<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access-list - Hostname as source in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717351#M534486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not possible unfortunately. If this is an address that resolves to an internet hostname, you'll need to run nslookup on that hostname to get the addresses. You can then create an object-group for ease of management. (It *might* work on the new IOS version, but I'm running 8.0x and it doesn't work.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hostname: bing.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nslookup bing.com&lt;/P&gt;&lt;P&gt;1.1.1.1&lt;/P&gt;&lt;P&gt;2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network bing.com&lt;/P&gt;&lt;P&gt;network host 1.1.1.1&lt;/P&gt;&lt;P&gt;network host 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE permit ip any object-group bing.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the only way that I know you'd be able to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall will translate addresses from the CLI, but it won't do it for your hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Aug 2011 15:56:23 GMT</pubDate>
    <dc:creator>John Blakley</dc:creator>
    <dc:date>2011-08-01T15:56:23Z</dc:date>
    <item>
      <title>Access-list - Hostname as source</title>
      <link>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717350#M534485</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have an ASA 5540 and I'd like to create a rule using a specific host name as source of the traffic, not an ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My firewall already resolves names to IP address so I can ping all my internal hosts by name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tauer&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717350#M534485</guid>
      <dc:creator>Tauer Drumond</dc:creator>
      <dc:date>2019-03-11T21:06:31Z</dc:date>
    </item>
    <item>
      <title>Access-list - Hostname as source</title>
      <link>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717351#M534486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not possible unfortunately. If this is an address that resolves to an internet hostname, you'll need to run nslookup on that hostname to get the addresses. You can then create an object-group for ease of management. (It *might* work on the new IOS version, but I'm running 8.0x and it doesn't work.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hostname: bing.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nslookup bing.com&lt;/P&gt;&lt;P&gt;1.1.1.1&lt;/P&gt;&lt;P&gt;2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network bing.com&lt;/P&gt;&lt;P&gt;network host 1.1.1.1&lt;/P&gt;&lt;P&gt;network host 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE permit ip any object-group bing.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's the only way that I know you'd be able to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall will translate addresses from the CLI, but it won't do it for your hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 15:56:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717351#M534486</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2011-08-01T15:56:23Z</dc:date>
    </item>
    <item>
      <title>Access-list - Hostname as source</title>
      <link>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717352#M534487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi John,&lt;/P&gt;&lt;P&gt;thank you so much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 16:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list-hostname-as-source/m-p/1717352#M534487</guid>
      <dc:creator>Tauer Drumond</dc:creator>
      <dc:date>2011-08-01T16:12:27Z</dc:date>
    </item>
  </channel>
</rss>

