<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Reconfigure ACE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497237#M235372</link>
    <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;i got an ASA 5520 currently in production and need to reconfigure some entries on ACL.&lt;/P&gt;&lt;P&gt;currently, the ACL is using IPs but I wanted to use object/alias for other admins to easily recognize the ACE.&lt;/P&gt;&lt;P&gt;i already have the object network created for static NAT and want to use them for my ACE.&lt;/P&gt;&lt;P&gt;can i do as below without causing any downtime to the user/network?&lt;/P&gt;&lt;P&gt;object network MY_OBJ&lt;BR /&gt;&amp;nbsp;host 172.27.1.2&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit ip any object MY_OBJ&lt;/P&gt;&lt;P&gt;no access-list OUTSIDE extended permit ip any 172.27.1.2&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:39:55 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2019-03-12T04:39:55Z</dc:date>
    <item>
      <title>Reconfigure ACE</title>
      <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497237#M235372</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;i got an ASA 5520 currently in production and need to reconfigure some entries on ACL.&lt;/P&gt;&lt;P&gt;currently, the ACL is using IPs but I wanted to use object/alias for other admins to easily recognize the ACE.&lt;/P&gt;&lt;P&gt;i already have the object network created for static NAT and want to use them for my ACE.&lt;/P&gt;&lt;P&gt;can i do as below without causing any downtime to the user/network?&lt;/P&gt;&lt;P&gt;object network MY_OBJ&lt;BR /&gt;&amp;nbsp;host 172.27.1.2&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit ip any object MY_OBJ&lt;/P&gt;&lt;P&gt;no access-list OUTSIDE extended permit ip any 172.27.1.2&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497237#M235372</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2019-03-12T04:39:55Z</dc:date>
    </item>
    <item>
      <title>Hi John, </title>
      <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497238#M235373</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;There shouldn't be much problem..... but make sure that you prioritize the new rule with object using line numbers..... then you should be able to see hits on the new line rather than the existing line of old acl... might be the active connections will get a slight impact..... let me do a small lab and confirm you on this....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 08:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497238#M235373</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-22T08:52:27Z</dc:date>
    </item>
    <item>
      <title>Hi John, I did a lab on this</title>
      <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497239#M235374</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did a lab on this with icmp and i do not see a ping drop when i put object acl in priority and remove the existing acl then next....&lt;/P&gt;&lt;P&gt;Immediately after placing the new acl line, hits started to the new acl line and old acl line hits stopped at the same moment... so there shouldn't be any problem in doing that...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outbound; 2 elements; name hash: 0x873017e8&lt;BR /&gt;access-list outbound line 1 extended permit ip object test_local object test_remote (hitcnt=0) 0x24731aff&lt;BR /&gt;&amp;nbsp; access-list outbound line 1 extended permit ip host 10.0.0.10 host 172.16.0.10 &lt;STRONG&gt;(hitcnt=7)&lt;/STRONG&gt; 0x24731aff&lt;BR /&gt;access-list outbound line 2 extended permit ip host 10.0.0.10 host 172.16.0.10 &lt;STRONG&gt;(hitcnt=94) &lt;/STRONG&gt;0x4e29395e&lt;BR /&gt;access-list inbound; 1 elements; name hash: 0x793e9c88&lt;BR /&gt;access-list inbound line 1 extended permit icmp any any echo-reply (hitcnt=86) 0x55127d11&lt;BR /&gt;ciscoasa# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list outbound; 2 elements; name hash: 0x873017e8&lt;BR /&gt;access-list outbound line 1 extended permit ip object test_local object test_remote (hitcnt=0) 0x24731aff&lt;BR /&gt;&amp;nbsp; access-list outbound line 1 extended permit ip host 10.0.0.10 host 172.16.0.10 (hitcnt=18) 0x24731aff&lt;BR /&gt;access-list outbound line 2 extended permit ip host 10.0.0.10 host 172.16.0.10&lt;STRONG&gt; (hitcnt=94) &lt;/STRONG&gt;0x4e29395e&lt;BR /&gt;access-list inbound; 1 elements; name hash: 0x793e9c88&lt;BR /&gt;access-list inbound line 1 extended permit icmp any any echo-reply (hitcnt=97) 0x55127d11&lt;BR /&gt;ciscoasa# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list outbound; 2 elements; name hash: 0x873017e8&lt;BR /&gt;access-list outbound line 1 extended permit ip object test_local object test_remote (hitcnt=0) 0x24731aff&lt;BR /&gt;&amp;nbsp; access-list outbound line 1 extended permit ip host 10.0.0.10 host 172.16.0.10 (hitcnt=19) 0x24731aff&lt;BR /&gt;access-list outbound line 2 extended permit ip host 10.0.0.10 host 172.16.0.10 &lt;STRONG&gt;(hitcnt=94) 0x4e29395e&lt;/STRONG&gt;&lt;BR /&gt;access-list inbound; 1 elements; name hash: 0x793e9c88&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 09:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497239#M235374</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-22T09:27:05Z</dc:date>
    </item>
    <item>
      <title>The easy way would be to add</title>
      <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497240#M235375</link>
      <description>&lt;P&gt;The easy way would be to add new ACE with Objects and login to firewall from asdm, reorder the newly added ACE above the old one where you have ip. &amp;nbsp;Than&amp;nbsp;monitor the hit count on that particular ace which will ensure that traffic is hitting it. &amp;nbsp;&lt;/P&gt;&lt;P&gt;After you see hit count going up you can safely remove old entries... this way you should not have any down time whatsoever&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 13:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497240#M235375</guid>
      <dc:creator>Saqib Raza</dc:creator>
      <dc:date>2014-08-22T13:22:36Z</dc:date>
    </item>
    <item>
      <title>thanks for your inputs!</title>
      <link>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497241#M235377</link>
      <description>&lt;P&gt;thanks for your inputs!&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2014 13:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reconfigure-ace/m-p/2497241#M235377</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2014-08-23T13:40:11Z</dc:date>
    </item>
  </channel>
</rss>

