<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic use extended ACL with NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955437#M401397</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Han,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you go for the standard ACL then you cannot specify the destination subnets and ports. You can specify only the source and the destination is considered any by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;standard ACL:&lt;/P&gt;&lt;P&gt;access-list 10 standard permit ip 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended ACL:&lt;/P&gt;&lt;P&gt;access-list abc permit tcp 172.16.0.0 255.255.255.0 10.0.0.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it differs. In your scenario destination is specific rather the source is any. So you have the extended ACL in picture for that. Hope this clears you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate if the given information helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Aug 2012 08:28:06 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2012-08-01T08:28:06Z</dc:date>
    <item>
      <title>use extended ACL with NAT</title>
      <link>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955435#M401395</link>
      <description>&lt;P&gt;Believe it or not, once in a while, i fumble with some basic concepts. Here is one, on our perimeter FW, ASA, there are these NATTING configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just couldnt figure out why they use extended ACL for the sources? isnt the standard one good enough? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Han&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip any 1XX.169.0.0 255.255.0.0&lt;BR /&gt;access-list dmz_nat0_outbound extended permit ip any 10.48.240.0 255.255.255.0&lt;BR /&gt;access-list dmz_nat0_outbound extended permit ip any 10.48.243.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_5 extended permit ip any 172.17.13.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound_5 extended permit ip any 192.168.12.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound_5 extended permit ip any 192.168.221.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (Outside) 2 2XX.YY.13.244 netmask 255.255.255.0&lt;BR /&gt;global (Outside) 1 2XX.YY.13.12 netmask 255.255.255.255&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound_5&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;BR /&gt;nat (dmz) 2 0.0.0.0 0.0.0.0&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955435#M401395</guid>
      <dc:creator>hanwucisco</dc:creator>
      <dc:date>2019-03-11T23:36:49Z</dc:date>
    </item>
    <item>
      <title>use extended ACL with NAT</title>
      <link>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955436#M401396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Dear Han&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well if you use standard ACL its only check for source address and so all the traffic from the specific source will be Natted okay so in the scenarios like split tunnel ...etc we use mostly extended ACL to differentiate the traffic based on the destination like all the traffic for far end Lan subnet should'nt be Natted while all the other traffic which mean to be for internet should be Natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will clear your concept.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Salman Jamshed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate it if its usefull for you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 21:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955436#M401396</guid>
      <dc:creator>saljam100</dc:creator>
      <dc:date>2012-07-31T21:42:49Z</dc:date>
    </item>
    <item>
      <title>use extended ACL with NAT</title>
      <link>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955437#M401397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Han,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you go for the standard ACL then you cannot specify the destination subnets and ports. You can specify only the source and the destination is considered any by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;standard ACL:&lt;/P&gt;&lt;P&gt;access-list 10 standard permit ip 172.16.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended ACL:&lt;/P&gt;&lt;P&gt;access-list abc permit tcp 172.16.0.0 255.255.255.0 10.0.0.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it differs. In your scenario destination is specific rather the source is any. So you have the extended ACL in picture for that. Hope this clears you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate if the given information helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 08:28:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/use-extended-acl-with-nat/m-p/1955437#M401397</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-08-01T08:28:06Z</dc:date>
    </item>
  </channel>
</rss>

