<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic acl allowing guest access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-allowing-guest-access/m-p/1815545#M456096</link>
    <description>&lt;P&gt;I have an ASA 5550 at our main site with an external ethernet interface to our ISP for internet access.&amp;nbsp; I would like to allow 10.100.41.x/24 http / https access but block this network's access to all other internal networks including 172.17.x.x,,&amp;nbsp; 10.100.1 - 40.x, and others.&amp;nbsp; I'm having trouble identifying what IP address to use as the desitination for the permit rule for access to the internet.&amp;nbsp; The rule that comes after the permit is to deny 10.100.41.x/24 access to internal network addresses.&amp;nbsp; I'd sure appreciate any guidance someone could give me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob in Indiana&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:20:23 GMT</pubDate>
    <dc:creator>bschussl</dc:creator>
    <dc:date>2019-03-11T22:20:23Z</dc:date>
    <item>
      <title>acl allowing guest access</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-guest-access/m-p/1815545#M456096</link>
      <description>&lt;P&gt;I have an ASA 5550 at our main site with an external ethernet interface to our ISP for internet access.&amp;nbsp; I would like to allow 10.100.41.x/24 http / https access but block this network's access to all other internal networks including 172.17.x.x,,&amp;nbsp; 10.100.1 - 40.x, and others.&amp;nbsp; I'm having trouble identifying what IP address to use as the desitination for the permit rule for access to the internet.&amp;nbsp; The rule that comes after the permit is to deny 10.100.41.x/24 access to internal network addresses.&amp;nbsp; I'd sure appreciate any guidance someone could give me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob in Indiana&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:20:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-guest-access/m-p/1815545#M456096</guid>
      <dc:creator>bschussl</dc:creator>
      <dc:date>2019-03-11T22:20:23Z</dc:date>
    </item>
    <item>
      <title>acl allowing guest access</title>
      <link>https://community.cisco.com/t5/network-security/acl-allowing-guest-access/m-p/1815546#M456099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Put in the ACL to deny from 10.100.41.0 /24 to all RFC 1918 networks (10.0.0.0 /8, 172.16.0.0 /12, and 192.168.0.0 /16). From higher security inside (where it resides) to lower security outside (Internet) there is an implict allow which will normally use the global or other NAT (or PAT) pool you have setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 23:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-allowing-guest-access/m-p/1815546#M456099</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-01-27T23:55:23Z</dc:date>
    </item>
  </channel>
</rss>

