<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query regarding Cisco ASA ACLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293410#M310738</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"ACL_INSIDE"&lt;/STRONG&gt; statement doesnt make much sense if there is no corresponding NAT configuration NATing some other address towads the "inside" interface to the NAT IP address of 172.16.0.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally check the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show access-list ACL_INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And check if this rule even has any hitcounts. But to me it seems like a useless rule if there is no corresponding Static NAT configuration for the IP address 172.16.0.6. The reason is that the traffic inside the same subnet should not use the default gateway (ASA) for any traffic. That traffic should flow between the actual hosts since they are in the same subnet (they would use ARP to determine to which MAC address the traffic is sent)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see what ASA NAT configurations and ACL rules some certain traffic would match on the ASA then the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command is great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take for example the Static NAT between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have a ACL rule that allows SMTP traffic towards this server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&amp;nbsp; access-list ACL_DMZ2 permit tcp any host 192.168.1.4 eq smtp&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you wanted to simulate a packet incoming from host 192.168.1.100 towards IP address 192.168.1.4 with destination port TCP/25 (SMTP) then you could use this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output of this command would tell you what rules the ASA would apply to such a packet. You might end up with a short output if the traffic/packet would actually be blocked by some configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The general format of the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command should be pretty easy to understand&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You first enter &lt;STRONG&gt;"packet-tracer input"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then follow that with a source interface behind which the packet would be coming from and you would have &lt;STRONG&gt;"packet-tracer input DMZ2"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You would then choose the protocol (TCP/UDP/ICMP) which would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then choose th source IP address which can be any random address from the source network usually and you would have&lt;STRONG&gt; "packet-tracer input DMZ2 tcp 192.168.1.100"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then choose the source port for the simulated packet/connection which could also be random and you would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then add the destination IP address for the packet. It could be a NAT IP address if NAT is done for the destination IP as it is in this case. Then you would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Finally you add the destination port for the packet/connection and you end up with the full format of the command which is &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4 25"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the ratings. If you have already marked an answer as the correct answer then you have given that answer the full rating of 5 Stars. If you feel that some answer wasnt the exact correct answer but wish to rate it then you would first hower your mouse pointer over the gray stars below the reply and when the mouse pointer is over the amount of stars you want to give as rating you would click to choose that amount (it cant be changed later)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Oct 2013 07:20:08 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-22T07:20:08Z</dc:date>
    <item>
      <title>Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293404#M310732</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just started learning Cisco ASA firewall and i got stuck up while understanding&amp;nbsp; Cisco&amp;nbsp; ASA's ACL configurations and&amp;nbsp; your insight and help in this regard is&amp;nbsp; highly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the below image to understand my query better:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/7/2/162279-CiscoASA_ACL.jpg" alt="CiscoASA_ACL.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline; color: #993366;"&gt;&lt;STRONG&gt;My Networks Details:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network behind &lt;STRONG&gt;LAN&lt;/STRONG&gt; Interface - 172.16.0.1/255.255.0.0&lt;/P&gt;&lt;P&gt;Network behind &lt;STRONG&gt;DMZ1&lt;/STRONG&gt; Interface - 192.168.50.1/255.255.255.0&lt;/P&gt;&lt;P&gt;Network behind &lt;STRONG&gt;DMZ2&lt;/STRONG&gt; Interface - 192.168.1.1/255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt;&lt;SPAN style="text-decoration: underline; color: #008000;"&gt;&lt;STRONG&gt;Scenario 1:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i want to write an ACL (&lt;STRONG&gt;ACL_INSIDE&lt;/STRONG&gt;) for the &lt;STRONG&gt;input traffic of LAN Interface&lt;/STRONG&gt;. Hence i'm planning to configure my access-group as below:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote" style="border: 1px solid #cccccc; padding: 7px; background-color: #f5f5f5;"&gt;&lt;P&gt;access-group &lt;STRONG&gt;ACL_INSIDE&lt;/STRONG&gt; &lt;STRONG&gt;in&lt;/STRONG&gt; interface &lt;STRONG&gt;LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is, i couldn't understand, what that input traffic to LAN interface refers to?