<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA global rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020837#M402951</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share how you have configured the global rule and&amp;nbsp; share the object group configuration also if possible&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Oct 2012 06:10:49 GMT</pubDate>
    <dc:creator>Harish Balakrishnan</dc:creator>
    <dc:date>2012-10-12T06:10:49Z</dc:date>
    <item>
      <title>ASA global rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020836#M402950</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;we have firewall with 2 interfaces: outside and inside. I would like to create a rule to allow 3.3.3.0/24 from outside to be able to access a server behind the firewall inside interface (from security level 0 to security level 100). &lt;/P&gt;&lt;P&gt;I configured a rule:&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit object-group MonitoringServicesGroup object-group 3.3.3.0-group object-group WWWserver &lt;/P&gt;&lt;P&gt;access-group WAN_access_in in interface WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it was dropped when tested using the packet tracer, then I copy the same rule and place at global rule, after that it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when I removed the rule from WAN(outside) inteface, it dropped again. So my question is, do I have to put 2 rules-- one to be placed at the inteface and another to be placed at global?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020836#M402950</guid>
      <dc:creator>bindong.shi</dc:creator>
      <dc:date>2019-03-12T00:08:03Z</dc:date>
    </item>
    <item>
      <title>ASA global rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020837#M402951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share how you have configured the global rule and&amp;nbsp; share the object group configuration also if possible&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Harish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 06:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020837#M402951</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-10-12T06:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA global rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020838#M402952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some device to be reached through your firewall you will need to configure Static NAT (or in VPN connections case NAT Exemption)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic Static NAT configuration (depending on ASA software used) could be the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ASA software 8.2 and ealier NAT/ACL&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static(inside,outside) &lt;OUTSIDE-IP&gt; &lt;INSIDE-IP&gt; netmask 255.255.255.255&lt;/INSIDE-IP&gt;&lt;/OUTSIDE-IP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WAN_access_in permit &lt;PROTOCOL&gt; &lt;SOURCE ip=""&gt; &lt;DESTINATION ip="outside-IP"&gt; &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/PROTOCOL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can configure the above with object-groups like it seems you have done originally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;ASA software 8.3 and after NAT/ACL&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INSIDE-IP&gt;&lt;/INSIDE-IP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat(inside,outside) static &lt;OUTSIDE-IP&gt;&lt;/OUTSIDE-IP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WAN_access_in permit &lt;PROTOCOL&gt; &lt;SOURCE ip=""&gt; &lt;DESTINATION ip="inside-IP"&gt; &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/PROTOCOL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 06:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020838#M402952</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-12T06:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA global rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020839#M402953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if you meant that you are using an "global" access rule and interface specific access-rules with the "access-group" command, I would suggest to sticking to just one of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either do access-list to interface or ONLY use global access-rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I use interface specific rules and not global rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 06:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-global-rule/m-p/2020839#M402953</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-12T06:46:05Z</dc:date>
    </item>
  </channel>
</rss>

