<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA - Negate Firewall Objects/Groups/Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/2921849#M162814</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Are there any possibilites to negate objects or groups on the Cisco ASA firewall?&lt;BR /&gt;E.g. I would like to make an object/group for all not private&amp;nbsp;IP addresses (so a group for&amp;nbsp;"Internet").&lt;BR /&gt;With this I could say that host A should only be able to access the Internet but no internal ressources.&lt;BR /&gt;&lt;BR /&gt;On other firewall manufacturer you can work with negated groups, but on the ASA I only know the workaround like below.&lt;BR /&gt;&lt;BR /&gt;I know that I could make a workaround and use the top-down principle. I can say:&lt;BR /&gt;rule 1: Host A is not allow to access the private networks&lt;BR /&gt;rule 2: Host A is&amp;nbsp;allowed to access any&amp;nbsp;(the rest - the Internet)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;Best regards&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:29:01 GMT</pubDate>
    <dc:creator>Kevin_W</dc:creator>
    <dc:date>2019-03-12T07:29:01Z</dc:date>
    <item>
      <title>Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/2921849#M162814</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Are there any possibilites to negate objects or groups on the Cisco ASA firewall?&lt;BR /&gt;E.g. I would like to make an object/group for all not private&amp;nbsp;IP addresses (so a group for&amp;nbsp;"Internet").&lt;BR /&gt;With this I could say that host A should only be able to access the Internet but no internal ressources.&lt;BR /&gt;&lt;BR /&gt;On other firewall manufacturer you can work with negated groups, but on the ASA I only know the workaround like below.&lt;BR /&gt;&lt;BR /&gt;I know that I could make a workaround and use the top-down principle. I can say:&lt;BR /&gt;rule 1: Host A is not allow to access the private networks&lt;BR /&gt;rule 2: Host A is&amp;nbsp;allowed to access any&amp;nbsp;(the rest - the Internet)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;&lt;BR /&gt;Best regards&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/2921849#M162814</guid>
      <dc:creator>Kevin_W</dc:creator>
      <dc:date>2019-03-12T07:29:01Z</dc:date>
    </item>
    <item>
      <title>I have tried now an other</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/2921850#M162816</link>
      <description>&lt;P&gt;I have tried now an other workaround:&lt;BR /&gt;I made a group with all public IP ranges/addresses.&lt;BR /&gt;&lt;BR /&gt;This seems to be working too, but I would appreciate if you have a solution with to negate objects/groups.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2016 15:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/2921850#M162816</guid>
      <dc:creator>Kevin_W</dc:creator>
      <dc:date>2016-03-14T15:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3350011#M162818</link>
      <description>&lt;P&gt;It's hard to believe that this option isn't available for the ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 17:02:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3350011#M162818</guid>
      <dc:creator>KwameB876</dc:creator>
      <dc:date>2018-03-16T17:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3350748#M162820</link>
      <description>I ll just bump this thread. I am also interested in this feature especially after working many years with Checkpoint FWs.</description>
      <pubDate>Mon, 19 Mar 2018 10:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3350748#M162820</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-03-19T10:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834438#M162822</link>
      <description>&lt;P&gt;It's a year later for this thread, checking if the negate is now available in ASA?&lt;/P&gt;&lt;P&gt;I am migratign several CheckPoints to ASA 5525-X and the negate cell is pretty convenient.&lt;/P&gt;&lt;P&gt;I would keep it instead of the deny/accept option.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 18:42:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834438#M162822</guid>
      <dc:creator>normanksmith</dc:creator>
      <dc:date>2019-04-08T18:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: I have tried now an other</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834910#M162823</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/132320"&gt;@Kevin_W&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could share with me the way you tried to deny these groups, if you prefer, you can send them in private, so that I can test and tell you if it is possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Josiane de Barros&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twitter: SecureGirlNinja&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 11:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834910#M162823</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-09T11:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834946#M162824</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;I have made a group object with following IP ranges inside:&lt;/P&gt;&lt;P&gt;0.0.0.0 - 9.255.255.255&lt;/P&gt;&lt;P&gt;11.0.0.0 126.255.255.255&lt;/P&gt;&lt;P&gt;129.0.0.0-169.253.255.255&lt;/P&gt;&lt;P&gt;172.32.0.0-191.0.1.255&lt;/P&gt;&lt;P&gt;192.0.3.0-192.88.98.255&lt;/P&gt;&lt;P&gt;192.88.100.0-192.167.255.255&lt;/P&gt;&lt;P&gt;192.169.0.0-198.17.255.255&lt;/P&gt;&lt;P&gt;198.20.0.0-223.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if you want to permit e.g. a client to access ONLY the internet and not any internal ressources, you can use this group for the permit rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 12:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3834946#M162824</guid>
      <dc:creator>Kevin_W</dc:creator>
      <dc:date>2019-04-09T12:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3835005#M162825</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/132320"&gt;@Kevin_W&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;could share Show running-config. To understand how it is today.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Josiane&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Twitter: SecureGirlNinja&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2019 13:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3835005#M162825</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-09T13:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3835649#M162826</link>
      <description>&lt;P&gt;Hi Josiane,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network Internet&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_1&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_6&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_5&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_4&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_3&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_2&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_7&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_8&lt;BR /&gt;network-object object PUBLIC_RANGE_Internet_9&lt;/P&gt;&lt;P&gt;object network PUBLIC_RANGE_Internet_1&lt;BR /&gt;range 0.0.0.0 9.255.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_2&lt;BR /&gt;range 11.0.0.0 126.255.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_3&lt;BR /&gt;range 129.0.0.0 169.253.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_4&lt;BR /&gt;range 169.255.0.0 172.15.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_5&lt;BR /&gt;range 172.32.0.0 191.0.1.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_6&lt;BR /&gt;range 192.0.3.0 192.88.98.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_7&lt;BR /&gt;range 192.88.100.0 192.167.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_8&lt;BR /&gt;range 192.169.0.0 198.17.255.255&lt;BR /&gt;object network PUBLIC_RANGE_Internet_9&lt;BR /&gt;range 198.20.0.0 223.255.255.255&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 05:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3835649#M162826</guid>
      <dc:creator>Kevin_W</dc:creator>
      <dc:date>2019-04-10T05:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Negate Firewall Objects/Groups/Rules</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3836200#M162827</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/132320"&gt;@Kevin_W&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Attached is the photo of the configuration made in our firewall.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;if my answer was helpful to you, check it out as helpful so others can be helped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Josiane&amp;nbsp;&lt;/P&gt;&lt;P&gt;Twitter :SecureGirlNinja&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2019 17:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-negate-firewall-objects-groups-rules/m-p/3836200#M162827</guid>
      <dc:creator>Josiane de Barros Silva</dc:creator>
      <dc:date>2019-04-10T17:22:31Z</dc:date>
    </item>
  </channel>
</rss>

