<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506 Access List Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742839#M1096122</link>
    <description>&lt;P&gt;Will that work for port 80 and 443 if i want https, or just for icmp?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2022 19:03:40 GMT</pubDate>
    <dc:creator>Tom101</dc:creator>
    <dc:date>2022-12-20T19:03:40Z</dc:date>
    <item>
      <title>ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742776#M1096113</link>
      <description>&lt;P&gt;Hello Cisco Community,&lt;/P&gt;&lt;P&gt;I am trying to allow port 80 through a ASA 5506 firewall from my DMZ to a INTERNAL zone for a HTTP server. I am having a problem with the access list, and have encountered a strange problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ip address of my HTTP server is 192.168.2.1. When i use the access list command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="csharp"&gt;access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any gt www&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It works fine, however when i use the command equal to www:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It drops the HTTP packets, and doesn't allow it through the firewall. Does anyone know why?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm applying the access list to the DMZ 'in' interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;access-group WEB-INSIDE in interface DMZ&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached two packet tracer files to demonstrate a working and non-working configuration. I may be doing something wrong. Thank you.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742776#M1096113</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T18:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742779#M1096114</link>
      <description>&lt;LI-CODE lang="c"&gt;access-list WEB-INSIDE extended permit tcp any host 192.168.2.1 eq www  &lt;/LI-CODE&gt;&lt;P&gt;this right one I think to make OUT host access to server IN.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742779#M1096114</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T17:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742806#M1096115</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Thank you for your reply. I tried to implement your suggestion but couldn't get it to work. I thought I had the source/destination the right way round, but i may have it wrong. I don't use access lists very often.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is strange because when i use the command:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;access-list WEB-INSIDE extended permit icmp host 192.168.2.1 any&lt;/LI-CODE&gt;&lt;P&gt;ICMP packets don't get dropped and ping works fine. Do you have any other suggests?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742806#M1096115</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T18:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742811#M1096116</link>
      <description>&lt;P&gt;Edit - mis-read the question.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742811#M1096116</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-20T18:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742812#M1096117</link>
      <description>&lt;P&gt;can I see full config ?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742812#M1096117</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T18:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742818#M1096118</link>
      <description>&lt;P&gt;Yes, I have attached the packet tracer files, but i'll paste the configuration here too.&lt;/P&gt;&lt;P&gt;Here's a photo of the config:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2022-12-20 at 20.27.27.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171476iA458C8A11BBD4B84/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2022-12-20 at 20.27.27.png" alt="Screenshot 2022-12-20 at 20.27.27.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Firewall config:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;/P&gt;&lt;P&gt;nameif INSIDE&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.2.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/3&lt;/P&gt;&lt;P&gt;nameif OUTSIDE&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network DMZ-WEB&lt;/P&gt;&lt;P&gt;host 192.168.2.1&lt;/P&gt;&lt;P&gt;nat (DMZ,OUTSIDE) static 1.1.1.1&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list WEB-INSIDE extended permit icmp host 192.168.2.1 any&lt;/P&gt;&lt;P&gt;access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group WEB-INSIDE in interface DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742818#M1096118</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T18:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742820#M1096119</link>
      <description>&lt;P&gt;Hi Rob, thank you for your reply.&lt;/P&gt;&lt;P&gt;From what you're describing it sounds like I have it set up correctly. (I think).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have added the access list to the DMZ in interface with this command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;access-group WEB-INSIDE in interface DMZ&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;and i'm using the 'eq www' in the access list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742820#M1096119</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T18:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742822#M1096120</link>
      <description>&lt;P&gt;no need any access list,&lt;BR /&gt;since initiate traffic from the high security IN =100 to DMZ low =50.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;for ICMP you need&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;BR /&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;inspect icmp &amp;lt;&amp;lt;- this what you need&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 18:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742822#M1096120</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T18:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742839#M1096122</link>
      <description>&lt;P&gt;Will that work for port 80 and 443 if i want https, or just for icmp?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 19:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742839#M1096122</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T19:03:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742848#M1096123</link>
