<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, if that line is at the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541741#M235454</link>
    <description>&lt;P&gt;Yes, if that line is at the beginning it will match regardless what comes later. If you need more control then the way to achieve it is the same. allow the most specific, then deny the next less specific. Then allow again the next less specific and so on and so on ...&lt;/P&gt;</description>
    <pubDate>Tue, 19 Aug 2014 17:11:41 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-08-19T17:11:41Z</dc:date>
    <item>
      <title>allow single /32 out of /8 on a cisco context firewall</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541736#M235449</link>
      <description>&lt;P&gt;wondering if anyone has any tricks to&amp;nbsp;allow a single /32 out of a /8 on a cisco non-asa firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the network is 121.0.0.0/8 and I want to only allow 121.240.128.58/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is pretty messy with multiple lines of summery routes, is there an easier way?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541736#M235449</guid>
      <dc:creator>scotteberl</dc:creator>
      <dc:date>2019-03-12T04:39:13Z</dc:date>
    </item>
    <item>
      <title>Can you explain a little more</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541737#M235450</link>
      <description>&lt;P&gt;With "non-asa", are you talking about IOS-router?&amp;nbsp;Can you explain a little more detailed what you want to achieve?&amp;nbsp;Just by reading your post it sounds like a simple two/three-line ACL. But probably you want to achieve something different?&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;ip access-list ext TEST&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&amp;nbsp; permit ip host 121.240.128.58 any&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&amp;nbsp; deny ip 121.0.0.0 0.255.255.255 any&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&amp;nbsp; permit ip any any&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 15:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541737#M235450</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-19T15:34:16Z</dc:date>
    </item>
    <item>
      <title>This wouldn't be an access</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541738#M235451</link>
      <description>&lt;P&gt;This wouldn't be an access-list but an access-group applied to an interface on a cisco firewall context. So we have a customer who has an entire /8 blocked from&amp;nbsp;attack but wants one ip out of that /8 allowed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 15:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541738#M235451</guid>
      <dc:creator>scotteberl</dc:creator>
      <dc:date>2014-08-19T15:34:17Z</dc:date>
    </item>
    <item>
      <title>Thats pretty much what the</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541739#M235452</link>
      <description>&lt;P&gt;Thats pretty much what the above ACL does, it allows that single IP, denies the /8 and allows the rest. And yes, such ACL has to be applied to an interface with an access-group-command.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 15:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541739#M235452</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-19T15:43:10Z</dc:date>
    </item>
    <item>
      <title>Problem with that is there</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541740#M235453</link>
      <description>&lt;P&gt;Problem with that is there are other rules that the host must match against. If I just allow the host in the beginning it will bypass all other rules won't it.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 16:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541740#M235453</guid>
      <dc:creator>scotteberl</dc:creator>
      <dc:date>2014-08-19T16:21:54Z</dc:date>
    </item>
    <item>
      <title>Yes, if that line is at the</title>
      <link>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541741#M235454</link>
      <description>&lt;P&gt;Yes, if that line is at the beginning it will match regardless what comes later. If you need more control then the way to achieve it is the same. allow the most specific, then deny the next less specific. Then allow again the next less specific and so on and so on ...&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2014 17:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-single-32-out-of-8-on-a-cisco-context-firewall/m-p/2541741#M235454</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-19T17:11:41Z</dc:date>
    </item>
  </channel>
</rss>

