<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Object-group entry in ACL breaks IOS firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430542#M665085</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hust ran into a similar situation, not involving a group of ports, but a&lt;/P&gt;&lt;P&gt;range of networks-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network A&lt;/P&gt;&lt;P&gt;host 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network B&lt;/P&gt;&lt;P&gt;range 192.168.0.0 192.168.4.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended firewall&lt;/P&gt;&lt;P&gt;permit tcp object-group B object-group A eq smtp&lt;/P&gt;&lt;P&gt;deny any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Testing reveled that any IP could now connect to my mail server.&lt;/P&gt;&lt;P&gt;Pulling the permit line blocked traffic, so I thought maybe the&lt;/P&gt;&lt;P&gt;range was not proper/working and replaced it with-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network B&lt;/P&gt;&lt;P&gt;192.168.0.0 /24&lt;/P&gt;&lt;P&gt;192.168.1.0 /24&lt;/P&gt;&lt;P&gt;192.168.2.0 /24&lt;/P&gt;&lt;P&gt;192.168.3.0 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I re-added the rule to the access-list and found that once again any IP&lt;/P&gt;&lt;P&gt;could connect to my email server.&amp;nbsp; So now I do not use object-groups&lt;/P&gt;&lt;P&gt;to define the source.&amp;nbsp; Rules with object-groups as the target all worked,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is on a ISR 2851 running 12.4.(24)T4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 May 2011 16:04:20 GMT</pubDate>
    <dc:creator>mdeloach</dc:creator>
    <dc:date>2011-05-19T16:04:20Z</dc:date>
    <item>
      <title>Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430535#M664867</link>
      <description>&lt;P&gt;My goal is to be able to edit firewall exceptions "on the fly" and without having to hack an ACL. I have created a service object-group that contains exceptions to the firewall, however when I apply this object-group to the firewall ACL, it opens up the ACL entirely!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I doing wrong with this configuration? Thanks very much for any insight you can provide!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco 871 running c870-advsecurityk9-mz.124-22.T.bin. Here are the configs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended FIREWALL&lt;BR /&gt;permit object-group FIREWALL-EXCEPTIONS any any log&lt;BR /&gt;permit udp any eq bootps any eq bootpc&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service FIREWALL-EXCEPTIONS&lt;/P&gt;&lt;P&gt;description &amp;lt;&amp;lt;&amp;lt; specific ports allowed through the firewall &amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;tcp eq 443&lt;BR /&gt;tcp eq 25&lt;/P&gt;&lt;P&gt;tcp eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;BR /&gt; ip dhcp client client-id FastEthernet4&lt;BR /&gt; ip address dhcp&lt;BR /&gt; ip access-group FIREWALL in&lt;BR /&gt; ip access-group WAN-EGRESS-FILTER out&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip accounting output-packets&lt;BR /&gt; ip accounting access-violations&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip inspect INSPECT-FIREWALL out&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; no cdp enable&lt;BR /&gt; arp timeout 600&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430535#M664867</guid>
      <dc:creator>s1rm</dc:creator>
      <dc:date>2019-03-11T18:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430536#M664877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;ip access-list extended FIREWALL&lt;BR /&gt;permit object-group FIREWALL-EXCEPTIONS any any log&lt;BR /&gt;permit udp any eq bootps any eq bootpc&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; ip any any&lt;/EM&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group service FIREWALL-EXCEPTIONS&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;description &amp;lt;&amp;lt;&amp;lt; specific ports allowed through the firewall &amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;tcp eq 443&lt;BR /&gt;tcp eq 25&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tcp eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have only used object-groups on firewalls so i may be wrong but assuming these ports are ports you want to allow inbound from the outside of your router your acl doesn't look right. Shouldn't it be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any any object-group FIREWALL EXCEPTIONS log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 09:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430536#M664877</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-08-06T09:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430537#M664901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're right Jon. The ACL &lt;EM&gt;should&lt;/EM&gt; actually read "permit tcp any any object-group FIREWALL-EXCEPTIONS" but the device won't take the command when it's structured like that! It's really throwing me off!