&lt;/P&gt;&lt;P&gt;Is it&lt;STRONG&gt; Traffic A&lt;/STRONG&gt; (as mentioned in the above image - On LAN Interface) or &lt;STRONG&gt;Traffic B&lt;/STRONG&gt; (as mentioned in the above image - On LAN Interface)&amp;nbsp; or &lt;STRONG&gt;both&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #0000cc; text-decoration: underline; "&gt;Say &lt;STRONG&gt;&lt;EM&gt;Traffic A&lt;/EM&gt;&lt;/STRONG&gt; alone refers to &lt;EM&gt;input traffic of LAN interface&lt;/EM&gt;&lt;/SPAN&gt;: (Refer the below scenario and correct me if i'm wrong)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, in all of my ACL_INSIDE ACEs, SRC IP should always be the Original IP of my LAN Network and DST IP could be of anything.&lt;/P&gt;&lt;P&gt;Also can i use the public IP of my LAN interface as a SRC IP in ACL??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="text-decoration: underline; "&gt;Sample ACL: &lt;SPAN style="color: #993366;"&gt;(LAN Network -&amp;gt; 172.16.0.1/255.255.0.0)&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #009900;"&gt;Valid ACLs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit tcp host &lt;STRONG&gt;172.16.0.24&lt;/STRONG&gt; 192.168.50.25 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #ff0000;"&gt;Invalid ACLs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;172.16.0.4&lt;/STRONG&gt; eq ntp &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;62.16.0.4**&lt;/STRONG&gt; eq ntp&lt;BR /&gt;&lt;STRONG&gt;** 62.16.0.4 is the public IP of 172.16.0.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #0000cc; text-decoration: underline; "&gt;Say &lt;STRONG&gt;&lt;EM&gt;Traffic B&lt;/EM&gt;&lt;/STRONG&gt; alone refers to &lt;EM&gt;input traffic of LAN interface&lt;/EM&gt;&lt;/SPAN&gt;: (Refer the below scenario and correct me if i'm wrong)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, in&amp;nbsp; all of my ACL_INSIDE ACEs, DST IP should always be the Original&amp;nbsp; IP/Public IP of my LAN Network and SRC IP could be of anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="text-decoration: underline; "&gt;Sample ACL:&lt;/STRONG&gt;&lt;SPAN style="color: #993366;"&gt;&lt;STRONG&gt; (LAN Network -&amp;gt; 172.16.0.1/255.255.0.0)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #009900;"&gt;Valid ACLs: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;172.16.0.4&lt;/STRONG&gt; eq ntp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;62.16.0.4**&lt;/STRONG&gt; eq ntp&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;**62.16.0.4 is the public IP of 172.16.0.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #ff0000;"&gt;Invalid ACLs: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit tcp host &lt;STRONG&gt;172.16.0.24&lt;/STRONG&gt; 192.168.50.25 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #0000cc; text-decoration: underline; "&gt;Say &lt;/SPAN&gt;&lt;SPAN style="color: #0000cc; text-decoration: underline; "&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="color: #0000cc; text-decoration: underline; "&gt;&lt;EM&gt;Traffic A and &lt;/EM&gt;&lt;/SPAN&gt;Traffic B&lt;/EM&gt;&lt;/STRONG&gt; both refers to &lt;EM&gt;input traffic of LAN interface&lt;/EM&gt;&lt;/SPAN&gt;: (Refer the below scenario and correct me if i'm wrong)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, I can use my LAN network as either SRC IP or DST IP of an ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="text-decoration: underline; "&gt;Sample ACL:&lt;/STRONG&gt;&lt;SPAN style="color: #993366;"&gt;&lt;STRONG&gt;(LAN Network -&amp;gt; 172.16.0.1/255.255.0.0)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;V&lt;SPAN style="color: #009900;"&gt;alid ACLs: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit tcp host &lt;STRONG&gt;172.16.0.24&lt;/STRONG&gt; 192.168.50.25 eq ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;172.16.0.4 &lt;/STRONG&gt;eq ntp &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list acl_inside permit udp any host &lt;STRONG&gt;62.16.0.4**&lt;/STRONG&gt; eq ntp&lt;STRONG&gt;&lt;BR /&gt;**62.16.0.4 is the public IP of 172.16.0.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H5&gt; &lt;SPAN style="text-decoration: underline; color: #008000;"&gt;&lt;STRONG&gt;Scenario 2:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say i want to write an ACL (&lt;STRONG&gt;ACL_INSIDE&lt;/STRONG&gt;) for the &lt;STRONG&gt;output traffic of LAN Interface&lt;/STRONG&gt;. Hence i need to configure my access-group as below:&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote" style="border: 1px solid #cccccc; padding: 7px; background-color: #f5f5f5;"&gt;&lt;P&gt;access-group &lt;STRONG&gt;ACL_INSIDE&lt;/STRONG&gt; &lt;STRONG&gt;out&lt;/STRONG&gt; interface &lt;STRONG&gt;LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt; Just let me know that i should consider this case is exactly opposite&amp;nbsp; to the above scenario or is there any special cases that i need to&amp;nbsp; understand?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help on this is highly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Awating your response,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Mahi&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293404#M310732</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2019-03-12T02:53:31Z</dc:date>
