<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Definingaccess for several groups in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611646#M595386</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can certainly add more ip addresses or subnets to the existing object group that you have defined.&lt;/P&gt;&lt;P&gt;You can also create different object group to define different ip addresses/subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to block access to certain ip addresses, and allow access for everything else, then you would need to configure the more restrictive rule above the permit any rule as access-list is inspected from top to bottom and it will stop at first match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Jan 2011 11:34:04 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-04T11:34:04Z</dc:date>
    <item>
      <title>Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611645#M595381</link>
      <description>&lt;P&gt;We have ISA Server which is setup to restrict particular domain groups controlled access, three groups in all (basic-minimum, intermediate-normal and advanced-maximum&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to replicate this setup on our ASA5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E.g. We have an Object group setup (full internet) with assigned (these are various computers/IP's) and then this group allocated to our inside rule with Permit/Any/IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we were to add all network objects and assign to various groups, could we add more rules to that group to detail any restricted sites/IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611645#M595381</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2019-03-11T19:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611646#M595386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can certainly add more ip addresses or subnets to the existing object group that you have defined.&lt;/P&gt;&lt;P&gt;You can also create different object group to define different ip addresses/subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to block access to certain ip addresses, and allow access for everything else, then you would need to configure the more restrictive rule above the permit any rule as access-list is inspected from top to bottom and it will stop at first match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 11:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611646#M595386</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-04T11:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611647#M595390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought you were going to say that, rules work from top down until they meet a match to restrict. What I wanted to do is have a group with the rules defined, rather than creating lots of rules one by one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 11:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611647#M595390</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-01-04T11:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611648#M595391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark,&lt;/P&gt;&lt;P&gt;The object group themselves are not rules. May be you can create an object group for all the denies and call that object group in an acl with a deny before adding the permit acl with the object group that has all the hosts and network that you have to permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example&lt;/P&gt;&lt;P&gt;object-group network deny-net&lt;BR /&gt; network-object 10.10.10.0 255.255.255.0&lt;BR /&gt;object-group network permit-net&lt;BR /&gt; network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl deny ip object-group deny-net any&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp object-group permit-net any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 15:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611648#M595391</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-04T15:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611649#M595396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To top KS's comment, you can also group all the services together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From KS's example, if you would like to deny SMTP and HTTP only from "deny-net" object-group, then you can define the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service deny-service tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-object eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-acl deny tcp object-group deny-net any object-group deny-service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the command reference for object-group (it also contains examples for your reference):&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/no.html#wp1750094"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/no.html#wp1750094&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 22:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611649#M595396</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-04T22:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: Definingaccess for several groups</title>
      <link>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611650#M595399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;KS, I didn't mean to suggest the groups are rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at this again it's looking like it could be a big task, if achievable at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In simple terms I'd want three groups, each with slightly different access permissions to the Internet (wouldn't each object need adding and we don't use static IP for workstations).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jan 2011 09:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/definingaccess-for-several-groups/m-p/1611650#M595399</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-01-05T09:17:02Z</dc:date>
    </item>
  </channel>
</rss>

