<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, So as you can see both of in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537342#M235157</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as you can see both of the ACLs which have the &lt;STRONG&gt;"_1"&lt;/STRONG&gt; at the end of their names are used in the actual configuration at the moment. So the ACLs named similiarly but &lt;STRONG&gt;WITHOUT&lt;/STRONG&gt; the &lt;STRONG&gt;"_1"&lt;/STRONG&gt; are not used at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The change in the naming is as I said probably due to configurations made on the ASDM (GUI) when you have made new ACL for the purpose of the L2L VPN and the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. The firewall simply creates a new ACL and because it cant be the same name it just add a number at the end with the&lt;STRONG&gt; "_"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the ACL attached to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface I would simply suggest that you confirm does the current ACL allow all the connections that you need? If everything is working as intended then there is no need to change the current ACL. If something is not working then I would check if the old ACL that is not in use has something that is missing from the current ACL. Naturally if the current ACL has something that is not needed you can remove those ACL lines from the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the ACL used in the &lt;STRONG&gt;"crypto map"&lt;/STRONG&gt; configurations I would again ask is the L2L VPN working as expected? Is the connection UP and are you able to connect to all the resources required? If its working then I would not naturally touch the ACL. You can remove the ACL that is not in use by the &lt;STRONG&gt;"crypto map"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
    <pubDate>Mon, 01 Sep 2014 12:50:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-09-01T12:50:40Z</dc:date>
    <item>
      <title>Cleaning up Access Lists</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537338#M235153</link>
      <description>&lt;P&gt;Here is an access list I want to know if I can "clean up" :&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.0.81 eq 7500&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.0.202 eq 3389&lt;BR /&gt;access-list outside_access_in extended permit object RDP any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 7500&lt;BR /&gt;access-list outside_access_in_1 extended permit object RDP any object FileServer&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53827&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 3389&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53828&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53829&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53830&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53850&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53810&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53855&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq telnet&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 55443&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 7500&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object DattoDevice eq ssh&lt;BR /&gt;access-list outside_access_in_1 extended permit udp any object DattoDevice eq ntp&lt;BR /&gt;access-list outside_access_in_1 extended permit icmp any object DattoDevice&lt;BR /&gt;access-list RemoteVPN_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.0.0 255.255.255.0 156.30.21.200 255.255.255.248&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object host-192.168.0.81 156.30.21.200 255.255.255.248&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the significance of the _1 on most of these statements? Should/could I add an _1 to the top 4 lines to make this list symmetrical?&amp;nbsp; I suspect some of these lines were created when they migrated over from a PIX501 to this ASA......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537338#M235153</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2019-03-26T00:53:47Z</dc:date>
    </item>
    <item>
      <title>Hi, To my understanding the</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537339#M235154</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my understanding the numbering in the format &lt;STRONG&gt;"_1" &lt;/STRONG&gt;(and similiar) are generated by device when you configure it through the ASDM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"access-list" &lt;/STRONG&gt;configurations for &lt;STRONG&gt;"outside_access_in"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside_access_in_1"&lt;/STRONG&gt; are for 2 totally different ACLs.&lt;/P&gt;&lt;P&gt;I would imagine that only one of them it attached to your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface at the moment. You can check what ACLs are attached to the interfaces of the ASA with the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could add the same lines from the old ACL to the new ACL with the &lt;STRONG&gt;"_1"&lt;/STRONG&gt; at the end but you probably wont need all the statements (if any). The first line of the ACL you seem to have in the new one already.&lt;/P&gt;&lt;P&gt;The second ACL line might be in the new ACL. I am not sure as it contains &lt;STRONG&gt;"object"&lt;/STRONG&gt; configurations which hold the IP addresses that I cant see.