    </item>
    <item>
      <title>Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293405#M310733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; or &lt;STRONG&gt;"out"&lt;/STRONG&gt; is related to the interface itself. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; in the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command refers that you are controlling traffic incoming from behind that interfaces towards that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The direction &lt;STRONG&gt;"out"&lt;/STRONG&gt; in the&lt;STRONG&gt; "access-group"&lt;/STRONG&gt; command refers that you are controlling traffic that is heading out through that interface towards the networks located behind that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest sticking to using only &lt;STRONG&gt;"in"&lt;/STRONG&gt; (Inbound) ACLs on your interfaces since its the natural choice to control the traffic in the interface closest to the source host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configure both &lt;STRONG&gt;"in"&lt;/STRONG&gt; and &lt;STRONG&gt;"out"&lt;/STRONG&gt; ACLs for the same interface you might end up creating a needlesly complex ACL configuration that will cause headache in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice the fact also that when you have allowed something in a &lt;STRONG&gt;"in"&lt;/STRONG&gt; ACL on an interface, you wont have to allow return traffic at another interface where the reply is coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Scenario 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL configured with &lt;STRONG&gt;"access-group ACL_INSIDE in interface LAN"&lt;/STRONG&gt; controls traffic that is entering from behind the interface LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Scenario 2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL configured with&lt;STRONG&gt; "access-group ACL_INSIDE out interface LAN"&lt;/STRONG&gt; controls traffic that is heading to the networks behind interface LAN. Essentially it means the traffic has already crossed some other interface on the ASA (possibly controlled by some inbound ACL) and now goes through the LAN interface and goes through the &lt;STRONG&gt;"out"&lt;/STRONG&gt; direction check before the traffic is allowed to reach the networks behind interface LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is the reason why I basically just use&lt;STRONG&gt; "in" &lt;/STRONG&gt;direction ACLs on the interface. Its the simplest way and using also an &lt;STRONG&gt;"out"&lt;/STRONG&gt; direction ACL just means the same traffic is checked twice againts ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some situations to use both &lt;STRONG&gt;"in"&lt;/STRONG&gt; and &lt;STRONG&gt;"out"&lt;/STRONG&gt; ACLs but to be honest there have been very few situations for me personally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 09:43:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293405#M310733</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-18T09:43:23Z</dc:date>
    </item>
    <item>
      <title>Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293406#M310734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to imagine that you are inside the firewall, and then everything will start to make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN means everything going through an interface will be filtered. So if you have Network behind LAN Interface - 172.16.0.1/255.255.0.0, with access-group ACL_INSIDE in interface LAN,&amp;nbsp; first example is correct (access-list acl_inside permit tcp host &lt;STRONG&gt;172.16.0.24&lt;/STRONG&gt; 192.168.50.25 eq ftp). You're basically going to filter everything coming FROM the specified network to any different interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same when you have outside interface with something like ACL_OUTSIDE in interface outside. In this example you're going to filter traffic coming from outside (eg. Internet) to your local network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group ACL_INSIDE out interface LAN is not really recommended as it's more efficient to filter traffic before enter the firewall, not after. However in some scenarios can become useful (if we have to filter traffic from many different subinterfaces to one destination). Personally I've never seen that configured in my life &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Oct 2013 09:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293406#M310734</guid>
      <dc:creator>Mariusz Bochen</dc:creator>
