<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: acl sequence in asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588079#M576640</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;need the following output:&lt;/P&gt;&lt;P&gt;1. sh run nst&lt;/P&gt;&lt;P&gt;2. sh route&lt;/P&gt;&lt;P&gt;3. sh run access-g&lt;/P&gt;&lt;P&gt;4. sh access-l &lt;NAME of="" acl="" applied="" on="" the="" inside=""&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;5. packet-tracer input inside tcp 172.16.100.50 1026 10.52.0.18 &lt;PORT&gt; - replace &lt;PORT&gt; with the port number that the host 10.52.0.18 listens on.&lt;/PORT&gt;&lt;/PORT&gt;&lt;/P&gt;&lt;P&gt;6. enable debug level logging and post that as well&lt;/P&gt;&lt;P&gt; conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i 172.16.100.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 30 Dec 2010 03:35:54 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-12-30T03:35:54Z</dc:date>
    <item>
      <title>acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588073#M576629</link>
      <description>&lt;P&gt;What is the process sequence in an asa with ipsec configuration , for traffic initiated from inside &amp;amp; from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Remote Host -&amp;gt;&amp;nbsp; Router -&amp;gt; Internet -&amp;gt; Asa -&amp;gt;Local Host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote router has crypto acl , Asa has crypto acl and interface acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If local host starts traffic via Asa , will it first use the inside interface acl on ASA or crypto acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate if this can be helped with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588073#M576629</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T19:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588074#M576631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inside interface acl, nat 0 acl on the ASA and then the cypto acl on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 15:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588074#M576631</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-29T15:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588075#M576633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside acl will always be the first ACL to be hit. To confirm you can use the packet-tracer command, this will tell you exactly which process comes into effect and when:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/p.html#wp1878788"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/p.html#wp1878788&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following image should give you an idea of the exact sequence of operations:&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/2/8/9828-order%20of%20opertations.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;The crypto ACL will be hit immediately before phase 8(Egress Interface).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Atri.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 15:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588075#M576633</guid>
      <dc:creator>Atri Basu</dc:creator>
      <dc:date>2010-12-29T15:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588076#M576635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if inside acl is called in first, then a strange problem in this remote setup is the packet gets dropped due to implicit deny on inside interface list . this comes up during tracer. inspite of the acl having a defined line for the traffic that is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below is the list on local interface. Line 2 is meant for traffic which is from host 172.16.100.50 to 10.52.151.81 on a tcp port.&lt;/P&gt;&lt;P&gt;asp capture shows this drop also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list local-access line 1 extended permit ip 192.168.100.0 255.255.255.240 any (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list local-access line 2 extended permit ip host 172.16.100.50 10.52.0.0 255.255.255.224 (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any valuable suggestions for it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 16:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588076#M576635</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-12-29T16:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588077#M576637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE&gt;access-list local-access line 2 extended permit ip host 172.16.100.50 10.52.0.0 255.255.255.224&lt;BR /&gt;&lt;BR /&gt;10.52.151.81 is not covered in 10.52.0.0 255.255.255.224&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.subnet-calculator.com/" target="_blank"&gt;http://www.subnet-calculator.com/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;-KS&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 17:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588077#M576637</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-29T17:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588078#M576639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry . it was written wrongly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl is meant for source 172.16.100.50 to destination 10.52.0.18 on a tcp port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list local-access line 1 extended permit ip 192.168.100.0 255.255.255.240 any (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list local-access line 2 extended permit ip host 172.16.100.50 10.52.0.0 255.255.255.224 (hitcnt=0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it shows as dropped even if the rule is there. and running logs dont show anything except for capture which says reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 02:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588078#M576639</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-12-30T02:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588079#M576640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;need the following output:&lt;/P&gt;&lt;P&gt;1. sh run nst&lt;/P&gt;&lt;P&gt;2. sh route&lt;/P&gt;&lt;P&gt;3. sh run access-g&lt;/P&gt;&lt;P&gt;4. sh access-l &lt;NAME of="" acl="" applied="" on="" the="" inside=""&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;5. packet-tracer input inside tcp 172.16.100.50 1026 10.52.0.18 &lt;PORT&gt; - replace &lt;PORT&gt; with the port number that the host 10.52.0.18 listens on.&lt;/PORT&gt;&lt;/PORT&gt;&lt;/P&gt;&lt;P&gt;6. enable debug level logging and post that as well&lt;/P&gt;&lt;P&gt; conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i 172.16.100.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 03:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588079#M576640</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-30T03:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: acl sequence in asa</title>
      <link>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588080#M576641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks KS &amp;amp; all, this was resolved.&lt;/P&gt;&lt;P&gt;It was found to be an ip addressing problem with server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 06:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-sequence-in-asa/m-p/1588080#M576641</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-12-31T06:21:14Z</dc:date>
    </item>
  </channel>
</rss>

