<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: object groups in ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373551#M857385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appears you need to add the service object-group before the source object-group. I quickly tested it on a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, this link says it is possible.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl.html#wp1077475"&gt;http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl.html#wp1077475&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;Creating a Network Object Group: Example&lt;/H3&gt;&lt;A name="wp1057952"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create a network object group named my_network_object_group, which contains two hosts, a range of IP addresses, and a subnet as objects.&lt;/P&gt;&lt;A name="wp1100443"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1100444"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076292"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;SPAN class="cExBold"&gt;object-group network my_network_object_group&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076293"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;host 209.165.200.237&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076294"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;host 209.165.200.238&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1125132"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;range 209.165.200.239 209.165.200.240&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1088123"&gt;&lt;/A&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1088508"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="Creating_a_Service_Object_Group:_Example"&gt; &lt;/A&gt; &lt;A name="wp1077795"&gt;&lt;/A&gt;&lt;A name="wpxref33754"&gt;&lt;/A&gt;&lt;H3 class="p_H_Head2"&gt;Creating a Service Object Group: Example&lt;/H3&gt;&lt;A name="wp1077874"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create a service object group named my_service_object_group, which contains several ICMP, TCP, UDP, and TCP-UDP protocols and an existing object group (child) named sjc_eng_svcs as objects.&lt;/P&gt;&lt;A name="wp1100409"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1100410"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113481"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;object-group service my_service_object_group&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113530"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;icmp echo&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113531"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp smtp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113532"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp telnet&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113533"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp source range 1 65535 snmp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113534"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;udp domain&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113535"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp-udp range 2000 2005&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113536"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;group-object sjc_eng_svcs&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1113516"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="Creating_an_Object_Group-Based_ACL:_Example"&gt; &lt;/A&gt; &lt;A name="wp1113487"&gt;&lt;/A&gt;&lt;A name="wpxref30465"&gt;&lt;/A&gt;&lt;H3 class="p_H_Head2"&gt;Creating an Object Group-Based ACL: Example&lt;/H3&gt;&lt;A name="wp1108049"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create an object group-based ACL that permits packets from the users in my_network_object_group if the protocol ports match the ports specified in my_service_object_group.&lt;/P&gt;&lt;A name="wp1108050"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1108051"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079124"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;ip access-list extended my_ogacl_policy&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079125"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;permit tcp object-group my_network_object_group object-group my_service_object_group any&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079126"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;deny tcp any any&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079127"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;exit&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079128"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;exit&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN class="cBold"&gt;&lt;BR /&gt;&lt;STRONG&gt;Even if you copy and paste the example above it does not work. &lt;BR /&gt;I get the same error you got which is "Object group type mismatch. There is something wrong.&amp;nbsp; &lt;BR /&gt;I will check this out &lt;/STRONG&gt;for you.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Jan 2010 04:54:04 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-01-29T04:54:04Z</dc:date>
    <item>
      <title>object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373548#M857382</link>
