<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.1x Object Groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394227#M270655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL syntax is not really that different compared to when you are using &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; or&lt;STRONG&gt; "object network"&lt;/STRONG&gt; in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a combined example allowing traffic from networks under &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; to a new under &lt;STRONG&gt;"object"&lt;/STRONG&gt; would look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit ip object-group OBJECT-1 object OBJECT-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit tcp object-group OBJECT-1 object OBJECT-2 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit udp object-group OBJECT-1 object OBJECT-2 eq domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit icmp object-group OBJECT-1 object OBJECT-2 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So only difference is the keyword/parameter &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; or &lt;STRONG&gt;"object"&lt;/STRONG&gt; depending which type the following object actually is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to add the 2 created &lt;STRONG&gt;"object network"&lt;/STRONG&gt; under an &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; then you would use this format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network remote-nets&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object remote-net1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object remote-net2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see we need the &lt;STRONG&gt;"network-object object"&lt;/STRONG&gt; to indicate that we are adding an actual &lt;STRONG&gt;"object"&lt;/STRONG&gt; under this &lt;STRONG&gt;"object-group"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the traffic flow question there are many different situations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you have no ACLs configured to the ASA interfaces then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value determines from which interfaces networks you can initiate connections to which interfaces networks. (Allow from higher to lower)&lt;/LI&gt;&lt;LI&gt;If you are using ACL on the interface then that will determine how traffic can be initiated. Typically ACLs are attached inbound direction so they only control connections initiated from behind that interface.&lt;/LI&gt;&lt;LI&gt;Whether you use interface ACLs or not there are couple of situations where you might need additional commands on the ASA.&lt;UL&gt;&lt;LI&gt;If you have 2 interfaces with equal &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;and want to keep it that way and also want to allow traffic between them you need to have the command &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;If you have a single interface which has traffic incoming to it and then forwarded back out through that interface then you will need the command &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;. The most common situation for this is when you have VPN Clients which need to connect to the Internet through the VPN connections to the ASA (outside interface) same naturally applies to connections between VPN connections.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new software you wont need to configure any NAT between your local interfaces if you dont want to NAT the networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The exception to this comes usually with VPN traffic. Then NAT0 is usually needed.&amp;nbsp; Since both your VPN traffic and Internet traffic usually flow between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface that means that if there is no NAT0 configuration the traffic gets matched to the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Jan 2014 16:49:51 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-30T16:49:51Z</dc:date>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394222#M270635</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am used the older 8.0.X ASA software, so here's another confusion I have with the new 9.1x code. I unfortunately don't have an ASA 9.1x handy to try out these commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Here below is two different ways of creating the same service object as I understand. The first way is how I am used to doing it in the earlier code. And the second way is how it is with the new 9.1x code, I believe. My question is, what is the difference here ?(other than the fact that the second method allows the same object for both tcp and udp) and more importantly will the new 9.1x code accept either of these formats when I create a service object? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service admin tcp&lt;/P&gt;&lt;P&gt;port-object eq 80&lt;/P&gt;&lt;P&gt;port-object eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service admin&lt;/P&gt;&lt;P&gt;service-object tcp http&lt;/P&gt;&lt;P&gt;service-object tcp https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The same question applies when creating network objects. In the two different methods below, will the ASA 9.1x accept either of these commands? also is one method better than the other in 9.1x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network remote-nets&lt;/P&gt;&lt;P&gt;network-object 10.8.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;network-object 10.9.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network remote-nets &lt;/P&gt;&lt;P&gt;subnet 10.8.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;subnet 10.9.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394222#M270635</guid>
      <dc:creator>ciscotech45</dc:creator>
