;&lt;P&gt;access-list inside permit tcp any host 200.200.200.200 eq smtp -&amp;gt; permit any internal host to access email (smtp 25/tcp)&lt;/P&gt;&lt;P&gt;access-list inside deny ip any any -&amp;gt; deny others (ip &amp;amp; ports)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 100.100.100.100&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 100.100.100.1 -&amp;gt; internet router/ISP gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where:&lt;/P&gt;&lt;P&gt;xxx = 192.168.1.0/24&lt;/P&gt;&lt;P&gt;xxx_1 = 192.168.1.10&lt;/P&gt;&lt;P&gt;xxx_2 = 192.168.1.20&lt;/P&gt;&lt;P&gt;yyy = 200.200.200.200 (external email server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or, you can also replace "nat (inside) 1" with the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 100.100.100.100&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The existing config will not work due to the use of internal IP on outside interface (can remove this):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list permit tcp xxx_1 any eq http &lt;/P&gt;&lt;P&gt;access-list permit ip xxx_2 host yyy &lt;/P&gt;&lt;P&gt;access-group out interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it works.&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2006 08:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa/m-p/638553#M1036233</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-04T08:54:30Z</dc:date>
    </item>
  </channel>
</rss>