      <description>&lt;P&gt;i use object groups for my cisco 1800 routers.&amp;nbsp; the egress acl has a line (shown below) that permits staff to initiate remote desktop (RDP) connections from their computers on the office network vlan1 to any other computer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit object-group rdp_ports object-group vlan1 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;staff also need to vpn in from home and use RDP to access their office computers from home.&amp;nbsp; however, they cannot.&amp;nbsp; i appended a line at the end of the egress acl to log everything and found this when i do a show log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; list egress denied tcp 172.16.253.126(3389) -&amp;gt; 10.253.10.2(55661)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this shows that i need to allow computers on vlan1 (172.16.253.0/24) with a source port of 3389 to go anywhere (10.253.10.0/24 is the vpn address of the home computer in this case).&amp;nbsp; i appended the following line to the acl and it worked and staff can remote in and do RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp object-group vlan1 eq 3389 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;question: how can i convert the line above to use object-group rdp_ports (shown below)?&amp;nbsp; i would like this include ports for both PCs and MACs and special RDP ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service rdp_ports&lt;BR /&gt; tcp 3389&lt;BR /&gt; tcp-udp 3283&lt;BR /&gt; tcp 5900&lt;BR /&gt; tcp 5988&lt;/P&gt;&lt;P&gt; tcp 3390&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373548#M857382</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2019-03-11T17:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373549#M857383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;tachyon05 wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i use object groups for my cisco 1800 routers.&amp;nbsp; the egress acl has a line (shown below) that permits staff to initiate remote desktop (RDP) connections from their computers on the office network vlan1 to any other computer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit object-group rdp_ports object-group vlan1 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;staff also need to vpn in from home and use RDP to access their office computers from home.&amp;nbsp; however, they cannot.&amp;nbsp; i appended a line at the end of the egress acl to log everything and found this when i do a show log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; list egress denied tcp 172.16.253.126(3389) -&amp;gt; 10.253.10.2(55661)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this shows that i need to allow computers on vlan1 (172.16.253.0/24) with a source port of 3389 to go anywhere (10.253.10.0/24 is the vpn address of the home computer in this case).&amp;nbsp; i appended the following line to the acl and it worked and staff can remote in and do RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; permit tcp object-group vlan1 eq 3389 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;question: how can i convert the line above to use object-group rdp_ports (shown below)?&amp;nbsp; i would like this include ports for both PCs and MACs and special RDP ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service rdp_ports&lt;BR /&gt; tcp 3389&lt;BR /&gt; tcp-udp 3283&lt;BR /&gt; tcp 5900&lt;BR /&gt; tcp 5988&lt;/P&gt;&lt;P&gt; tcp 3390&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp object-group vlan1 object-group rdp_ports any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jan 2010 00:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373549#M857383</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-01-29T00:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373550#M857384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;unfortunately, that does not work.&amp;nbsp; i get an error "object group type mismatch".&amp;nbsp; where you had the service object-group rdp_ports, it was expecting a network object-group - see below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Branch-Test(config)#&lt;SPAN style="color: #0000ff;"&gt;ip access-list extended egress&lt;/SPAN&gt;&lt;BR /&gt;Branch-Test(config-ext-nacl)#&lt;SPAN style="color: #0000ff;"&gt;permit&lt;/SPAN&gt; ?&lt;BR /&gt;&amp;nbsp; &amp;lt;0-255&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; An IP protocol number&lt;BR /&gt;&amp;nbsp; ahp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authentication Header Protocol&lt;BR /&gt;&amp;nbsp; eigrp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco's EIGRP routing protocol&lt;BR /&gt;&amp;nbsp; esp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encapsulation Security Payload&lt;BR /&gt;&amp;nbsp; gre&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco's GRE tunneling&lt;BR /&gt;&amp;nbsp; icmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internet Control Message Protocol&lt;BR /&gt;&amp;nbsp; ip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any Internet Protocol&lt;BR /&gt;&amp;nbsp; ipinip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP in IP tunneling&lt;BR /&gt;&amp;nbsp; nos&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KA9Q NOS compatible IP over IP tunneling&lt;BR /&gt;&amp;nbsp; object-group&amp;nbsp; Service object group&lt;BR /&gt;&amp;nbsp; pcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Payload Compression Protocol&lt;BR /&gt;&amp;nbsp; tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transmission Control Protocol&lt;BR /&gt;&amp;nbsp; udp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User Datagram Protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Branch-Test(config-ext-nacl)#&lt;SPAN style="color: #0000ff;"&gt;permit tcp&lt;/SPAN&gt; ?&lt;BR /&gt;&amp;nbsp; A.B.C.D&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source address&lt;BR /&gt;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any source host&lt;BR /&gt;&amp;nbsp; host&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A single source host&lt;BR /&gt;&amp;nbsp; object-group&amp;nbsp; Source network object group&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Branch-Test(config-ext-nacl)#&lt;SPAN style="color: #0000ff;"&gt;permit tcp object-group&lt;/SPAN&gt; ?&lt;BR /&gt;&amp;nbsp; WORD&amp;nbsp; Source network object group name&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Branch-Test(config-ext-nacl)#&lt;SPAN style="color: #0000ff;"&gt;permit tcp object-group vlan1&lt;/SPAN&gt; ?