<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic acl and object-groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186787#M360848</link>
    <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I need help on clarifying how ACLs and object-groups work. I don't have extensive firewall knowledge so I'll try to explain it as clear as possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have read that basically everything can be an object-group (e.g. "object-group network" "object-group protocol""object-group service", etc). Now, how do you apply that to an ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Let's say I have two subnets and two ports and I do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object-group network Subnet&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 /24&lt;/P&gt;&lt;P&gt; network-object 192.168.12.0 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object-group service Port&lt;/P&gt;&lt;P&gt; port-object 3333&lt;/P&gt;&lt;P&gt; port-object 4444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list dmz2_in permit tcp Subnet 172.16.10.0 255.255.255.0 eq Port&lt;/P&gt;&lt;P&gt; access-list inside_in permit tcp 172.16.10.0 255.255.255.0 Subnet eq Port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Are those ACLs valid? &lt;/P&gt;&lt;P&gt;If the 10 subnet is associated with port 3333 and the 12 is with 4444, wouldn't this create security concerns since now I can try to access port 4444 from the 10 subnet as well?&lt;/P&gt;&lt;P&gt;Can I also use an "object-group protocol" and replace tcp with it? &lt;/P&gt;&lt;P&gt;How do you configure your ASA to keep it readable? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have a few more questions but I want to start by this since I am not sure if I am making sense or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks in advance. RG&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:09:30 GMT</pubDate>
    <dc:creator>Limitless1801</dc:creator>
    <dc:date>2019-03-12T01:09:30Z</dc:date>
    <item>
      <title>acl and object-groups</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186787#M360848</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I need help on clarifying how ACLs and object-groups work. I don't have extensive firewall knowledge so I'll try to explain it as clear as possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have read that basically everything can be an object-group (e.g. "object-group network" "object-group protocol""object-group service", etc). Now, how do you apply that to an ACL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Let's say I have two subnets and two ports and I do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object-group network Subnet&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 /24&lt;/P&gt;&lt;P&gt; network-object 192.168.12.0 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; object-group service Port&lt;/P&gt;&lt;P&gt; port-object 3333&lt;/P&gt;&lt;P&gt; port-object 4444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list dmz2_in permit tcp Subnet 172.16.10.0 255.255.255.0 eq Port&lt;/P&gt;&lt;P&gt; access-list inside_in permit tcp 172.16.10.0 255.255.255.0 Subnet eq Port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Are those ACLs valid? &lt;/P&gt;&lt;P&gt;If the 10 subnet is associated with port 3333 and the 12 is with 4444, wouldn't this create security concerns since now I can try to access port 4444 from the 10 subnet as well?&lt;/P&gt;&lt;P&gt;Can I also use an "object-group protocol" and replace tcp with it? &lt;/P&gt;&lt;P&gt;How do you configure your ASA to keep it readable? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have a few more questions but I want to start by this since I am not sure if I am making sense or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks in advance. RG&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186787#M360848</guid>
      <dc:creator>Limitless1801</dc:creator>
      <dc:date>2019-03-12T01:09:30Z</dc:date>
    </item>
    <item>
      <title>acl and object-groups</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186788#M360849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alot of the time I dont use object-groups but this is mostly due to the fact that most common firewall rules that customer needs added is along the lines of HTTP/HTTPS, SMTP etc. These usually dont require any object-groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then theres situation where you really benefit from using "object-group". Im some situations you can use same "object-groups" for both NAT and ACL to make the configurations easy to modify together&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your above configuration format isnt exactly correct. I can't exactly remember if there has been changes to the "service" object-group configuration formats from the past software but this is the same from my own ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service SERVICE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq 3333&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq 4444&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.12.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN extended permit object-group SERVICE object-group NETWORKS 172.16.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above would allow&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;TCP destination port 3333 and 4444 traffic&lt;UL&gt;&lt;LI&gt;Notice that the "object-group servic SERVICE" is used right after the "permit"&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;The above traffic would be allowed when source network is either 192.168.10.0/24 or 192.168.12.0/24 and the destination network was 172.16.10.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres the same ACL line in "open" form&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# sh access-list INSIDE-IN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN; 4 elements; name hash: 0xf1656621&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 1 extended permit object-group SERVICE object-group NETWORKS 172.16.10.0 255.255.255.0 0xdeaaa383&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list INSIDE-IN line 1 extended permit tcp 192.168.10.0 255.255.255.0 172.16.10.0 255.255.255.0 eq 3333 (hitcnt=0) 0x9eb522be&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list INSIDE-IN line 1 extended permit tcp 192.168.12.0 255.255.255.0 172.16.10.0 255.255.255.0 eq 3333 (hitcnt=0) 0xc70b2f39&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list INSIDE-IN line 1 extended permit tcp 192.168.10.0 255.255.255.0 172.16.10.0 255.255.255.0 eq 4444 (hitcnt=0) 0x1c20018e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list INSIDE-IN line 1 extended permit tcp 192.168.12.0 255.255.255.0 172.16.10.0 255.255.255.0 eq 4444 (hitcnt=0) 0xd878ac50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally when you want really specific rules for different networks you dont group them in the same object-groups. So in your above situation both networks 192.168.10.0/24 and 192.168.12.0/24 could connect the other network with destination port TCP/3333 and TCP/4444 and the other way around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have to this day had no need to configure a "object-group protocol". I guess it might have its uses but so far I have had no need to use it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be easier to give you an example of how to configure something if you stated what you were after.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Mar 2013 21:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186788#M360849</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-04T21:22:17Z</dc:date>
    </item>
    <item>
      <title>acl and object-groups</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186789#M360850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot for the explanation. That answered my question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Mar 2013 14:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-object-groups/m-p/2186789#M360850</guid>
      <dc:creator>Limitless1801</dc:creator>
      <dc:date>2013-03-05T14:54:54Z</dc:date>
    </item>
  </channel>
</rss>

