<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Understanding network object-group in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599381#M595609</link>
    <description>&lt;P&gt;Per my understanding you define a network object group and&amp;nbsp; then you can issue a single command using the group name to apply to every item in the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network NETWORK&lt;BR /&gt; network-object 10.40.0.0 255.254.0.0&lt;BR /&gt; network-object 10.41.0.0 255.254.0.0&lt;BR /&gt; network-object 10.42.0.0 255.254.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can support &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d;"&gt;393210 Hosts (total) with the above configuration. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am not sure is:&lt;/P&gt;&lt;P&gt;- If 10.40, .41 and .42 available at the same time?&lt;/P&gt;&lt;P&gt;- Can 1 host get 10.&lt;STRONG&gt;40&lt;/STRONG&gt;.10.1 and the other host get 10.&lt;STRONG&gt;41&lt;/STRONG&gt;.10.1 address?&lt;/P&gt;&lt;P&gt;- Or, all the hosts (roughly 131070) are first given address from 10.40.xx.xx space and additional hosts will be given 10.41.xx.xx etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to configuring ASAs. We have 2 ASAs configured in Active/Active failover scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-NG&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:29:25 GMT</pubDate>
    <dc:creator>gnaveen</dc:creator>
    <dc:date>2019-03-11T19:29:25Z</dc:date>
    <item>
      <title>Understanding network object-group</title>
      <link>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599381#M595609</link>
      <description>&lt;P&gt;Per my understanding you define a network object group and&amp;nbsp; then you can issue a single command using the group name to apply to every item in the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network NETWORK&lt;BR /&gt; network-object 10.40.0.0 255.254.0.0&lt;BR /&gt; network-object 10.41.0.0 255.254.0.0&lt;BR /&gt; network-object 10.42.0.0 255.254.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can support &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN style="font-size: 11pt; font-family: &amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color: #1f497d;"&gt;393210 Hosts (total) with the above configuration. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am not sure is:&lt;/P&gt;&lt;P&gt;- If 10.40, .41 and .42 available at the same time?&lt;/P&gt;&lt;P&gt;- Can 1 host get 10.&lt;STRONG&gt;40&lt;/STRONG&gt;.10.1 and the other host get 10.&lt;STRONG&gt;41&lt;/STRONG&gt;.10.1 address?&lt;/P&gt;&lt;P&gt;- Or, all the hosts (roughly 131070) are first given address from 10.40.xx.xx space and additional hosts will be given 10.41.xx.xx etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to configuring ASAs. We have 2 ASAs configured in Active/Active failover scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-NG&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599381#M595609</guid>
      <dc:creator>gnaveen</dc:creator>
      <dc:date>2019-03-11T19:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding network object-group</title>
      <link>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599382#M595610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where are you using this object-group in your configuration?&lt;/P&gt;&lt;P&gt;When configuring ACL, when configuration NAT, when configuring MPF?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an access-list like this&lt;/P&gt;&lt;P&gt;access-list inside-acl permit tcp object-group Network any eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow every single host in that object-group (all three networks) to go any where destined to port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can see nice example here: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800d641d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 21:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599382#M595610</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-31T21:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding network object-group</title>
      <link>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599383#M595612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;!&lt;BR /&gt;object-group network A_inside&lt;BR /&gt; network-object 10.38.1.0 255.255.255.0&lt;BR /&gt;object-group network NETWORK&lt;BR /&gt; network-object 10.40.0.0 255.254.0.0&lt;BR /&gt; network-object 10.41.0.0 255.254.0.0&lt;BR /&gt; network-object 10.42.0.0 255.254.0.0&lt;BR /&gt;!&lt;BR /&gt;access-list VPN extended permit ip object-group A_inside object-group NETWORK &lt;BR /&gt;access-list VPN extended permit ip host 172.25.40.xxx object-group NETWORK &lt;BR /&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 02:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599383#M595612</guid>
      <dc:creator>gnaveen</dc:creator>
      <dc:date>2011-01-01T02:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding network object-group</title>
      <link>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599384#M595613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume the above ACL "VPN" is used as a crypto ACL for a VPN tunnel. In this case, all hosts in the 10.38.1.0/24 network and the host 172.25.40.xxx will be able to reach all the hosts in the 3 networks in object-group NETWORK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 13:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/understanding-network-object-group/m-p/1599384#M595613</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-01-01T13:33:34Z</dc:date>
    </item>
  </channel>
</rss>