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe I've encountered a bug in the IOS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the output when I attempt to issue that ACL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;871-Firewall(config-ext-nacl)#5 permit tcp any any ?&lt;BR /&gt;&amp;nbsp; ack&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the ACK bit&lt;BR /&gt;&amp;nbsp; eq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets on a given port number&lt;BR /&gt;&amp;nbsp; established&amp;nbsp; Match established connections&lt;BR /&gt;&amp;nbsp; fin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the FIN bit&lt;BR /&gt;&amp;nbsp; fragments&amp;nbsp;&amp;nbsp;&amp;nbsp; Check non-initial fragments&lt;BR /&gt;&amp;nbsp; gt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets with a greater port number&lt;BR /&gt;&amp;nbsp; log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log matches against this entry&lt;BR /&gt;&amp;nbsp; log-input&amp;nbsp;&amp;nbsp;&amp;nbsp; Log matches against this entry, including input interface&lt;BR /&gt;&amp;nbsp; lt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets with a lower port number&lt;BR /&gt;&amp;nbsp; match-all&amp;nbsp;&amp;nbsp;&amp;nbsp; Match if all specified flags are present&lt;BR /&gt;&amp;nbsp; match-any&amp;nbsp;&amp;nbsp;&amp;nbsp; Match if any specified flag is present&lt;BR /&gt;&amp;nbsp; neq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets not on a given port number&lt;BR /&gt;&amp;nbsp; option&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match packets with given IP Options value&lt;BR /&gt;&amp;nbsp; precedence&amp;nbsp;&amp;nbsp; Match packets with given precedence value&lt;BR /&gt;&amp;nbsp; psh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the PSH bit&lt;BR /&gt;&amp;nbsp; range&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets in the range of port numbers&lt;BR /&gt;&amp;nbsp; reflect&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create reflexive access list entry&lt;BR /&gt;&amp;nbsp; rst&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the RST bit&lt;BR /&gt;&amp;nbsp; syn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the SYN bit&lt;BR /&gt;&amp;nbsp; time-range&amp;nbsp;&amp;nbsp; Specify a time-range&lt;BR /&gt;&amp;nbsp; tos&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match packets with given TOS value&lt;BR /&gt;&amp;nbsp; ttl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match packets with given TTL value&lt;BR /&gt;&amp;nbsp; urg&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match on the URG bit&lt;BR /&gt;&amp;nbsp; &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 16:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430537#M664901</guid>
      <dc:creator>s1rm</dc:creator>
      <dc:date>2010-08-06T16:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430538#M664928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually i've just found a doc which shows how to use them and surprisingly your original syntax was correct. Why it can't be standard like other acl usage i don't know &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/confused.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is that acl allowing everything in ? What does the acl look like when you do a "sh ip access-list FIREWALL_EXCEPTIONS" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 16:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430538#M664928</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-08-06T16:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430539#M664961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Extended IP access list FIREWALL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 permit object-group FIREWALL-EXCEPTIONS any any log (62 matches)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 500 deny ip any any (3457 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service object group FIREWALL-EXCEPTIONS&lt;BR /&gt;&amp;nbsp; tcp eq 61259&lt;BR /&gt;&amp;nbsp; tcp eq 25222&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The object-group shows up in the FIREWALL ACL, but I think the ios is reading the entry as "permit ip any any" and disregarding the object-group TCP information altogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only external tool that I currently have access to is the "Shields Up" scanner at grc.com (not the most ideal test, but it works for my purposes!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I have the firewall ACL in place with NO object-group entry then the firewall blocks everything as it should (GRC returns "Stealth" for every port).