<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Lets break it down. VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017627#M146914</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Lets break it down. VPN filter will use the format wherein source will be remote subnet (in case of RAVPN, its pool ip address) and destination is the local subnet. Now, if you create something like below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run access-l test&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 object-group test-service&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh access-l test&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test; 3 elements; name hash: 0xcb4257a3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 object-group test-service (hitcnt=0) 0x806f4e70&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq www (hitcnt=0) 0x2a5dfc5f&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq https (hitcnt=0) 0xcb9a9615&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq domain (hitcnt=0) 0x5cbf5183&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run obje&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run object-g id test-service&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group service test-service tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq domain&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This is one example wherein the ip pool subnet (2.2.2.0/24) will be able to access subnet 3.3.3.0 on ports defined under object-group test-service.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The above access-list can be modified and so is the object-group. Is this something you are looking for. Please check.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Feb 2017 14:56:05 GMT</pubDate>
    <dc:creator>Ajay Saini</dc:creator>
    <dc:date>2017-02-07T14:56:05Z</dc:date>
    <item>
      <title>ASA5505 9.2 Can't create ACL with service-object and network-objects</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017624#M146908</link>
      <description>&lt;P&gt;ASA 5505 with 9.2(4)&lt;/P&gt;
&lt;P&gt;I am unable to get past the service object-group in an ACE.&lt;/P&gt;
&lt;P&gt;(the object group contains only 1 element now, but may be expanded, hence a "group of 1").&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Notice below that the inline help doesn't offer anything other than &amp;lt;cr&amp;gt; after specifying the service-object.&lt;/P&gt;
&lt;P&gt;If I forge ahead and enter the rest of a valid line, it gives an error and does not accept it.&lt;/P&gt;
&lt;P&gt;There are no other ACE's in the ACL yet, this is to be the first ACE.&lt;/P&gt;
&lt;P&gt;If I specify "...permit tcp..." I can use network-object groups.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object-group service objgrp_svc_httpspecial&amp;nbsp;tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;access-list acl_some_acl extended permit&amp;nbsp;&lt;SPAN&gt;objgrp_svc_&lt;/SPAN&gt;&lt;SPAN&gt;httpspecial&amp;nbsp;&lt;/SPAN&gt;?&lt;BR /&gt;configure mode commands/options:&lt;BR /&gt; &amp;lt;cr&amp;gt;&lt;BR /&gt;myasa(config)#&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017624#M146908</guid>
      <dc:creator>david.kiernan</dc:creator>
      <dc:date>2019-03-12T08:52:42Z</dc:date>
    </item>
    <item>
      <title>What is the purpose of this</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017625#M146910</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What is the purpose of this access-list. Assuming that we have a source and destination ip address and/or port numbers/service-object-groups, the format is going to be different:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/acl_objects.html#37203&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/acl_extended.html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 00:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017625#M146910</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-03T00:56:13Z</dc:date>
    </item>
    <item>
      <title>I intend to use the ACL in a</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017626#M146911</link>
      <description>&lt;P&gt;I intend to use the ACL in a vpn-filter within a group-policy for a group of RA-VPN clients.&amp;nbsp; I could certainly use a more traditional "permit tcp object-group src_objgrp object-group dst_objgrp eq 8080", but I was thinking the object would be more flexible and easier to administer, as I anticipate more ports than the current being added to the list of allowed ports.&lt;/P&gt;
&lt;P&gt;I was looking at the syntax on the "configuring acl's" link you mention.&lt;/P&gt;
&lt;P&gt;What I've done is use the ASDM to generate the ACL, and here is how it turned out:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list acl_vpnfilter_group1 extended permit tcp object objnet_vpn_grp1 object-group objgrp_lan_app1 object-group objgrp_svc_app1&lt;/PRE&gt;
&lt;P&gt;where:&lt;/P&gt;
&lt;P&gt;objnet_vpn_grp1 = ip range in the dhcp pool for these users&lt;/P&gt;
&lt;P&gt;objgrp_lan_app1 = object group defining the hosts comprising the services allowed to this group of users&lt;/P&gt;
&lt;P&gt;objgrp_svc_app1 = port-based service group for the services allowed (currently just 8080/tcp)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apparently if you use the service object in the &lt;EM&gt;protocol-argument&lt;/EM&gt;, that is the complete ACE (no source/dest arguments)?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 13:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017626#M146911</guid>
      <dc:creator>david.kiernan</dc:creator>
      <dc:date>2017-02-03T13:02:53Z</dc:date>
    </item>
    <item>
      <title>Lets break it down. VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017627#M146914</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Lets break it down. VPN filter will use the format wherein source will be remote subnet (in case of RAVPN, its pool ip address) and destination is the local subnet. Now, if you create something like below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run access-l test&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 object-group test-service&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh access-l test&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test; 3 elements; name hash: 0xcb4257a3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 object-group test-service (hitcnt=0) 0x806f4e70&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq www (hitcnt=0) 0x2a5dfc5f&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq https (hitcnt=0) 0xcb9a9615&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; access-list test line 1 extended permit tcp 2.2.2.0 255.255.255.0 3.3.3.0 255.255.255.0 eq domain (hitcnt=0) 0x5cbf5183&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run obje&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# sh run object-g id test-service&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group service test-service tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq www&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-object eq domain&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This is one example wherein the ip pool subnet (2.2.2.0/24) will be able to access subnet 3.3.3.0 on ports defined under object-group test-service.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The above access-list can be modified and so is the object-group. Is this something you are looking for. Please check.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 14:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017627#M146914</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-02-07T14:56:05Z</dc:date>
    </item>
    <item>
      <title>there are two ways of using</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017628#M146920</link>
      <description>&lt;P&gt;there are two ways of using the service group in the ACL and each method depends on how you configure the service object. &amp;nbsp;The way you configured objgrp_svc_httpspecial group requires the object to be placed after you define the networks (either source, destination, or both). &amp;nbsp;for example&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list acl_some_acl extended permit tcp host 1.1.1.1 host 2.2.2.2 object-group&amp;nbsp;&lt;SPAN class="pln"&gt;objgrp_svc_httpspecial&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="pln"&gt;now if you had configured the service object like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;object service&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;objgrp_svc_httpspecial&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;&amp;nbsp; service tcp destination eq 808&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="pln"&gt;Now you can add it in front of the hosts / subnets (after the permit statement)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;access-list acl_some_acl permit&amp;nbsp;objgrp_svc_httpspecial host 1.1.1.1 host 2.2.2.2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="pln"&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="pln"&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 18:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-9-2-can-t-create-acl-with-service-object-and-network/m-p/3017628#M146920</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-07T18:08:56Z</dc:date>
    </item>
  </channel>
</rss>