      <description>&lt;P&gt;I will run lab for you and check your config.&lt;BR /&gt;update you today.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 19:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742848#M1096123</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T19:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742853#M1096124</link>
      <description>&lt;P&gt;Thank so much.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 19:43:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742853#M1096124</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T19:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742871#M1096125</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1325614"&gt;@Tom101&lt;/a&gt; are you actually trying to allow traffic from the INSIDE network to the HTTP server (192.168.2.1) on port tcp/80 in the DMZ? If so, remove the access-group from the DMZ - "no access-group WEB-INSIDE in interface DMZ"&lt;/P&gt;
&lt;P&gt;Your question reads the other way around (traffic initiated from DMZ to INSIDE) and your ACL implies communication is initiated from DMZ to INSIDE.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 20:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742871#M1096125</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-20T20:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742874#M1096126</link>
      <description>&lt;P&gt;Oo i see, ok thank you Rob. I'm trying to allow my PC from the INSIDE network to access the HTTP website on the server in the DMZ.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 20:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742874#M1096126</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T20:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742880#M1096127</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1325614"&gt;@Tom101&lt;/a&gt; then you ACL is incorrect, you don't need to apply the ACL to the DMZ interface. Remove it.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;no access-group WEB-INSIDE in interface DMZ&lt;BR /&gt;no access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Traffic will be permitted from INSIDE to DMZ as &lt;EM&gt;&lt;STRONG&gt;default&lt;/STRONG&gt; &lt;/EM&gt;as the INSIDE interface has a higher security-level than the DMZ interface.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 20:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742880#M1096127</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-20T20:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742899#M1096128</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (317).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171498i50FD25E4A7775ED6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (317).png" alt="Screenshot (317).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;as I mention before since the traffic from High to low security level (from 100 to 50) no need any ACL&amp;nbsp;&lt;BR /&gt;then what is issue ??&lt;/P&gt;&lt;P&gt;ISSUE is PKT limit you need to first&amp;nbsp;&lt;BR /&gt;1- no&amp;nbsp;policy-map global_policy&lt;BR /&gt;2-no service-policy global_policy global&lt;BR /&gt;3-&lt;BR /&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect http &amp;lt;&amp;lt;- add this&amp;nbsp;&lt;/P&gt;&lt;P&gt;inspect icmp &amp;lt;&amp;lt;- add this&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;4-service-policy global_policy global&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;and as you see I can access HTTP in DMZ without any issue&amp;nbsp;&lt;BR /&gt;see I change the hello message to be welcome to MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 21:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742899#M1096128</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-20T21:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742902#M1096130</link>
      <description>&lt;P&gt;Hi Rob, am i right in saying that the default security-level rule will only work when there is no other&lt;SPAN&gt;&amp;nbsp;access list bound to an interface? So if I was to extend the network and add additional&amp;nbsp;access list rules, would that stop working?&amp;nbsp;&lt;/SPAN&gt;What access-list rule would I need if that was the case?&lt;/P&gt;&lt;P&gt;Also, I deleted the access-group and access-list and I still cannot get it to work. The ICMP ping will reach the HTTP web server, but the firewall will not allow it back into the inside network.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 21:20:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742902#M1096130</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T21:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742956#M1096134</link>
      <description>&lt;P&gt;Thank you for trying. Still cannot get it working on my computer. I have tried multiple times - starting with a new 5506 firewall. It works perfectly on the 5505 with the same config, but not on the 5506 firewall. I am on a arm computer, so might be something to do with that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 23:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742956#M1096134</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-20T23:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742960#M1096135</link>
      <description>&lt;P&gt;only repeat same step I mention above and it will work.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 00:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742960#M1096135</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T00:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742984#M1096136</link>
      <description>&lt;P&gt;Finally, got it to work thank you. There seems to be a bug with packet tracer saving the g&lt;SPAN&gt;lobal policy-map. It does not always register it on my computer, and then when i restart packet tracer it restores it to default. Even when using 'Write memory' and 'copy running-config startup-config'.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 01:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4742984#M1096136</guid>
      <dc:creator>Tom101</dc:creator>
      <dc:date>2022-12-21T01:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506 Access List Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4743101#M1096137</link>
      <description>&lt;P&gt;You are so so welcome friend any time.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 08:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-access-list-problem/m-p/4743101#M1096137</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-12-21T08:34:38Z</dc:date>
    </item>
  </channel>
</rss>