      <dc:date>2019-03-12T03:38:00Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394223#M270640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding in the first section where you list the 2 different &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; formats the second one is not a valid configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service admin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; only when there has been a considerable amount of ports needed to be opened. For example I have been tasked sometimes to open a lot of basic ports between internal networks in an internal firewall that sits between some networks. In this kind of &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; I have define many TCP/UDP ports and also ICMP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have then used it in an ACL in the following way for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit object-group admin object-group SOURCE-NETWORKS object-group DESTINATION-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This has allowed to use a single ACL rule to allow a lot of the required service. Naturally in the "opened" for its still a big ACL rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the second example where you are using "network" type &lt;STRONG&gt;"object-group" &lt;/STRONG&gt;and &lt;STRONG&gt;"object"&lt;/STRONG&gt; there is also one problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; can contain multiple networks or host addresses under it. An &lt;STRONG&gt;"object network"&lt;/STRONG&gt; can only contain a single &lt;STRONG&gt;"host"&lt;/STRONG&gt; , &lt;STRONG&gt;"subnet"&lt;/STRONG&gt; or &lt;STRONG&gt;"range"&lt;/STRONG&gt;. So entering the second &lt;STRONG&gt;"subnet"&lt;/STRONG&gt; would simple overwrite your earlier &lt;STRONG&gt;"subnet"&lt;/STRONG&gt; statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"object"&lt;/STRONG&gt; I guess is typically used for simple Auto NAT configurations to contain both the source address(es) and the actual &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It can also be a parameter of a Manual NAT command (a &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command that is NOT under any &lt;STRONG&gt;"object"&lt;/STRONG&gt;) to tell either real/mapped source/destination network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally also if you prefer to have &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; and &lt;STRONG&gt;"object"&lt;/STRONG&gt; in your ACL instead of the actual IP addresses and networks this might be an option. You can also group &lt;STRONG&gt;"object"&lt;/STRONG&gt; under an &lt;STRONG&gt;"object-group"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that there is &lt;STRONG&gt;"object service"&lt;/STRONG&gt;. It can also be used in ACLs but also Manual NAT configurations to manipulate ports (can not be used in Auto NAT). As with &lt;STRONG&gt;"object network"&lt;/STRONG&gt;, the &lt;STRONG&gt;"object service"&lt;/STRONG&gt; can only contain single statement but it can contain both source and destination port but this is rarely needed unless you are doing some pretty special NAT &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 21:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394223#M270640</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-29T21:07:49Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394224#M270646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for creating the service object, will the 9.1x version accept both these formats (below) or should I only use the &lt;/P&gt;&lt;P&gt;"object-group service admin" format?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(OLD FORMAT)&lt;/P&gt;&lt;P&gt;object-group service admin tcp&lt;/P&gt;&lt;P&gt;port-object eq 80&lt;/P&gt;&lt;P&gt;port-object eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(NEW FORMAT)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service admin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 21:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394224#M270646</guid>
      <dc:creator>ciscotech45</dc:creator>
      <dc:date>2014-01-29T21:53:47Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394225#M270650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use whichever one you like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice that they are used in a different way in the ACL statement for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to use your above examples in an ACL that would allow all HTTP/HTTPS traffic they would look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OLD FORMAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit tcp any any object-group admin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NEW FORMAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit object-group admin-2 any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested the above on my firewall just to give an example. I created the other "object-group" with another name as it naturally would not let me use 2 sama named &lt;STRONG&gt;"object-group"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual ACL created above would look like this in the "open" form.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST; 4 elements; name hash: 0xd37fdb2b&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST line 1 extended permit tcp any any object-group admin (hitcnt=0) 0x258ea30a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list TEST line 1 extended permit tcp any any eq www (hitcnt=0) 0xc56dc15e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list TEST line 1 extended permit tcp any any eq https (hitcnt=0) 0x702064c1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST line 2 extended permit object-group admin-2 any any (hitcnt=0) 0xd42bcde9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list TEST line 2 extended permit tcp any any eq www (hitcnt=0) 0xc56dc15e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list TEST line 2 extended permit tcp any any eq https (hitcnt=0) 0x702064c1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; So the end result in the actual ACL is the same but the configuration format a bit different. I think the option to group all different protocols and ports under a single &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; would give a lot more flexibility to make rules. You wouldnt be limited to grouping together just TCP Ports but could combine UDP and ICMP for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; you used before is just meant to group together certain TCP Ports and use them at the end of the ACL to tell the ports that need to be opened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the new &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; configuration option you would actually write &lt;STRONG&gt;"permit object-group admin"&lt;/STRONG&gt; instead of &lt;STRONG&gt;"permit tcp"&lt;/STRONG&gt;. The &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; would actually tell what protocol is allowed and what ports belonging to it (if applicable).