&lt;BR /&gt;&amp;nbsp; A.B.C.D&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination address&lt;BR /&gt;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Any destination host&lt;BR /&gt;&amp;nbsp; eq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets on a given port number&lt;BR /&gt;&amp;nbsp; gt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets with a greater port number&lt;BR /&gt;&amp;nbsp; host&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A single destination host&lt;BR /&gt;&amp;nbsp; lt&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets with a lower port number&lt;BR /&gt;&amp;nbsp; neq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets not on a given port number&lt;BR /&gt;&amp;nbsp; object-group&amp;nbsp; Destination network object group&lt;BR /&gt;&amp;nbsp; range&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match only packets in the range of port numbers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;Branch-Test(config-ext-nacl)#&lt;SPAN style="color: #0000ff;"&gt;permit tcp object-group vlan1 object-group&lt;/SPAN&gt; ?&lt;BR /&gt;&amp;nbsp; WORD&amp;nbsp; Destination network object group name&lt;/SPAN&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jan 2010 00:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373550#M857384</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2010-01-29T00:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373551#M857385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appears you need to add the service object-group before the source object-group. I quickly tested it on a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, this link says it is possible.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl.html#wp1077475"&gt;http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_object_group_acl.html#wp1077475&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;Creating a Network Object Group: Example&lt;/H3&gt;&lt;A name="wp1057952"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create a network object group named my_network_object_group, which contains two hosts, a range of IP addresses, and a subnet as objects.&lt;/P&gt;&lt;A name="wp1100443"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1100444"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076292"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;SPAN class="cExBold"&gt;object-group network my_network_object_group&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076293"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;host 209.165.200.237&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1076294"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;host 209.165.200.238&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1125132"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-network-group)# &lt;SPAN class="cExBold"&gt;range 209.165.200.239 209.165.200.240&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1088123"&gt;&lt;/A&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1088508"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="Creating_a_Service_Object_Group:_Example"&gt; &lt;/A&gt; &lt;A name="wp1077795"&gt;&lt;/A&gt;&lt;A name="wpxref33754"&gt;&lt;/A&gt;&lt;H3 class="p_H_Head2"&gt;Creating a Service Object Group: Example&lt;/H3&gt;&lt;A name="wp1077874"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create a service object group named my_service_object_group, which contains several ICMP, TCP, UDP, and TCP-UDP protocols and an existing object group (child) named sjc_eng_svcs as objects.&lt;/P&gt;&lt;A name="wp1100409"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1100410"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113481"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;object-group service my_service_object_group&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113530"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;icmp echo&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113531"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp smtp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113532"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp telnet&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113533"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp source range 1 65535 snmp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113534"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;udp domain&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113535"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;tcp-udp range 2000 2005&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1113536"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-service-group)# &lt;STRONG class="cBold"&gt;group-object sjc_eng_svcs&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pPreformatted"&gt;&lt;PRE class="pPreformatted"&gt;&lt;A name="wp1113516"&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="Creating_an_Object_Group-Based_ACL:_Example"&gt; &lt;/A&gt; &lt;A name="wp1113487"&gt;&lt;/A&gt;&lt;A name="wpxref30465"&gt;&lt;/A&gt;&lt;H3 class="p_H_Head2"&gt;Creating an Object Group-Based ACL: Example&lt;/H3&gt;&lt;A name="wp1108049"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The following example shows how to create an object group-based ACL that permits packets from the users in my_network_object_group if the protocol ports match the ports specified in my_service_object_group.&lt;/P&gt;&lt;A name="wp1108050"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router&amp;gt; &lt;STRONG class="cCN_CmdName"&gt;enable&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1108051"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router# &lt;STRONG class="cCN_CmdName"&gt;configure terminal&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079124"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;ip access-list extended my_ogacl_policy&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079125"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;permit tcp object-group my_network_object_group object-group my_service_object_group any&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079126"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;deny tcp any any&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079127"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config-ext-nacl)# &lt;STRONG class="cBold"&gt;exit&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;A name="wp1079128"&gt;&lt;/A&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;Router(config)# &lt;STRONG class="cBold"&gt;exit&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN class="cBold"&gt;&lt;BR /&gt;&lt;STRONG&gt;Even if you copy and paste the example above it does not work. &lt;BR /&gt;I get the same error you got which is "Object group type mismatch. There is something wrong.