<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Find Extended ACLs in FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936325#M1104877</link>
    <description>&lt;P&gt;As far as i know, ISE (AD-auth) is used for authentification. Do i need to change DACL in ISE or FMC?&lt;/P&gt;</description>
    <pubDate>Sun, 08 Oct 2023 18:33:53 GMT</pubDate>
    <dc:creator>oetti</dc:creator>
    <dc:date>2023-10-08T18:33:53Z</dc:date>
    <item>
      <title>Find Extended ACLs in FMC</title>
      <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936304#M1104875</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i've an FPR1140 cluster up and running, which was installed and configured by a former service provider. I need to add some networks to&amp;nbsp; the default/standard VPN-ACL which is used by most of our employees. The navigation under "Objects -&amp;gt; Access List -&amp;gt; Extended" is completely empty (see screenshot).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fmc.PNG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/199166i6CA488754C832E0A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="fmc.PNG" alt="fmc.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The cli instead shows the current policy which needs to be modified. Where can i add an additional entry to this acl to permit access to a new network on our site? (I've replaced some IPs/networks for security reasons).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="cpp"&gt;&amp;gt; show access-list | grep vpn
access-list #ACSACL#-IP-acl_standard_vpn_group-6478be49; 8 elements; name hash: 0x8b430b4d (dynamic)
access-list #ACSACL#-IP-acl_standard_vpn_group-6478be49 line 1 extended permit udp any4 host 1.1.1.1 eq domain (hitcnt=40344) 0xc119c88e
access-list #ACSACL#-IP-acl_standard_vpn_group-6478be49 line 2 extended permit ip any4 192.168.1.0 255.255.255.0 (hitcnt=994) 0x5d410ef2
access-list #ACSACL#-IP-acl_standard_vpn_group-6478be49 line 3 extended permit ip any4 192.168.2.0 255.255.255.0 (hitcnt=9197) 0x0ee616d8

[... add. rules here ...]

access-list #ACSACL#-IP-acl_standard_vpn_group-6478be49 line 8 extended deny ip any4 any4 (hitcnt=26451) 0x18154f61&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;oetti&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2023 16:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936304#M1104875</guid>
      <dc:creator>oetti</dc:creator>
      <dc:date>2023-10-08T16:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Find Extended ACLs in FMC</title>
      <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936315#M1104876</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1609257"&gt;@oetti&lt;/a&gt; #&lt;STRONG&gt;ACSACL&lt;/STRONG&gt;# implies a Downloadable ACL (DACL) has been applied, do you authenticate the users via RADIUS (ISE or ACS)? If so amend the DACL there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2023 17:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936315#M1104876</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-08T17:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Find Extended ACLs in FMC</title>
      <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936325#M1104877</link>
      <description>&lt;P&gt;As far as i know, ISE (AD-auth) is used for authentification. Do i need to change DACL in ISE or FMC?&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2023 18:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936325#M1104877</guid>
      <dc:creator>oetti</dc:creator>
      <dc:date>2023-10-08T18:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Find Extended ACLs in FMC</title>
      <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936328#M1104878</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1609257"&gt;@oetti&lt;/a&gt; the DACL is deployed from ISE. Modify the DACL referenced in the authorisation profile - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/212419-configure-per-user-dynamic-access-contro.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/212419-configure-per-user-dynamic-access-contro.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Oct 2023 18:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936328#M1104878</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-10-08T18:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: Find Extended ACLs in FMC</title>
      <link>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936469#M1104887</link>
      <description>&lt;P&gt;Thanks Rob.&lt;/P&gt;&lt;P&gt;I've changed the DACL content in ISE and it works as expected.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-extended-acls-in-fmc/m-p/4936469#M1104887</guid>
      <dc:creator>oetti</dc:creator>
      <dc:date>2023-10-09T08:58:48Z</dc:date>
    </item>
  </channel>
</rss>