      <dc:date>2013-10-18T09:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293407#M310735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all i want to thank &lt;SPAN style="font-size: 10pt;"&gt;JouniForss and &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;Mariusz Bochen for responding to my post.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i got&amp;nbsp; it clear what "IN" and "OUT" in access-group refers to. But i have some&amp;nbsp; sample Cisco Configurations with me, in which few ACLs are conflicting&amp;nbsp; with your explanation and hence it is confusing me. Could you please&amp;nbsp; help me in understanding those things also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="text-decoration: underline; color: #800080;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;My Networks Details:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;LAN&lt;/STRONG&gt; Interface - 172.16.0.1/255.255.0.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;DMZ1&lt;/STRONG&gt; Interface - 192.168.50.1/255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;DMZ2&lt;/STRONG&gt; Interface - 192.168.1.1/255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also (if needed) you can refer to the image which i have pasted in my original post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&lt;STRONG style="text-decoration: underline;"&gt;NAT related query:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say below is my Static NAT Configuration:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;What the above Static NAT rule says is 'while traffic goes from inside -&amp;gt; DMZ2, the IP address 172.16.0.19 of LAN network will be NATed to 192.168.1.4'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is this NAT rule also mean 'while traffic goes from DMZ2 -&amp;gt; inside , IP address &lt;SPAN style="font-size: 10pt;"&gt;192.168.1.4 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;will be NATed to &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.16.0.19&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;?'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&lt;STRONG style="text-decoration: underline;"&gt;Access-List related query:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Before understanding my query related to ACLs, refer the static NAT configurations (that are used in the ACLs), access-group,ACL configurations(taken from my sample ASA configuration) mentioned below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;Part of NAT Configurations (taken from my sample config):&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;static (DMZ2,outside) 62.59.14.163 192.168.1.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (DMZ2,outside) 62.59.14.200 192.168.1.200 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;Part of access-group configurations&lt;/EM&gt;&lt;EM&gt; (taken from my sample config):&lt;/EM&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;access-group ACL_DMZ2 in interface DMZ2&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;EM&gt;ACL_DMZ2 ACL Configurations&lt;/EM&gt; &lt;EM&gt;(taken from my sample config):&lt;/EM&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list ACL_DMZ2 permit tcp any host 192.168.1.4 eq smtp&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; permit tcp any host 192.168.1.2 eq smtp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; permit tcp any host 192.168.1.2 eq pop3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt; permit udp host 192.168.1.2 any eq domain &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;deny tcp any host 192.168.1.2 object-group mail_svcs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit tcp host 192.168.1.200 host 172.16.1.200 118&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;SPAN style="font-size: 10pt;"&gt;ACL_DMZ2 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;permit udp host 192.168.1.200 host 172.16.1.200 eq 118&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;As per my understanding, ACL "IN" on an interface (based on your explanation), &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;refers to the traffic that is originating from the network behind that interface and to the any other interface. i.e; &lt;STRONG&gt;Always the SRC IP in the ACE is IP related to the network behind that interface and the DST IP could be anything. &lt;/STRONG&gt;Now below are my queries:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #0000ff;"&gt;&lt;STRONG&gt;&lt;EM&gt;Question 1:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you observe the first ACE of the above mentioned quotted box (&lt;EM&gt;access-list ACL_DMZ2 permit tcp &lt;STRONG&gt;any &lt;/STRONG&gt;host &lt;STRONG&gt;192.168.1.4&lt;/STRONG&gt; eq smtp) &lt;/EM&gt;which is applied on DMZ2 interface (192.168.1.1/255.255.255.224) on input traffic, the SRC IP is &lt;EM&gt;&lt;STRONG&gt;Any&lt;/STRONG&gt; &lt;/EM&gt;and the DST IP is the &lt;STRONG&gt;DMZ2 network IP&lt;/STRONG&gt;. How should i interpret this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because as per your explanation, always the &lt;STRONG&gt;SRC IP Should be the network behind that interface&lt;/STRONG&gt;. But here, &lt;STRONG&gt;network behind that interface is in DST IP of an ACE&lt;/STRONG&gt; which is conflicting. Please clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;&lt;EM&gt;Question 2:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In this case &lt;SPAN style="font-size: 10pt;"&gt;(i.e; ACL is applied on "IN")&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;, always do we need to apply NAT&amp;nbsp; for DST IP of an ACL to determine the DST Interface of the ACL. Or do we&amp;nbsp; have any other way to determine to which interface that ACE is destined&amp;nbsp; to?