<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Great!!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751235#M179264</link>
    <description>&lt;P&gt;Great!!!&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2015 17:58:42 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-09-28T17:58:42Z</dc:date>
    <item>
      <title>Cisco ASA ACL creation</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751232#M179216</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi Cisco Community -&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So I'm getting better at ASA's, but still have some items to work through. I have a customer who has requested an ACL policy to allow a few servers with different sub-interfaces to communicate with each other over specified ports. I was hoping for some assistance with the ACL creation.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;interface GigabitEthernet0/2.107&lt;BR /&gt;&amp;nbsp;vlan 107&lt;BR /&gt;&amp;nbsp;nameif host_1&lt;BR /&gt;&amp;nbsp;security-level 25&lt;BR /&gt;&amp;nbsp;ip address 192.168.107.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.108&lt;BR /&gt;&amp;nbsp;vlan 108&lt;BR /&gt;&amp;nbsp;nameif host_2&lt;BR /&gt;&amp;nbsp;security-level 25&lt;BR /&gt;&amp;nbsp;ip address 192.168.108.1 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have a windows host sitting on vlan 108 that needs to speak to a device sitting on vlan 107 over the following ports -&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;www&lt;BR /&gt;443&lt;BR /&gt;25&lt;BR /&gt;161&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Here is what I've done config wise so far. My question is there anything missing and do I need to specify an outgoing interface?&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV&gt;-----------------------------------------------------------------------------------------------------------------------------------------------------&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;! Create this one&lt;/DIV&gt;&lt;DIV&gt;object network CLARITY-APP02&lt;/DIV&gt;&lt;DIV&gt;host 192.168.108.244&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;! Already created&lt;/DIV&gt;&lt;DIV&gt;object network SERVER-WEB01_Priv&lt;/DIV&gt;&lt;DIV&gt;host 192.168.107.243&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;! Create service group&lt;/DIV&gt;&lt;DIV&gt;object-group service SERVER-APP2_to_WEBA1_TCP_UDP tcp-udp&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;port-object eq www&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;port-object eq 443&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;port-object eq 25&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;port-object eq 161&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;! Access list creation&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;access-list remark&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;-=Allow TCP from APP2 to WEB01=-&lt;/DIV&gt;&lt;DIV&gt;access-list SERVER2_to_WEB01 extended permit tcp object CLARITY-APP02 object SERVER-WEB01_Priv object-group SERVER-APP2_to_WEBA1_TCP_UDP&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;!---192.168.108.244 &amp;nbsp; !---192.168.107.243&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;access-list remark&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;-=Allow udp from APP2 to WEB01=-&lt;/DIV&gt;&lt;DIV&gt;access-list SERVER2_to_WEB01 extended permit udp object SERVER-APP02 object SERVER-WEB01_Priv object-group SERVER-APP2_to_WEBA1_TCP_UDP&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; !---192.168.108.244 &amp;nbsp; !---192.168.107.243&lt;/DIV&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751232#M179216</guid>
      <dc:creator>Bobby Mazzotti</dc:creator>
      <dc:date>2019-03-26T00:57:04Z</dc:date>
    </item>
    <item>
      <title>Hi,Once you have your Access</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751233#M179240</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Once you have your Access-list configured you just need to apply it on the desired interface.&lt;/P&gt;&lt;P&gt;Use "access-group" command to apply the ACL on the ingress interface in inward direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!!!&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Sun, 27 Sep 2015 19:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751233#M179240</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-27T19:15:46Z</dc:date>
    </item>
    <item>
      <title>Thank you Risseth - I had it</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751234#M179262</link>
      <description>&lt;P&gt;Thank you Risseth - I had it originally applied as out vs in... Changed the direction as most should be "in" when I place myself as the ASA. This resolved my issue and associated it with the correct interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 16:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751234#M179262</guid>
      <dc:creator>Bobby Mazzotti</dc:creator>
      <dc:date>2015-09-28T16:28:53Z</dc:date>
    </item>
    <item>
      <title>Great!!!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751235#M179264</link>
      <description>&lt;P&gt;Great!!!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2015 17:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-acl-creation/m-p/2751235#M179264</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-09-28T17:58:42Z</dc:date>
    </item>
  </channel>
</rss>

