<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How can I let the inface ACL take precedence instead of global A in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021741#M399108</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer, Thanks for the answer but I did all that. The issue is "global_access" ACL is taking hit instead I want the "outside-102_access_in" ACL to take the hit. Refter to config and out put below. Note the hit count (hitcnt). I was using ASDM for the configuration.&amp;nbsp; Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;#Configuration#&lt;SPAN style="font-size: 11pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; nameif outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; ip address 10.10.49.10 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;!&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;interface Ethernet0/0.102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; vlan 102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; nameif outside-102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; ip address 10.10.102.10 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside_access_in extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list global_access extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access extended deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group outside-102_access_in in interface outside-102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;--------------------------------------------------------------------------------------------------------------------------------- &lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;#(Show access-list)ACL hit out put#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in; 6 elements; name hash: 0xc363e860&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in line 2 extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services 0xe570cd00&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq www (hitcnt=0) 0x15474d40&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq https (hitcnt=0) 0x53b13506&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq www (hitcnt=1) 0x6a950467&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq https (hitcnt=0) 0x3829b7d9&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq 8080 (hitcnt=0) 0xa50cd17d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq 8080 (hitcnt=0) 0xa9068494&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access line 2 extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services 0x2d7c6535&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq www (hitcnt=80) 0xbc9de457&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq https (hitcnt=14) 0x04fd7f01&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq www (hitcnt=25) 0xcec77040&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq https (hitcnt=20) 0xbfc31e79&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq 8080 (hitcnt=0) 0xd5207de1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq 8080 (hitcnt=4) 0x2266d79c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access line 3 extended deny ip any any (hitcnt=158) 0x0cac2fd5&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Sep 2012 21:20:05 GMT</pubDate>
    <dc:creator>hainsannn</dc:creator>
    <dc:date>2012-09-20T21:20:05Z</dc:date>
    <item>
      <title>How can I let the inface ACL take precedence instead of global ACL in ASA 8.31?</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021739#M399099</link>
      <description>&lt;P&gt;1. In ASA 8.31 global ACL seen to taking precedence. I want to use interface ACL. What do I need to do? Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021739#M399099</guid>
      <dc:creator>hainsannn</dc:creator>
      <dc:date>2019-03-11T23:56:25Z</dc:date>
    </item>
    <item>
      <title>How can I let the inface ACL take precedence instead of global A</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021740#M399100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interface specific ACL should take precedence over the global ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the command for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/a1.html#wp1597389"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/a1.html#wp1597389&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 01:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021740#M399100</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-20T01:06:30Z</dc:date>
    </item>
    <item>
      <title>How can I let the inface ACL take precedence instead of global A</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021741#M399108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer, Thanks for the answer but I did all that. The issue is "global_access" ACL is taking hit instead I want the "outside-102_access_in" ACL to take the hit. Refter to config and out put below. Note the hit count (hitcnt). I was using ASDM for the configuration.&amp;nbsp; Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;#Configuration#&lt;SPAN style="font-size: 11pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; nameif outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; ip address 10.10.49.10 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;!&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;interface Ethernet0/0.102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; vlan 102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; nameif outside-102&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt; ip address 10.10.102.10 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside_access_in extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list global_access extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access extended deny ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group outside-102_access_in in interface outside-102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;--------------------------------------------------------------------------------------------------------------------------------- &lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;#(Show access-list)ACL hit out put#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in; 6 elements; name hash: 0xc363e860&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;access-list outside-102_access_in line 2 extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services 0xe570cd00&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq www (hitcnt=0) 0x15474d40&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq https (hitcnt=0) 0x53b13506&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq www (hitcnt=1) 0x6a950467&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq https (hitcnt=0) 0x3829b7d9&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq 8080 (hitcnt=0) 0xa50cd17d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list outside-102_access_in line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq 8080 (hitcnt=0) 0xa9068494&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access line 2 extended permit tcp object dwp-network object-group dmz-test-servers object-group web-services 0x2d7c6535&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq www (hitcnt=80) 0xbc9de457&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq https (hitcnt=14) 0x04fd7f01&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq www (hitcnt=25) 0xcec77040&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq https (hitcnt=20) 0xbfc31e79&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.141 eq 8080 (hitcnt=0) 0xd5207de1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;&amp;nbsp; access-list global_access line 2 extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.10.140 eq 8080 (hitcnt=4) 0x2266d79c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-family: Calibri; font-size: 11pt;"&gt;access-list global_access line 3 extended deny ip any any (hitcnt=158) 0x0cac2fd5&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 21:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021741#M399108</guid>
      <dc:creator>hainsannn</dc:creator>
      <dc:date>2012-09-20T21:20:05Z</dc:date>
    </item>
    <item>
      <title>How can I let the inface ACL take precedence instead of global A</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021742#M399112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share the entire configuration of the ASA... It might be something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2012 22:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021742#M399112</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-20T22:11:00Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021743#M399113</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;If you are using 8.3 + version. think you are trying to access from outside which will be internet. Hope you are aware that in 8.3 + while writing access-list for outside interface and if you are using NAT statements then you have to use private IP instead of public.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;Ex for pre 8.2 :&lt;/STRONG&gt; access-list raja extended permit ip any host 4.4.4.4 &amp;nbsp;(This will be access list if you trying from internet and your inside host(10.1.1.1) is natted with 4.4.4.4.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;Ex for post 8.3 :&lt;/STRONG&gt;&lt;SPAN&gt; access-list raja extended permit ip any host 10.1.1.1 (This will be access list if you trying from internet and your inside host(10.1.1.1) is natted with 4.4.4.4.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;You have to use the private IP in your access-lists while natting in the new ASA software.&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Try this and let me know if this resolves the issue .&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thank&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;VairavarajaRP&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2016 23:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-can-i-let-the-inface-acl-take-precedence-instead-of-global/m-p/2021743#M399113</guid>
      <dc:creator>vairavss1</dc:creator>
      <dc:date>2016-08-11T23:59:55Z</dc:date>
    </item>
  </channel>
</rss>

