<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, We would need more in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520011#M234664</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would need more information on the current configuration on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual ACL rule to allow HTTP traffic from/for subnet 172.20.0.0/24 is pretty simple but your interface ACL will most likely have other rules too. Consider for example that for your subnet 172.20.0.0/24 to be able to access an URL using name you will have to allow DNS traffic for them otherwise you can only browse using the IP address of the HTTP server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can check if you have any ACLs attached to interfaces with the following command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the listing of this is either empty or does not list a command for the interface behind which the mentioned subnet is then you will have to configure an ACL for this interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I were to allow only HTTP and DNS traffic from the subnet 172.20.0.0/24 but wanted to allow all traffic from other subnets behind the same interface then you could do this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &amp;lt;acl name&amp;gt; remark Allow HTTP and DNS&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit tcp 172.20.0.0 255.255.255.0 any eq http&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit udp 172.20.0.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit tcp 172.20.0.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; remark Deny all other traffic from subnet 172.20.0.0./24&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; deny ip 172.20.0.0 255.255.255.0 any&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; remark Allow all other traffic&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To attach the ACL to an interface you can use this command&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group &amp;lt;acl name&amp;gt; in interface &amp;lt;interface name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that in the above examples I have not actually named the ACL. You should replace the &lt;STRONG&gt;&amp;lt;acl name&amp;gt;&lt;/STRONG&gt; with the actual name you want to use for the ACL. The &lt;STRONG&gt;&amp;lt;interface name&amp;gt;&lt;/STRONG&gt; should be replaced with the actual interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; to which you want to attach the ACL on your ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Sep 2014 18:06:07 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-09-22T18:06:07Z</dc:date>
    <item>
      <title>ACL on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520008#M234656</link>
      <description>&lt;P&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;how to allow&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;only&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;HTTP traffic&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;to a network&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;at the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;ASA&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;equipment&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="en"&gt;&lt;SPAN class="hps"&gt;Thanks for your help &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520008#M234656</guid>
      <dc:creator>kakkouche</dc:creator>
      <dc:date>2019-03-12T04:47:51Z</dc:date>
    </item>
    <item>
      <title>permit tcp any any eq 80this</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520009#M234660</link>
      <description>&lt;P&gt;&lt;EM&gt;permit tcp any any eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;this is in direction to web server&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2014 15:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520009#M234660</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2014-09-22T15:52:15Z</dc:date>
    </item>
    <item>
      <title>what the acl number should I</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520010#M234663</link>
      <description>&lt;P&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;what&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;acl&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;number&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;should I use&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;it?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="hps"&gt;how can I&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;say&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;I allow&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;for the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;172.20.0.1/24&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;network&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;only&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;http&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2014 16:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520010#M234663</guid>
      <dc:creator>kakkouche</dc:creator>
      <dc:date>2014-09-22T16:05:40Z</dc:date>
    </item>
    <item>
      <title>Hi, We would need more</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520011#M234664</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would need more information on the current configuration on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual ACL rule to allow HTTP traffic from/for subnet 172.20.0.0/24 is pretty simple but your interface ACL will most likely have other rules too. Consider for example that for your subnet 172.20.0.0/24 to be able to access an URL using name you will have to allow DNS traffic for them otherwise you can only browse using the IP address of the HTTP server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can check if you have any ACLs attached to interfaces with the following command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the listing of this is either empty or does not list a command for the interface behind which the mentioned subnet is then you will have to configure an ACL for this interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I were to allow only HTTP and DNS traffic from the subnet 172.20.0.0/24 but wanted to allow all traffic from other subnets behind the same interface then you could do this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &amp;lt;acl name&amp;gt; remark Allow HTTP and DNS&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit tcp 172.20.0.0 255.255.255.0 any eq http&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit udp 172.20.0.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit tcp 172.20.0.0 255.255.255.0 any eq domain&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; remark Deny all other traffic from subnet 172.20.0.0./24&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; deny ip 172.20.0.0 255.255.255.0 any&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; remark Allow all other traffic&lt;BR /&gt;access-list &amp;lt;acl name&amp;gt; permit ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To attach the ACL to an interface you can use this command&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group &amp;lt;acl name&amp;gt; in interface &amp;lt;interface name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that in the above examples I have not actually named the ACL. You should replace the &lt;STRONG&gt;&amp;lt;acl name&amp;gt;&lt;/STRONG&gt; with the actual name you want to use for the ACL. The &lt;STRONG&gt;&amp;lt;interface name&amp;gt;&lt;/STRONG&gt; should be replaced with the actual interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; to which you want to attach the ACL on your ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2014 18:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/2520011#M234664</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-09-22T18:06:07Z</dc:date>
    </item>
  </channel>
</rss>