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;------------------------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Apart from this, the below two ACEs that are applied on "IN" Traffic of LAN Interface are also confusing me.&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list ACL_INSIDE permit udp host 192.168.5.251 any&lt;/P&gt;&lt;P&gt;access-list ACL_INSIDE udp any host 172.16.0.6 eq ntp&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;STRONG&gt;&lt;EM&gt;Question 3:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the first among the above two, SRC IP is &lt;EM&gt;&lt;STRONG&gt;192.168.5.251&lt;/STRONG&gt;&lt;/EM&gt; (not related to LAN Network but routed to LAN Gateway) and DST IP is &lt;STRONG style="font-style: italic;"&gt;Any. &lt;/STRONG&gt; and Service is not mentioned at all...What service should i consider?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the 2nd ACE of above two, is same as my question 2 that will answer to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again i thank you all for assisting me in this regard. Its so nice of you to share the knowledge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Mahi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 11:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293407#M310735</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2013-10-21T11:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293408#M310736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of regarding the Static NAT configuration you mentioned&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0 &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This essentially does the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When connection is formed from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt; the source address of 172.16.0.9 is NATed to the IP address 192.168.1.4&lt;/LI&gt;&lt;LI&gt;When connection is formed from &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt; to &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to the destination IP address 192.168.1.4 then that destination address is UN-NATed from 192.168.1.4 to 172.16.0.9&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to Question 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source address &lt;STRONG&gt;"any"&lt;/STRONG&gt; simply says that any source address behind &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt; can connect to the destination IP address 192.168.1.4. The reason why you would need such an ACL rule (ACE) for allow traffic to a destination IP address in the connected network is because you have Static NATed a host behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; towards the &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt; to an IP address belonging to &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt; connected network. (Look at the above explanation of the Static NAT when traffic is going to 192.168.1.4 from behind &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to Question 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need a NAT configuration for the destination IP address depends on your situation. Usually this is not neede between local LAN/DMZ interfaces. Atleast I myself will usually leave out all NAT configurations between local interfaces. Usually you need a Static NAT between internal and external interfaces. For example when configuring Static NAT for one of your servers so it can be reached from the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An important thing to notice related to this matter is that the NAT behaviour in different ASA software levels is considerably different. You are using some version 8.2 (or below) while NAT/ACL format in 8.3 (or above) is completely different in logic and the above information doesnt apply to it anymore)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to Question 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We wont be able to tell your for what traffic this UDP &lt;STRONG&gt;"any"&lt;/STRONG&gt; rule is configured for. The most likely would be UDP/53 (DNS) among others like UDP/123 (NTP). You can either monitor logs or capture UDP traffic on the firewall to determine what UDP traffic is coming. You can also check the hitcount of the ACL with &lt;STRONG&gt;"show access-list"&lt;/STRONG&gt; command to determine if its getting any hits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark replys as correct answers if they answered your question and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Oct 2013 13:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293408#M310736</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-21T13:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293409#M310737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again i thank you so much for clarifying all my doubts. Now i can able to understand the ACL and NAT configurations of ASA 8.2 version with all your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is so nice of you to share the knowledge to the people like me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got one more small doubt, could you please clarify that one also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before&amp;nbsp; understanding my query related to ACLs, refer the static NAT&amp;nbsp; configurations (that are used in the ACLs), access-group,ACL&amp;nbsp; configurations(taken from my sample ASA configuration) mentioned below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial, verdana, sans-serif;"&gt;&lt;SPAN style="text-decoration: underline; color: #800080;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;My Networks Details:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;LAN&lt;/STRONG&gt; Interface - 172.16.0.1/255.255.0.