&amp;nbsp; &lt;BR /&gt;I will check this out &lt;/STRONG&gt;for you.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jan 2010 04:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373551#M857385</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-29T04:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373552#M857386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will file a documentation defect to correct the link that I pasted in my previous response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service object-group has to be before the source object-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you can use source and destination port configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object-group service srv-obj&lt;BR /&gt; tcp source 53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ------- source port - 53&lt;BR /&gt; tcp 23&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ------- destination port - 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To add more than one source port in a single Object group -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object-group service srv-og&lt;BR /&gt; Tcp source 53&lt;BR /&gt; tcp source 80&lt;BR /&gt; udp source 67&lt;BR /&gt; udp source 68&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can call this service port first then, source object-group then, destination object-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Feb 2010 14:02:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373552#M857386</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-02T14:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373553#M857387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is an example I was able to get working using a service group on an FWSM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;! Here is the object group for protocols. Notice I did not specify port numbers, only the protocols. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;! This implies that ALL ports available for a protocol will be included&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;object-group protocol daintestPROTOCOL&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;protocol-object icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;protocol-object tcp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;protocol-object udp&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;! Here is the service group. With a service group, you can specify protocol, port number AND eq, lt, gt, range etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;object-group service daintestSERVICE&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;service-object udp eq domain &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;service-object tcp eq www &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;service-object tcp eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;! The source networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;object-group network daintestNETWORK&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;network-object 10.1.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;network-object 10.2.2.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;! The destination networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;object-group network daintestNETWORK2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;network-object 30.30.30.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;&lt;SPAN&gt; &lt;/SPAN&gt;network-object 40.40.40.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!This line permits source networks to destination with protocols icmp, tcp and udp ALL ports and types&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list daintest extended permit object-group daintestPROTOCOL object-group daintestNETWORK object-group daintestNETWORK2 &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!This line, which uses a service group permits source networks to destination networks with tcp 80 and 443 and udp 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN&gt;access-list daintest extended permit object-group daintestSERVICE object-group daintestNETWORK object-group daintestNETWORK2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Thanks,&lt;/P&gt;&lt;P class="MsoNormal"&gt;Dain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 17:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/1373553#M857387</guid>
      <dc:creator>dain.deutschman</dc:creator>
      <dc:date>2010-11-17T17:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: object groups in ACL</title>
      <link>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/3370590#M857388</link>
      <description>&lt;BR /&gt;how the below acl works with multiple object group. please help&lt;BR /&gt;&lt;BR /&gt;access-list outside_in line 13 extended permit object-group DM_INLINE_SERVICE_6 any object-group DM_INLINE_NETWORK_17 (hitcnt=4) 0xa56a1518&lt;BR /&gt;access-list outside_in line 14 extended permit object-group DM_INLINE_SERVICE_6 any object obj_ItunesTest (hitcnt=9990) 0xf36f97c1&lt;BR /&gt;access-list outside_in line 15 extended permit object-group DM_INLINE_SERVICE_6 any object-group NAT-Health (hitcnt=134) 0x6b78a</description>
      <pubDate>Sun, 22 Apr 2018 12:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/object-groups-in-acl/m-p/3370590#M857388</guid>
      <dc:creator>amarnath-praveen</dc:creator>
      <dc:date>2018-04-22T12:19:32Z</dc:date>
    </item>
  </channel>
</rss>