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are free to choose which one to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 07:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394225#M270650</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-30T07:23:59Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394226#M270653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks very much for explanation and actually testing it out!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have a similar question regarding the network object group.Which of these (option-A or option-B) would be a better &lt;/P&gt;&lt;P&gt;way of doing it in the 9.1x code? And like in the case the service object, will the ACL syntax differ here also depending on which option&amp;nbsp; I choose below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option-A:&lt;/P&gt;&lt;P&gt;object-group network remote-nets&lt;/P&gt;&lt;P&gt;network-object 10.8.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;network-object 10.9.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;Option-B:&lt;/P&gt;&lt;P&gt;object network remote-net1&lt;/P&gt;&lt;P&gt;subnet 10.8.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network remote-net2&lt;/P&gt;&lt;P&gt;subnet 10.9.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network remote-nets&amp;nbsp; (unsure if I have the correct syntax below. I am basically trying to put the two network objects created above into this one object group)&lt;/P&gt;&lt;P&gt;object network remote-net1&lt;/P&gt;&lt;P&gt;object network remote-net2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And another basic question I have is, for the traffic to flow between two separate interfaces (or subinterfaces) on the same ASA which are in different security levels, I will need to do the nat exemption statement if I don't want the traffic to be NAT'd, correct? Just making sure the NAT exemption is not just for the VPN tunnel config..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 15:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394226#M270653</guid>
      <dc:creator>ciscotech45</dc:creator>
      <dc:date>2014-01-30T15:37:08Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1x Object Groups</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394227#M270655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL syntax is not really that different compared to when you are using &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; or&lt;STRONG&gt; "object network"&lt;/STRONG&gt; in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a combined example allowing traffic from networks under &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; to a new under &lt;STRONG&gt;"object"&lt;/STRONG&gt; would look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit ip object-group OBJECT-1 object OBJECT-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit tcp object-group OBJECT-1 object OBJECT-2 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit udp object-group OBJECT-1 object OBJECT-2 eq domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST permit icmp object-group OBJECT-1 object OBJECT-2 echo&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So only difference is the keyword/parameter &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; or &lt;STRONG&gt;"object"&lt;/STRONG&gt; depending which type the following object actually is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to add the 2 created &lt;STRONG&gt;"object network"&lt;/STRONG&gt; under an &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; then you would use this format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network remote-nets&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object remote-net1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object remote-net2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see we need the &lt;STRONG&gt;"network-object object"&lt;/STRONG&gt; to indicate that we are adding an actual &lt;STRONG&gt;"object"&lt;/STRONG&gt; under this &lt;STRONG&gt;"object-group"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the traffic flow question there are many different situations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If you have no ACLs configured to the ASA interfaces then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value determines from which interfaces networks you can initiate connections to which interfaces networks. (Allow from higher to lower)&lt;/LI&gt;&lt;LI&gt;If you are using ACL on the interface then that will determine how traffic can be initiated. Typically ACLs are attached inbound direction so they only control connections initiated from behind that interface.&lt;/LI&gt;&lt;LI&gt;Whether you use interface ACLs or not there are couple of situations where you might need additional commands on the ASA.&lt;UL&gt;&lt;LI&gt;If you have 2 interfaces with equal &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;and want to keep it that way and also want to allow traffic between them you need to have the command &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;If you have a single interface which has traffic incoming to it and then forwarded back out through that interface then you will need the command &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;. The most common situation for this is when you have VPN Clients which need to connect to the Internet through the VPN connections to the ASA (outside interface) same naturally applies to connections between VPN connections.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new software you wont need to configure any NAT between your local interfaces if you dont want to NAT the networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The exception to this comes usually with VPN traffic. Then NAT0 is usually needed.&amp;nbsp; Since both your VPN traffic and Internet traffic usually flow between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface that means that if there is no NAT0 configuration the traffic gets matched to the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 16:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1x-object-groups/m-p/2394227#M270655</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-30T16:49:51Z</dc:date>
    </item>
  </channel>
</rss>