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;DMZ1&lt;/STRONG&gt; Interface - 192.168.50.1/255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: arial, verdana, sans-serif;"&gt;Network behind &lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;DMZ2&lt;/STRONG&gt; Interface - 192.168.1.1/255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Part of NAT Configurations (taken from my sample config):&lt;/EM&gt;&lt;/P&gt;&lt;PRE jivemacro="quote"&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;static (DMZ2,outside) 62.59.14.163 192.168.1.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (DMZ2,outside) 62.59.14.200 192.168.1.200 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Part of access-group configurations&lt;/EM&gt;&lt;EM&gt; (taken from my sample config):&lt;/EM&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;access-group ACL_DMZ2 in interface DMZ2 &lt;PRE jivemacro="quote"&gt;access-group ACL_INSIDE in interface LAN &lt;/PRE&gt;
&lt;BR /&gt; &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="white-space: pre; font-size: 10pt;"&gt;Part of ACL Configurations&lt;/EM&gt;&lt;SPAN style="white-space: pre; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;EM style="white-space: pre; font-size: 10pt;"&gt;(taken from my sample config):&lt;/EM&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list ACL_DMZ2 permit tcp any host 192.168.1.4 eq smtp&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list ACL_INSIDE permit udp any host 172.16.0.6 eq ntp&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**In the above ACL configuration samples, as they are applied to input&amp;nbsp; traffic of their respective interfaces, always the SRC IP should be&amp;nbsp; related to the network behind that interface (I mean network associated&amp;nbsp; with that interface) and the DST IP could be any other IP related to&amp;nbsp; some other interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you observe the first ACE (ACL_DMZ2) of above sample, the SRC IP is &lt;EM style="font-size: 10pt;"&gt;&lt;STRONG&gt;Any &lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;and the DST IP is &lt;/SPAN&gt;&lt;EM style="font-size: 10pt;"&gt;&lt;STRONG&gt;192.168.1.4 &lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;and as per your earlier explanation, that ACE refers to permit smtp traffic from and 'Any' &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;IP with in DMZ2 to 172.16.0.19 (NATed IP of 192.168.1.4) and it makes sense.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if you observe the second ACE (ACL_INSIDE) of above sample, the SRC IP is &lt;EM style="font-size: 10pt;"&gt;&lt;STRONG&gt;Any &lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;and the DST IP is &lt;/SPAN&gt;&lt;EM style="font-size: 10pt;"&gt;&lt;STRONG&gt;172.16.0.6&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Now how should i interpret/understand this ACE? Because there is no NAT rules configured to&amp;nbsp; translate 172.16.0.6 IP.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;As per my understanding (based on your earlier&amp;nbsp; explanations) always SRC IP of an ACL is related to the network behind&amp;nbsp; that interface and the DST IP could be any other IP related to some&amp;nbsp; other interface. But here it is contradicting. So please help me in&amp;nbsp; understanding this ACE.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again i really appreciate for all your help to me till now &lt;SPAN style="font-size: 10pt;"&gt;in understanding the ACL concepts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a bow Cisco Forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** I have marked the replies as correct but i couldn't understand where to give rating to the answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Awaiting your response,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Mahi&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 05:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293409#M310737</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2013-10-22T05:24:34Z</dc:date>
    </item>
    <item>
