<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Applying ACL globally in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924677#M456903</link>
    <description>&lt;P&gt;I have a question that I hope someone can clarify ... I will be supporting a new ASA 5585X running 8.4 and I was wondering if it's possible to apply an ACL globally instead of it as an access group that is applied to a specific interface as in or out ... below are the interfaces and ACL .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif internet-outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address X.X.X.X 255.255.255.0 standby X.X.X.X!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif internet-dmz&lt;/P&gt;&lt;P&gt;security-level 10&lt;/P&gt;&lt;P&gt;ip address 10.69.201.X 255.255.255.0 standby 10.69.201.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/8.129&lt;/P&gt;&lt;P&gt;nameif core-inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.69.129.X 255.255.255.0 standby 10.69.129.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.130&lt;/P&gt;&lt;P&gt;nameif VLAN130&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.130.X 255.255.255.0 standby 10.69.130.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.134&lt;/P&gt;&lt;P&gt;nameif VLAN134&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.134.X 255.255.255.0 standby 10.69.134.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.136&lt;/P&gt;&lt;P&gt;nameif VLAN136&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.136.X 255.255.255.0 standby 10.69.136.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.140&lt;/P&gt;&lt;P&gt;nameif VLAN140&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.140.X 255.255.255.0 standby 10.69.140.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Citrix Communications&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group All-Citrix object-group All-Citrix&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Check Point Firewall MGMT&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group FW-Admins object-group CP-Firewalls object-group CP-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group FW-Admins object-group CP-Firewalls object-group CP-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark QUALYS Scanner Access&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group qualys-scanners any&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group CN_HQ_NET host 10.69.130.12 eq 8080&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark ISX-Solorwinds&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp host 10.121.137.92 any object-group SNMP-mgmt-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit icmp host 10.121.137.92 any&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit icmp any host 10.121.137.92&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp any host 10.121.137.92 object-group SNMP-mgmt-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark citrix access to QA Leo systems&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group vmww-grp-2 object-group vmww-grp-1 eq www&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark EDI-Outbound&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 198.65.112.233 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.66 host 198.65.112.233 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 38.96.217.8 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.69 host 38.96.217.8 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 184.106.46.199 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.69 host 184.106.46.199 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Security&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group CP-Firewalls object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group CP-Firewalls object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Private_Addresses object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Private_Addresses object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Private-Addresses object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Private-Addresses object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark EDI&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group Primary_EDI_Servers object-group Primary_EDI_Servers&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Customer_To_Portals object-group Primary_EDI_Servers object-group EDI-Common_Inbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Customer_To_Portals host 10.69.201.88 object-group EDI-Common_Inbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Customer_To_Portals object-group EDI-Common_Outbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Primary_EDI_Servers object-group EDI_Customer_To_Portals object-group EDI-Common_Outbound_udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 10022&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 2223&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 2224&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 10022&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 2223&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 2224&lt;/P&gt;&lt;P&gt;access-list outside-acl-01 extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside-acl-01 in interface internet-outside&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:55:27 GMT</pubDate>
    <dc:creator>cevallosw</dc:creator>
    <dc:date>2019-03-11T22:55:27Z</dc:date>
    <item>
      <title>Applying ACL globally</title>
      <link>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924677#M456903</link>
      <description>&lt;P&gt;I have a question that I hope someone can clarify ... I will be supporting a new ASA 5585X running 8.4 and I was wondering if it's possible to apply an ACL globally instead of it as an access group that is applied to a specific interface as in or out ... below are the interfaces and ACL .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif internet-outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address X.X.X.X 255.255.255.0 standby X.X.X.X!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;nameif internet-dmz&lt;/P&gt;&lt;P&gt;security-level 10&lt;/P&gt;&lt;P&gt;ip address 10.69.201.X 255.255.255.0 standby 10.69.201.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/8.129&lt;/P&gt;&lt;P&gt;nameif core-inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.69.129.X 255.255.255.0 standby 10.69.129.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.130&lt;/P&gt;&lt;P&gt;nameif VLAN130&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.130.X 255.255.255.0 standby 10.69.130.