<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACL applied to Interface Config on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800219#M7057</link>
    <description>&lt;P&gt;Hi, can you provide a screenshot or the configuration to provide some context?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACLs can have multiple uses on the ASA, e.g. VPN filtering, route filtering and distribution, identify traffic for MPF etc. Reference &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/access-acls.html" target="_self"&gt;here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Tue, 12 Feb 2019 16:04:45 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-02-12T16:04:45Z</dc:date>
    <item>
      <title>ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800212#M7056</link>
      <description>&lt;P&gt;I have an ACL that shows in Details window when looking at IPSEC connection on ASA, however from CLI I don't see the ACL applied to an interface via Crypto Map. Are there other ways to apply ACL on ASA interface?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800212#M7056</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T16:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800219#M7057</link>
      <description>&lt;P&gt;Hi, can you provide a screenshot or the configuration to provide some context?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACLs can have multiple uses on the ASA, e.g. VPN filtering, route filtering and distribution, identify traffic for MPF etc. Reference &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/access-acls.html" target="_self"&gt;here.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 16:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800219#M7057</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-02-12T16:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800237#M7058</link>
      <description>Ok yes this is for VPN Filtering.</description>
      <pubDate>Tue, 12 Feb 2019 16:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800237#M7058</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-02-12T16:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800244#M7059</link>
      <description>&lt;P&gt;CiscoBlueBelt,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is not quite clear what you are expecting to see. If you have a crypto map applied to an interface, it will not have a crypto ACL applied to the interface as well. Crypto map ACL defines traffic to be encrypted, not the traffic to be permitted or denied. And by default on the ASA any VPN traffic is trusted and therefore allowed. If you want to specifically block some of the traffic that comes in a VPN, you would have to disable the "sysopt permit vpn" option and then apply a separate ACL to block and allow traffic that you require on the VPN interface in the inbound direction.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 16:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800244#M7059</guid>
      <dc:creator>Sergey Lisitsin</dc:creator>
      <dc:date>2019-02-12T16:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800267#M7060</link>
      <description>&lt;P&gt;I was expecting an ACL for VPN traffic to be applied to an interface via crypto map.&lt;/P&gt;
&lt;P&gt;Basically, if you have an ACL for a IPSEC tunnel, how do you apply it aside from applying it via crypto map to an interface such as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0); text-decoration: underline;"&gt;&lt;STRONG&gt;ASA1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA1(config)# tunnel-group 10.10.10.2 type ipsec-l2l&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config)# tunnel-group 10.10.10.2 ipsec-attributes&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config-tunnel-ipsec)# ikev2 local-authentication pre-shared-key 32fjsk0392fg&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config-tunnel-ipsec)# ikev2 remote-authentication pre-shared-key 32fjsk0392fg&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(255, 0, 0); text-decoration: underline;"&gt;&lt;STRONG&gt;ASA1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA1(config)# crypto map cmap 1 match address ACL1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config)# crypto map cmap 1 set peer 10.10.10.2&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config)# crypto map cmap 1 set ikev2 ipsec-proposal P1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA1(config)# crypto map cmap interface outside&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 16:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800267#M7060</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-02-12T16:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800290#M7061</link>
      <description>&lt;P&gt;to apply a normal ACL to an interface you would apply something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to apply and ACL forr interesting traffic on an IPSEC tunnel for example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map outside_map 3 match address I&lt;STRONG&gt;nternet_cryptomap_whateve&lt;/STRONG&gt;r&lt;BR /&gt;crypto map outside_map 3 set pfs &lt;BR /&gt;crypto map outside_map 3 set peer 115.1.1.1.1&amp;nbsp;&lt;BR /&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 17:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800290#M7061</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-02-12T17:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800291#M7062</link>
      <description>&lt;P&gt;CiscoBlueBelt,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But why would you need to apply it to an interface?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 17:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800291#M7062</guid>
      <dc:creator>Sergey Lisitsin</dc:creator>
      <dc:date>2019-02-12T17:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: ACL applied to Interface Config on ASA</title>
      <link>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800346#M7063</link>
      <description>&lt;P&gt;Awesome!&lt;/P&gt;
&lt;P&gt;Which command specifies which interface the tunnel traffic should use? Sorry I am having hard time finding good docs that explain how to configure this.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 18:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-applied-to-interface-config-on-asa/m-p/3800346#M7063</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-02-12T18:16:59Z</dc:date>
    </item>
  </channel>
</rss>