      <title>Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293410#M310738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"ACL_INSIDE"&lt;/STRONG&gt; statement doesnt make much sense if there is no corresponding NAT configuration NATing some other address towads the "inside" interface to the NAT IP address of 172.16.0.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally check the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show access-list ACL_INSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And check if this rule even has any hitcounts. But to me it seems like a useless rule if there is no corresponding Static NAT configuration for the IP address 172.16.0.6. The reason is that the traffic inside the same subnet should not use the default gateway (ASA) for any traffic. That traffic should flow between the actual hosts since they are in the same subnet (they would use ARP to determine to which MAC address the traffic is sent)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see what ASA NAT configurations and ACL rules some certain traffic would match on the ASA then the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command is great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take for example the Static NAT between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"DMZ2"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;static (inside,DMZ2) 192.168.1.4 172.16.0.19 netmask 255.255.255.255 0 0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have a ACL rule that allows SMTP traffic towards this server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&amp;nbsp; access-list ACL_DMZ2 permit tcp any host 192.168.1.4 eq smtp&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you wanted to simulate a packet incoming from host 192.168.1.100 towards IP address 192.168.1.4 with destination port TCP/25 (SMTP) then you could use this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output of this command would tell you what rules the ASA would apply to such a packet. You might end up with a short output if the traffic/packet would actually be blocked by some configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The general format of the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command should be pretty easy to understand&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You first enter &lt;STRONG&gt;"packet-tracer input"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then follow that with a source interface behind which the packet would be coming from and you would have &lt;STRONG&gt;"packet-tracer input DMZ2"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You would then choose the protocol (TCP/UDP/ICMP) which would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then choose th source IP address which can be any random address from the source network usually and you would have&lt;STRONG&gt; "packet-tracer input DMZ2 tcp 192.168.1.100"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then choose the source port for the simulated packet/connection which could also be random and you would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You then add the destination IP address for the packet. It could be a NAT IP address if NAT is done for the destination IP as it is in this case. Then you would end up with &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Finally you add the destination port for the packet/connection and you end up with the full format of the command which is &lt;STRONG&gt;"packet-tracer input DMZ2 tcp 192.168.1.100 12345 192.168.1.4 25"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the ratings. If you have already marked an answer as the correct answer then you have given that answer the full rating of 5 Stars. If you feel that some answer wasnt the exact correct answer but wish to rate it then you would first hower your mouse pointer over the gray stars below the reply and when the mouse pointer is over the amount of stars you want to give as rating you would click to choose that amount (it cant be changed later)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 07:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293410#M310738</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T07:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding Cisco ASA ACLs</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293411#M310739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much JounisForss for your detailed explanation on NAT and ACL Configurations. Now i understood completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I started learning these concepts for 8.3 version and above and i found below are the differences w.r.t NAT and ACLs from Pre 8.3 and 8.3 and above versions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;OL&gt;&lt;/OL&gt;&lt;OL start="1"&gt;&lt;/OL&gt;&lt;OL start="1"&gt;&lt;LI&gt;The NAT Configurations are completely different from all previous version of ASA. &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-9129" rel="nofollow" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-9129&lt;/A&gt;&lt;BR /&gt; document will explain this in detail.&lt;/LI&gt;&lt;LI&gt;The IP addresses used in the ACLs are different (pre-8.3 versions used the global/translated IPs, whereas 8.3 always uses the &lt;EM&gt;real IPs&lt;/EM&gt; (untranslated)&lt;/LI&gt;&lt;LI&gt;A new concept of host-based objects was introduced, to allow singular hosts to be referenced by their names (previously, we had the &lt;EM&gt;name &lt;/EM&gt;command, but that was more of a macro-substitution in the show running-config output).&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="line-height: 0px; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I found that there are no differences in these NAT and ACL configurations from versions 8.3 to 9.1. Please let me know if there are any.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from this, i have few doubts in understanding AAA Rules. Could you please clarify me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the below AAA,ACL configurations to understand my query better. (Consider the AD/RADIUS/etc...configurations that are needed for identity rules are already done.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;STRONG&gt;My ACL Configuration:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 0px;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# access-list &lt;STRONG&gt;100 &lt;/STRONG&gt;extended permit tcp any 192.168.50.118 255.255.255.255 eq http&lt;/PRE&gt;
