<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Extended Access-List Question??? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434890#M759131</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;iketurner931 wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ok. So then you are saying that. I can have Access-List Extended 101,102 103 ETC but, I can only have one of them apply to the interface and the others would be only used to define interesting (permit/deny) or some other function that does not require the ACL to be applied to the interface. Oh Yeah thanks for the information about changing the name of the ACL then changing the properties of the ACL and then appling the copy. That is soo sweet. Never even thought of it. Soooo Simple.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can apply 2 acls to each ASA interface, one in the inbound direction and one in the outbound direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 May 2010 14:57:35 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2010-05-09T14:57:35Z</dc:date>
    <item>
      <title>Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434887#M759128</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hello Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am working with extended ACL's with the Cisco ASA. I know that it is true that a person can only put one ACL in each direction on an interface with a Cisco router but, I want to know if that if this is true with a ASA device?&amp;nbsp; It seems like when ever I attach a different ACL on the same interface in the same direction it removes the previous attached access-group from the interface. I hope I do not have to have one access-list applied with all my rules in it. That could be dangerous if I ever have to remove an entry from the access-list and remove the of entire ACL entry by mistake.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434887#M759128</guid>
      <dc:creator>Charlie Mayes</dc:creator>
      <dc:date>2019-03-11T17:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434888#M759129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is exactly how it works.&amp;nbsp; One ACL to each interface.&amp;nbsp; Only exception is that you can apply a second Ethertype ACL (which can permit special protocols, i.e. BPDU, etc.).&amp;nbsp; If you are doing by hand, then probably best to copy original access-list and access-group, and change the acl name, before changing, so you can quickly revert back to previous.&amp;nbsp; that way you would have new and old rule easy to switch with.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 12:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434888#M759129</guid>
      <dc:creator>matt.walls</dc:creator>
      <dc:date>2010-05-09T12:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434889#M759130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ok. So then you are saying that. I can have Access-List Extended 101,102 103 ETC but, I can only have one of them apply to the interface and the others would be only used to define interesting (permit/deny) or some other function that does not require the ACL to be applied to the interface. Oh Yeah thanks for the information about changing the name of the ACL then changing the properties of the ACL and then appling the copy. That is soo sweet. Never even thought of it. Soooo Simple.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 13:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434889#M759130</guid>
      <dc:creator>Charlie Mayes</dc:creator>
      <dc:date>2010-05-09T13:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434890#M759131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;iketurner931 wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ok. So then you are saying that. I can have Access-List Extended 101,102 103 ETC but, I can only have one of them apply to the interface and the others would be only used to define interesting (permit/deny) or some other function that does not require the ACL to be applied to the interface. Oh Yeah thanks for the information about changing the name of the ACL then changing the properties of the ACL and then appling the copy. That is soo sweet. Never even thought of it. Soooo Simple.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can apply 2 acls to each ASA interface, one in the inbound direction and one in the outbound direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 14:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434890#M759131</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-05-09T14:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434891#M759132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks for everything Matt. I just wanted to make sure I was doing&lt;/P&gt;&lt;P&gt; everything right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 15:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434891#M759132</guid>
      <dc:creator>Charlie Mayes</dc:creator>
      <dc:date>2010-05-09T15:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Extended Access-List Question???</title>
      <link>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434892#M759133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks for everything Jon. I just wanted to make sure I was doing everything right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 May 2010 15:38:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-extended-access-list-question/m-p/1434892#M759133</guid>
      <dc:creator>Charlie Mayes</dc:creator>
      <dc:date>2010-05-09T15:38:13Z</dc:date>
    </item>
  </channel>
</rss>

