<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access-list help??? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-help/m-p/2792372#M160981</link>
    <description>&lt;P&gt;Hi, I'm trying to get my clients from another site access to the secure web server in my interior network. Below are the object groups and access lists i have configured on the ASA where the web server is attached to.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network asa_inside_address&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.1 255.255.255.255&lt;/P&gt;
&lt;P&gt;object network inside_network&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit tcp any object asa_inside_address eq 443&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object asa_inside_address&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object inside_network&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group website_outside in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;When i apply the access list i cant ping from the outside network and i cant even ping from the router on the outside network to the ASA outside address of 172.16.30.2 but when i remove the access group it allows me to ping again from the router and from the outside PC but doesn't let me ping the inside interfaces which is what i was trying to do in the first place.&lt;/P&gt;
&lt;P&gt;Can anyone help me on this and why it wont even let me ping the OUTSIDE interface on the ASA when the access group is on? And how can I poke a hole in the firewall to make the connection to the secure web server which has an address of 10.30.0.10?&lt;/P&gt;
&lt;P&gt;Also, one more thing, when i try to create an access list on the other ASA where the PC's are pinging on. I try and create this but it comes back with a strange error&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ASA1(config)#access-list allow_webserver extended permit tcp 10.30.0.0 0.0.0.255 eq 443 10.20.0.0 0.0.0.255&lt;BR /&gt;ERROR: IP address,mask &amp;lt;10.30.0.0,0.0.0.255&amp;gt; doesn't pair&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I'm trying to match the traffic flow on the ASA because in packet tracer it doesnt let you inspect HTTPS on the global service policy i have created here on both:&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:06:22 GMT</pubDate>
    <dc:creator>robbo79871</dc:creator>
    <dc:date>2019-03-12T07:06:22Z</dc:date>
    <item>
      <title>Access-list help???</title>
      <link>https://community.cisco.com/t5/network-security/access-list-help/m-p/2792372#M160981</link>
      <description>&lt;P&gt;Hi, I'm trying to get my clients from another site access to the secure web server in my interior network. Below are the object groups and access lists i have configured on the ASA where the web server is attached to.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network asa_inside_address&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.1 255.255.255.255&lt;/P&gt;
&lt;P&gt;object network inside_network&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit tcp any object asa_inside_address eq 443&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object asa_inside_address&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object inside_network&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group website_outside in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;When i apply the access list i cant ping from the outside network and i cant even ping from the router on the outside network to the ASA outside address of 172.16.30.2 but when i remove the access group it allows me to ping again from the router and from the outside PC but doesn't let me ping the inside interfaces which is what i was trying to do in the first place.&lt;/P&gt;
&lt;P&gt;Can anyone help me on this and why it wont even let me ping the OUTSIDE interface on the ASA when the access group is on? And how can I poke a hole in the firewall to make the connection to the secure web server which has an address of 10.30.0.10?&lt;/P&gt;
&lt;P&gt;Also, one more thing, when i try to create an access list on the other ASA where the PC's are pinging on. I try and create this but it comes back with a strange error&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;ASA1(config)#access-list allow_webserver extended permit tcp 10.30.0.0 0.0.0.255 eq 443 10.20.0.0 0.0.0.255&lt;BR /&gt;ERROR: IP address,mask &amp;lt;10.30.0.0,0.0.0.255&amp;gt; doesn't pair&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I'm trying to match the traffic flow on the ASA because in packet tracer it doesnt let you inspect HTTPS on the global service policy i have created here on both:&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-help/m-p/2792372#M160981</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2019-03-12T07:06:22Z</dc:date>
    </item>
    <item>
      <title>Routers use wldcard masks.</title>
      <link>https://community.cisco.com/t5/network-security/access-list-help/m-p/2792373#M160982</link>
      <description>&lt;P&gt;Routers use wldcard masks.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA1(config)#access-list allow_webserver extended permit tcp 10.30.0.0 0.0.0.255 eq 443 10.20.0.0 0.0.0.255&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ERROR: IP address,mask &amp;lt;10.30.0.0,0.0.0.255&amp;gt; doesn't pair&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ASA's use normal subnets, so use:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;ASA1(config)#access-list allow_webserver extended permit tcp 10.30.0.0 255.255.255.0&amp;nbsp;eq 443 10.20.0.0&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 09:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-help/m-p/2792373#M160982</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-01-06T09:43:05Z</dc:date>
    </item>
  </channel>
</rss>