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I place the object-group entry into the ACL (as shown above) GRC returns that all scanned ports are "Closed" and it also sees the ASA 5505 that I have in testing behind the router is running Web VPN (port 443 shows "Open"). In addition to all that, the ACL that blocks input into the VTY lines reports that it has blocked an attempt from the GRC scanning IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is driving me up the wall!&amp;nbsp; &lt;SPAN __jive_emoticon_name="angry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/angry.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; The ACL syntax is correct. The only two explanations I can think of are 1) IOS bug or 2) The device was reporting "&lt;SPAN class="content"&gt;&lt;PRE&gt;%ALIGN-3-SPURIOUS: Spurious memory access made at..." &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;errors earlier in the week. &lt;BR /&gt;&lt;BR /&gt;Maybe I need to reload and/or upgrade the IOS?&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 17:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430539#M664961</guid>
      <dc:creator>s1rm</dc:creator>
      <dc:date>2010-08-06T17:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430540#M664995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are seeing the same behavior in c2821 routers.&amp;nbsp; Did you receive a reolution tothis problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit TCP object group * works&lt;/P&gt;&lt;P&gt;permit UDP object-group * works&lt;/P&gt;&lt;P&gt;permit IP object group * does not work&lt;/P&gt;&lt;P&gt;permit object-group * any any does not work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 16:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430540#M664995</guid>
      <dc:creator>bwilloughby</dc:creator>
      <dc:date>2010-11-02T16:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430541#M665030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. I have not yet found a way to make this work. If you find a resolution please let us know!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Nov 2010 17:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430541#M665030</guid>
      <dc:creator>s1rm</dc:creator>
      <dc:date>2010-11-02T17:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430542#M665085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I hust ran into a similar situation, not involving a group of ports, but a&lt;/P&gt;&lt;P&gt;range of networks-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network A&lt;/P&gt;&lt;P&gt;host 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network B&lt;/P&gt;&lt;P&gt;range 192.168.0.0 192.168.4.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended firewall&lt;/P&gt;&lt;P&gt;permit tcp object-group B object-group A eq smtp&lt;/P&gt;&lt;P&gt;deny any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Testing reveled that any IP could now connect to my mail server.&lt;/P&gt;&lt;P&gt;Pulling the permit line blocked traffic, so I thought maybe the&lt;/P&gt;&lt;P&gt;range was not proper/working and replaced it with-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network B&lt;/P&gt;&lt;P&gt;192.168.0.0 /24&lt;/P&gt;&lt;P&gt;192.168.1.0 /24&lt;/P&gt;&lt;P&gt;192.168.2.0 /24&lt;/P&gt;&lt;P&gt;192.168.3.0 /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I re-added the rule to the access-list and found that once again any IP&lt;/P&gt;&lt;P&gt;could connect to my email server.&amp;nbsp; So now I do not use object-groups&lt;/P&gt;&lt;P&gt;to define the source.&amp;nbsp; Rules with object-groups as the target all worked,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is on a ISR 2851 running 12.4.(24)T4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2011 16:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/1430542#M665085</guid>
      <dc:creator>mdeloach</dc:creator>
      <dc:date>2011-05-19T16:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Object-group entry in ACL breaks IOS firewall</title>
      <link>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/4135937#M1072993</link>
      <description>&lt;P&gt;10-years later, on Traditional IOS, on Cisco IE4000/Rockwell Stratix 5400, I observe the same problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; If an access list references a group-object / object-group of any class: source address, destination address, or service&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; It doesn’t seem to matter if the reference object group is nested or not-nested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; An IP ACL, with any single line, referencing any single object-group, immediately causes the rule processing to stop and all traffic is then permitted (completely ignoring the explicit default deny at end of rule)&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2020 12:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-group-entry-in-acl-breaks-ios-firewall/m-p/4135937#M1072993</guid>
      <dc:creator>BrianSekleckiGE</dc:creator>
      <dc:date>2020-08-14T12:07:00Z</dc:date>
    </item>
  </channel>
</rss>