&lt;/PRE&gt;
hostname(config)# access-list &lt;STRONG&gt;100 &lt;/STRONG&gt;ex permit ip user CISCO\xyz any any&lt;/PRE&gt;&lt;PRE&gt;hostname(config)# access-list &lt;STRONG&gt;100 &lt;/STRONG&gt;ex deny ip user CISCO\abc any any&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG&gt;hostname(config)# access-list 100 ex permit ip user &lt;EM&gt;NONE &lt;/EM&gt;any any&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;hostname(config)# access-list &lt;STRONG&gt;100 &lt;/STRONG&gt;ex deny any any&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;hostname(config)# access-list 200 ex permit user &lt;EM&gt;NONE &lt;/EM&gt;any any&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 10pt; color: #ff6600;"&gt;My access-group Configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;hostname(config)# access-group &lt;STRONG&gt;100 &lt;/STRONG&gt;in interface inside &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff6600;"&gt;My HTTP Access Configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;hostname(config)# http server enable&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# &lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# auth-prompt prompt Enter Your Authentication &lt;/PRE&gt;
&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config)# auth-prompt accept You are Good &lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# auth-prompt reject Goodbye&lt;BR /&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;SPAN style="color: #ff6600;"&gt;&lt;STRONG&gt;My AAA Server Configuration:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# aaa-server &lt;STRONG&gt;LDAP &lt;/STRONG&gt;protocol ldap &lt;SPAN style="color: #0000cc;"&gt;&lt;EM&gt;&lt;STRONG&gt;- AAA Server NAME (LDAP)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;SPAN style="color: #0000cc;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-group)# aaa-server &lt;STRONG&gt;LDAP &lt;/STRONG&gt;(inside) host 171.1.2.93 &lt;EM&gt;&lt;STRONG style="color: #0000cc;"&gt;- AAA Server Host(172.1.2.93)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-base-dn DC=cisco,DC=com&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-group-base-dn DC=cisco,DC=co&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-scope subtree&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-login-dn cn=kao,OU=Employees,OU=Cisco&amp;nbsp; Users,DC=cisco,DC=com&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-login-password *****&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; ldap-over-ssl enable&lt;BR /&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config-aaa-server-host)#&amp;nbsp; server-type microsoft&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;SPAN style="color: #333333; text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG style="text-decoration: underline; "&gt;&lt;EM&gt; Case 1:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;PRE&gt;&lt;PRE&gt;hostname(config)# aaa authenticate match &lt;STRONG&gt;200 &lt;/STRONG&gt;inside &lt;STRONG&gt;LDAP&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE style="font-weight: bold;"&gt;&lt;EM&gt;&lt;STRONG style="text-decoration: underline;"&gt;Case 2:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config)# aaa authenticate match &lt;STRONG&gt;200 &lt;/STRONG&gt;inside &lt;STRONG&gt;user-identity &lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;Case 3:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;
&lt;PRE&gt;&lt;PRE&gt;hostname(config)# aaa authenticate match &lt;STRONG&gt;200 &lt;/STRONG&gt;inside &lt;STRONG&gt;LDAP user-identity &lt;/STRONG&gt;&lt;STRONG style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt; &lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/PRE&gt;
&lt;P style="font-weight: bold;"&gt;Now how should i understand the above ACLs i.e; 100 and 200 in all the above three cases/types of AAA match configurations.(especially the ACLs that have user as NONE - bolded one).&lt;/P&gt;
&lt;P&gt;Please help me in understanding this.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;STRONG&gt; &lt;/STRONG&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;You have always been a great help to me &amp;amp; I salute for that.&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;STRONG&gt; &lt;/STRONG&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;Awaiting your response,&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;STRONG&gt; &lt;/STRONG&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;Best Regards,&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;-Mahi&lt;/P&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 10:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-cisco-asa-acls/m-p/2293411#M310739</guid>
      <dc:creator>Mahi Gurram</dc:creator>
      <dc:date>2013-10-24T10:31:44Z</dc:date>
    </item>
  </channel>
</rss>

