<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic packet-tracer input outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534642#M235180</link>
    <description>&lt;P&gt;&lt;CODE&gt;packet-tracer input outside tcp 1.2.3.4 1234 PUBLIC-IP-OF-DATTO-DEVICE 22&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;"1.2.3.4 1234" is just a random source-ip and port.&lt;/P&gt;</description>
    <pubDate>Sun, 31 Aug 2014 21:21:10 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-08-31T21:21:10Z</dc:date>
    <item>
      <title>Access List on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534639#M235176</link>
      <description>&lt;P&gt;Here is a current access list on an ASA that I mange:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 7500&lt;BR /&gt;access-list outside_access_in_1 extended permit object RDP any object FileServer&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53827&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 3389&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53828&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53829&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any host 192.168.0.81 eq 53830&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53850&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53810&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 53855&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq telnet&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 55443&lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any object New_Server eq 7500&lt;BR /&gt;&lt;STRONG&gt;access-list outside_access_in_1 extended permit tcp any object DattoDevice eq ssh&lt;BR /&gt;access-list outside_access_in_1 extended permit udp any object DattoDevice eq ntp&lt;BR /&gt;access-list outside_access_in_1 extended permit icmp any object DattoDevice &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have highlighted the last three statements - are these correct?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534639#M235176</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2019-03-26T00:53:45Z</dc:date>
    </item>
    <item>
      <title>If you want to allow SSH/NTP</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534640#M235178</link>
      <description>&lt;P&gt;If you want to allow SSH/NTP and ICMP to DattoDevice, then these ACEs are correct.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Aug 2014 17:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534640#M235178</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-31T17:30:14Z</dc:date>
    </item>
    <item>
      <title>Thank you.....can you tell me</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534641#M235179</link>
      <description>&lt;P&gt;Thank you.....can you tell me how to test these using packet tracer in the ASDM?&lt;/P&gt;</description>
      <pubDate>Sun, 31 Aug 2014 21:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534641#M235179</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2014-08-31T21:12:09Z</dc:date>
    </item>
    <item>
      <title>packet-tracer input outside</title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534642#M235180</link>
      <description>&lt;P&gt;&lt;CODE&gt;packet-tracer input outside tcp 1.2.3.4 1234 PUBLIC-IP-OF-DATTO-DEVICE 22&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;"1.2.3.4 1234" is just a random source-ip and port.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Aug 2014 21:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534642#M235180</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-31T21:21:10Z</dc:date>
    </item>
    <item>
      <title>Thanks again - </title>
      <link>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534643#M235181</link>
      <description>&lt;P&gt;Thanks again -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Aug 2014 22:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-on-asa5505/m-p/2534643#M235181</guid>
      <dc:creator>Steven Couture</dc:creator>
      <dc:date>2014-08-31T22:15:26Z</dc:date>
    </item>
  </channel>
</rss>