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.134&lt;/P&gt;&lt;P&gt;nameif VLAN134&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.134.X 255.255.255.0 standby 10.69.134.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.136&lt;/P&gt;&lt;P&gt;nameif VLAN136&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.136.X 255.255.255.0 standby 10.69.136.X&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.140&lt;/P&gt;&lt;P&gt;nameif VLAN140&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.69.140.X 255.255.255.0 standby 10.69.140.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Citrix Communications&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group All-Citrix object-group All-Citrix&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Check Point Firewall MGMT&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group FW-Admins object-group CP-Firewalls object-group CP-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group FW-Admins object-group CP-Firewalls object-group CP-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark QUALYS Scanner Access&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group qualys-scanners any&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group CN_HQ_NET host 10.69.130.12 eq 8080&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark ISX-Solorwinds&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp host 10.121.137.92 any object-group SNMP-mgmt-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit icmp host 10.121.137.92 any&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit icmp any host 10.121.137.92&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp any host 10.121.137.92 object-group SNMP-mgmt-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark citrix access to QA Leo systems&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group vmww-grp-2 object-group vmww-grp-1 eq www&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark EDI-Outbound&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 198.65.112.233 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.66 host 198.65.112.233 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 38.96.217.8 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.69 host 38.96.217.8 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.68 host 184.106.46.199 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp host 10.69.130.69 host 184.106.46.199 eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark Security&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group CP-Firewalls object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group CP-Firewalls object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Private_Addresses object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Private_Addresses object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Private-Addresses object-group External-ACS object-group security-svc-tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Private-Addresses object-group External-ACS object-group security-svc-udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy remark EDI&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit ip object-group Primary_EDI_Servers object-group Primary_EDI_Servers&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Customer_To_Portals object-group Primary_EDI_Servers object-group EDI-Common_Inbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Customer_To_Portals host 10.69.201.88 object-group EDI-Common_Inbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Customer_To_Portals object-group EDI-Common_Outbound_tcp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit udp object-group Primary_EDI_Servers object-group EDI_Customer_To_Portals object-group EDI-Common_Outbound_udp&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 10022&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 2223&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group Primary_EDI_Servers object-group EDI_Dest_grp eq 2224&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq ssh&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 10022&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 2223&lt;/P&gt;&lt;P&gt;access-list wwy-legacy extended permit tcp object-group EDI_Itanium_Servers object-group EDI_Dest_grp eq 2224&lt;/P&gt;&lt;P&gt;access-list outside-acl-01 extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside-acl-01 in interface internet-outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924677#M456903</guid>
      <dc:creator>cevallosw</dc:creator>
      <dc:date>2019-03-11T22:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Applying ACL globally</title>
      <link>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924678#M456906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Beginning from 8.3(1) you should be able to use a single access-list to control traffic/connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It still uses the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command to "attach" the access-list as a global access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;command format is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group &lt;ACCESS-LIST name=""&gt; global&lt;/ACCESS-LIST&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just out of interest, are you moving to ASA from some other product or why would you want to use one global access-list? Personally I could never think of changing to global access-lists. I guess thats probably due to the fact that I have used the access-lists attached to certain interface and direction for so long.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2012 16:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924678#M456906</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-18T16:00:58Z</dc:date>
    </item>
    <item>
      <title>Applying ACL globally</title>
      <link>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924679#M456911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni , &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for the information which I will suggest them to add it .. Yes , this is a completed product migration from IPSO checkpoint NGXR65 to ASA5585X Version 8.4(3) ..&amp;nbsp;&amp;nbsp; I believe the reasoning behind using it as global was that each of the TenGig 0/9 subinterfaces use the same ACL ...&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Apr 2012 17:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/applying-acl-globally/m-p/1924679#M456911</guid>
      <dc:creator>cevallosw</dc:creator>
      <dc:date>2012-04-18T17:53:23Z</dc:date>
    </item>
  </channel>
</rss>