&lt;/P&gt;&lt;P&gt;Same goes for the third line of the ACL. It contains an &lt;STRONG&gt;"object"&lt;/STRONG&gt; configuration though it seems it allows RDP from &lt;STRONG&gt;"any"&lt;/STRONG&gt; host to &lt;STRONG&gt;"any"&lt;/STRONG&gt; host. You might already have the RDP rules for the required hosts but with this information I can not say whats the case.&lt;/P&gt;&lt;P&gt;The last (fourth) line of the ACL seems to be a RDP rule that previously allowed RDP connections towards a host that used the PIX firewalls &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface as its public IP address. This wont be needed anymore as in the new software that you are using you always allow the traffic to the local IP address, even if there is a NAT conigured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ACL named &lt;STRONG&gt;"RemoveVPN_SplitTunnelAcl"&lt;/STRONG&gt; is probably currently in the &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; configurations of your VPN. I doubt you will have to touch this at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end of the post you have ACLs named &lt;STRONG&gt;"outside_cryptomap"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside_cryptomap_1"&lt;/STRONG&gt;. These seems to be ACLs configured for L2L VPN connections. Considering the destinatin subnet in both of these is identical I imagine that also only one of these is in actual use at the moment.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You can check what is in use with the command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run crypto map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 11:53:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537339#M235154</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-09-01T11:53:02Z</dc:date>
    </item>
    <item>
      <title>Yes - thank you - I am sure</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537340#M235155</link>
      <description>&lt;P&gt;Yes - thank you - I am sure you can tell I am a newbie, and I appreciate your patience to help me learn - here is what I have found:&lt;/P&gt;&lt;P&gt;Result of the command: "show run access-group"&lt;/P&gt;&lt;P&gt;access-group outside_access_in_1 in interface outside&lt;/P&gt;&lt;P&gt;Result of the command: "show run crypto map"&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 1 set peer 216.203.80.110&lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 12:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537340#M235155</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2014-09-01T12:39:11Z</dc:date>
    </item>
    <item>
      <title>I am using software version 8</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537341#M235156</link>
      <description>&lt;P&gt;I am using software version 8.4(7)3 and can send you the full running config if you want....&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 12:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537341#M235156</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2014-09-01T12:48:30Z</dc:date>
    </item>
    <item>
      <title>Hi, So as you can see both of</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537342#M235157</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as you can see both of the ACLs which have the &lt;STRONG&gt;"_1"&lt;/STRONG&gt; at the end of their names are used in the actual configuration at the moment. So the ACLs named similiarly but &lt;STRONG&gt;WITHOUT&lt;/STRONG&gt; the &lt;STRONG&gt;"_1"&lt;/STRONG&gt; are not used at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The change in the naming is as I said probably due to configurations made on the ASDM (GUI) when you have made new ACL for the purpose of the L2L VPN and the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. The firewall simply creates a new ACL and because it cant be the same name it just add a number at the end with the&lt;STRONG&gt; "_"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the ACL attached to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface I would simply suggest that you confirm does the current ACL allow all the connections that you need? If everything is working as intended then there is no need to change the current ACL. If something is not working then I would check if the old ACL that is not in use has something that is missing from the current ACL. Naturally if the current ACL has something that is not needed you can remove those ACL lines from the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regards to the ACL used in the &lt;STRONG&gt;"crypto map"&lt;/STRONG&gt; configurations I would again ask is the L2L VPN working as expected? Is the connection UP and are you able to connect to all the resources required? If its working then I would not naturally touch the ACL. You can remove the ACL that is not in use by the &lt;STRONG&gt;"crypto map"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 12:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537342#M235157</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-09-01T12:50:40Z</dc:date>
    </item>
    <item>
      <title>Everything is working fine -</title>
      <link>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537343#M235158</link>
      <description>&lt;P&gt;Everything is working fine - just looking to clean things up in preparation for an outside static IP address change in the near future as we plan to change ISP's.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 13:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cleaning-up-access-lists/m-p/2537343#M235158</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2014-09-01T13:04:30Z</dc:date>
    </item>
  </channel>
</rss>

