<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New ASA user deny access to 2 hosts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669777#M426828</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you understand me correctly.  I don't make the policies I just enforce them.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Mar 2007 17:14:16 GMT</pubDate>
    <dc:creator>scotts</dc:creator>
    <dc:date>2007-03-16T17:14:16Z</dc:date>
    <item>
      <title>New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669773#M426808</link>
      <description>&lt;P&gt;I'm very new to managing Cisco equipment.  I was given and pre-configured ASA5510 and I was recently asked to block external access to 2 hosts on my network.  I created a network/host group and added those 2 hosts to that group.  I then created a rule in my acl to block access for that group outgoing from the dest interface.  My second rule in that acl will allow access from my private subnet to any incoming from the src interface.  When I applied these rules the entire subnet lost connectivity.  could anyone lend me some assistance with this or perhaps point me in the right direction?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.    &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669773#M426808</guid>
      <dc:creator>scotts</dc:creator>
      <dc:date>2020-02-21T09:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669774#M426816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hard to understand which direction/interface you applied these. Could you post your acl's and also your access-group statements. Also explain who is supposed to be blocked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 00:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669774#M426816</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T00:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669775#M426820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize in advance if this is not what your looking for... But here goes &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network Surveilance&lt;/P&gt;&lt;P&gt; network-object Surv01-w2kd 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object Surv02-w2kd 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.224.16 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list dmz-in extended permit ip 10.0.1.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz-in extended permit ip 10.0.1.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.1.0 255.255.255.0 192.168.224.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.224.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 10.0.0.0 255.0.0.0 192.168.224.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.224.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip host 162.XX.XX.X 192.168.224.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split extended permit ip 192.168.224.0 255.255.255.0 host 162.XX.XX.X &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.1.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_access_out extended permit ip 192.168.1.0 255.255.255.0 10.0.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list mail_access_in extended permit tcp any host 162.XX.XXX.XX eq smtp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging emblem&lt;/P&gt;&lt;P&gt;logging list VPNLogs level notifications class vpn&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging console emergencies&lt;/P&gt;&lt;P&gt;logging monitor warnings&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;logging from-address &lt;A href="mailto:adsm@XXXXXXX.com"&gt;adsm@XXXXXXX.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;logging recipient-address &lt;A href="mailto:sXXXXs@XXXXXXX.com"&gt;sXXXXs@XXXXXXX.com&lt;/A&gt; level errors&lt;/P&gt;&lt;P&gt;logging queue 0&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.89 format emblem&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-Pool 192.168.224.16-192.168.224.31&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm506.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 4 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 4 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 4 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 162.XX.XX.X 192.168.1.4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 162.XX.XX.X 192.168.1.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-group dmz-in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done all of my configuration via ASDM, I want to deny access to the Surveilance group I noticed here that the ip's are not assigned to the hosts in that group, It appears that ASDM has ignored the ip address and inserted on the subnet mask.  When I pull that group back up in ASDM the IPs appear as normal. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 16:09:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669775#M426820</guid>
      <dc:creator>scotts</dc:creator>
      <dc:date>2007-03-16T16:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669776#M426823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand you correctly, you want to prevent inside users from going outside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669776#M426823</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T17:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669777#M426828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you understand me correctly.  I don't make the policies I just enforce them.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:14:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669777#M426828</guid>
      <dc:creator>scotts</dc:creator>
      <dc:date>2007-03-16T17:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669778#M426830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wasn't questioning you, just making sure I knew what you wanted to accomplish. So you created an access-list and applied it into the inside interface right? As soon as you do that, and put your denies in, you must put a permit ip any any at the end. There is always an explicit deny at the end of your acl. Which of course is ok, if that is your intention, but if not you must add the permit. Make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in extended deny ip &lt;HOST1&gt; any&lt;/HOST1&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in extended deny ip &lt;HOST2&gt; any&lt;/HOST2&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside_in in interface inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669778#M426830</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T17:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669779#M426835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes that makes sense.  Let me toss you a curveball if I may. Is it possible to limit these denies to specific times.  I.E. and I know this is probably not the correct format but &lt;/P&gt;&lt;P&gt;access-list inside_in extended deny ip &lt;HOST1&gt; any 17:00 - 07:59&lt;/HOST1&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669779#M426835</guid>
      <dc:creator>scotts</dc:creator>
      <dc:date>2007-03-16T17:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669780#M426838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it's possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Define your time-range...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/ps6120/products_command_reference_chapter09186a008063f103.html#wp1385822" target="_blank"&gt;http://cisco.com/en/US/products/ps6120/products_command_reference_chapter09186a008063f103.html#wp1385822&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can use it on the acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in extended deny ip &lt;HOST1&gt; any time-range &lt;NAME&gt;&lt;/NAME&gt;&lt;/HOST1&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669780#M426838</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T17:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669781#M426842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, thanks for all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669781#M426842</guid>
      <dc:creator>scotts</dc:creator>
      <dc:date>2007-03-16T17:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: New ASA user deny access to 2 hosts</title>
      <link>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669782#M426846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, please rate if they helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 17:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-asa-user-deny-access-to-2-hosts/m-p/669782#M426846</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T17:47:14Z</dc:date>
    </item>
  </channel>
</rss>

