<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776616#M55996</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marcabal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below please find the draft config of ASA to be implemented on 5540. According to the tech notes, all traffic should be inspected by IPS. Please comment on the config and optimal it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----- config of ASA 5540 ----&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips promiscuous fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list untrust_ACL_in extend permit tcp any host 192.168.1.8 443&lt;/P&gt;&lt;P&gt;access-list untrust_ACL_in extend permit tcp any host 192.168.1.8 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any https&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any smtp&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any pop3&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 any http&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 any https&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 http any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 https any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp host 192.168.1.8 https any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp host 192.168.1.8 http any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list DMZ2_ACL_in extend permit ip 192.168.192.0 0.0.32.255 192.168.128.0 0.0.0.255&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;rdgs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anita &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 22 Oct 2011 08:43:28 GMT</pubDate>
    <dc:creator>anitachoi3</dc:creator>
    <dc:date>2011-10-22T08:43:28Z</dc:date>
    <item>
      <title>ACL on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776614#M55994</link>
      <description>&lt;P&gt;Hi Expert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are two configurations to be implemented on ASA with IPS module. For config B, the traffic should go through IPS, but config A does not. Is it correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=== Configuration A ====&lt;/P&gt;&lt;P&gt;object network host-192.168.0.94 &lt;/P&gt;&lt;P&gt; host 192.168.0.94&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network nw-192.168.16.0 &lt;/P&gt;&lt;P&gt; subnet 192.168.16.0 255.255.252.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_ACL_in extended permit ip object host-192.168.0.94 object nw-192.168.16.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;===== Configuration B =======&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network host-192.168.0.94 &lt;/P&gt;&lt;P&gt; host 192.168.0.94&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network nw-192.168.16.0 &lt;/P&gt;&lt;P&gt; subnet 192.168.16.0 255.255.252.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_host_192.168.0.94&lt;/P&gt;&lt;P&gt;network-object object host-192.168.0.94 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_nw_192.168.16.0&lt;/P&gt;&lt;P&gt;network-object object nw-192.168.16.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_ACL_in extended permit ip object-group DM_INLINE_host_192.168.0.94 object-group DM_INLINE_nw_192.168.16.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rdgs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anita&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776614#M55994</guid>
      <dc:creator>anitachoi3</dc:creator>
      <dc:date>2019-03-10T12:31:29Z</dc:date>
    </item>
    <item>
      <title>ACL on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776615#M55995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Neither of these configurations on their own will send packets to the IPS module for analysis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration must include a policy where a class of traffic is directed for to the IPS module for monitoring using either the "ips inline ..."&amp;nbsp; or "ips promiscous ..."&amp;nbsp; commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a config example written for an earlier ASA version, that will demonstrate how to create the policy.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807335ca.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807335ca.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Oct 2011 18:17:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776615#M55995</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2011-10-21T18:17:06Z</dc:date>
    </item>
    <item>
      <title>ACL on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776616#M55996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marcabal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below please find the draft config of ASA to be implemented on 5540. According to the tech notes, all traffic should be inspected by IPS. Please comment on the config and optimal it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----- config of ASA 5540 ----&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips promiscuous fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list untrust_ACL_in extend permit tcp any host 192.168.1.8 443&lt;/P&gt;&lt;P&gt;access-list untrust_ACL_in extend permit tcp any host 192.168.1.8 80&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any https&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any smtp&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any pop3&lt;/P&gt;&lt;P&gt;access-list trust_ACL_in extend permit tcp 192.168.128.0 0.0.0.255 any http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 any http&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 any https&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 http any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp 172.16.1.0 0.0.0.7 https any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp host 192.168.1.8 https any&lt;/P&gt;&lt;P&gt;access-list DMZ1_ACL_in extend permit tcp host 192.168.1.8 http any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list DMZ2_ACL_in extend permit ip 192.168.192.0 0.0.32.255 192.168.128.0 0.0.0.255&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;rdgs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anita &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Oct 2011 08:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-on-asa/m-p/1776616#M55996</guid>
      <dc:creator>anitachoi3</dc:creator>
      <dc:date>2011-10-22T08:43:28Z</dc:date>
    </item>
  </channel>
</rss>

