<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Access-list question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149862#M607214</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command is:&lt;/P&gt;&lt;P&gt;access-list test permit tcp 192.168.1.50 (subnet mask) host 10.10.10.1 eq 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Apr 2003 19:17:45 GMT</pubDate>
    <dc:creator>apriore685</dc:creator>
    <dc:date>2003-04-09T19:17:45Z</dc:date>
    <item>
      <title>PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149861#M607213</link>
      <description>&lt;P&gt;The following access-list works on a cisco router, however, the list will not work on the PIX (I change the wildcard mask to a subnet mask for the PIX).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router (works)&lt;/P&gt;&lt;P&gt;access-list test permit tcp 192.168.1.50 0.0.0.5 host 10.10.10.1 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX  (does not work)&lt;/P&gt;&lt;P&gt;access-list test permit tcp 192.168.1.50 0.0.0.10 host 10.10.10.1 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I receive the following error message on the PIX:&lt;/P&gt;&lt;P&gt;ERROR: Source address,mask &amp;lt;192.168.1.50, 0.0.0.10&amp;gt; doesn't pair&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to group IP addresses together on the PIX in a similar fashion as Cisco IOS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks You!&lt;/P&gt;&lt;P&gt;Domo Arigato!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149861#M607213</guid>
      <dc:creator>davelockerby</dc:creator>
      <dc:date>2020-02-21T06:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149862#M607214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command is:&lt;/P&gt;&lt;P&gt;access-list test permit tcp 192.168.1.50 (subnet mask) host 10.10.10.1 eq 80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2003 19:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149862#M607214</guid>
      <dc:creator>apriore685</dc:creator>
      <dc:date>2003-04-09T19:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149863#M607215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Goal is to create single access-list statement that covers several hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;Permit hosts 192.168.1.50 - 192.168.1.54 to access web server on host 10.10.10.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can a single access-list statment be created that permits all five of the above hosts port 80 access to the web server on host 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying to avoid entering an access-list statement for each host needing access to web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2003 11:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149863#M607215</guid>
      <dc:creator>davelockerby</dc:creator>
      <dc:date>2003-04-10T11:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149864#M607216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What pix os version are you running? Recent versions support an object group concept, where you can group associated things to do exactly what you seek.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2003 13:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149864#M607216</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2003-04-10T13:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149865#M607217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can only use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.48 255.255.255.248 for the source or if this are to many hosts you have to insert a separate entry for each source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course you can deny host 192.168.1.49  and &lt;/P&gt;&lt;P&gt;allow the others permit 192.168.1.48 255.255.255.248 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2003 13:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149865#M607217</guid>
      <dc:creator>andre.frost</dc:creator>
      <dc:date>2003-04-10T13:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149866#M607218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Version 6.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the input on object groups.  I'll do more research and see if object groups offer a viable solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2003 11:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149866#M607218</guid>
      <dc:creator>davelockerby</dc:creator>
      <dc:date>2003-04-16T11:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Access-list question</title>
      <link>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149867#M607219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX uses subnet masks, not wildcard masks, that's why you get the address, mask doesn't pair error...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2003 11:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-access-list-question/m-p/149867#M607219</guid>
      <dc:creator>2gcatron</dc:creator>
      <dc:date>2003-04-16T11:22:56Z</dc:date>
    </item>
  </channel>
</rss>

