<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 ACL help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031397#M916178</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you have typed inside_access-in it should be inside_access_in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Jul 2008 16:18:29 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2008-07-23T16:18:29Z</dc:date>
    <item>
      <title>ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031394#M916165</link>
      <description>&lt;P&gt;I am configuring my first ASA and have not been able to figure out to to limit access to a few subnets and sites on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to only allow access to two internal nets&lt;/P&gt;&lt;P&gt;10.10.23.128 255.255.255.128&lt;/P&gt;&lt;P&gt;10.10.26.0 255.255.255.128&lt;/P&gt;&lt;P&gt;a single would station in another group&lt;/P&gt;&lt;P&gt;10.10.28.12 255.255.255.128&lt;/P&gt;&lt;P&gt;and then two location on the web&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;198.187.196.0 255.255.255.0&lt;/P&gt;&lt;P&gt;198.136.211.12 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appriciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarleton State University&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031394#M916165</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2019-03-11T13:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031395#M916171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;  If I understood you correct, you want to permit traffic from the specified private hosts and networks to the public IPs on web right? Then the config is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network Allowed_Int&lt;/P&gt;&lt;P&gt;network-object 10.10.23.128 255.255.255.128&lt;/P&gt;&lt;P&gt;network-object 10.10.26.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network Allowed_Out&lt;/P&gt;&lt;P&gt;198.187.196.0 255.255.255.0&lt;/P&gt;&lt;P&gt;198.136.211.12 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip object-group Allowed_In object-group Allowed_Out &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 13:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031395#M916171</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T13:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031396#M916176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it errored out when I tried to input &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip object-group Allowed_In object-group Allowed_Out &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside it stated itaccess-list &lt;INSIDE_ACCESS-IN&gt;&lt;/INSIDE_ACCESS-IN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031396#M916176</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T16:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031397#M916178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you have typed inside_access-in it should be inside_access_in&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031397#M916178</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T16:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031398#M916182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;ERROR: access-list &lt;INSIDE_ACCESS_IN&gt; does not exist&lt;/INSIDE_ACCESS_IN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes sorry typo but this is what I put in and this is the error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031398#M916182</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T16:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031399#M916186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that means access-lists are created with wrong name. Issue show access-list and check the name spelling&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031399#M916186</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T16:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031400#M916189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ITSCR3AS01# show access-list&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;            alert-interval 300&lt;/P&gt;&lt;P&gt;access-list outside_access_in; 2 elements&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit ip any object-group DM_INLINE_NETWORK_1 0xb8002543&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit ip any host 198.187.196.0 (hitcnt=0) 0xcd817934&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit ip any host 255.255.255.0 (hitcnt=0) 0x0ff50e83&lt;/P&gt;&lt;P&gt;ITSCR3AS01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is what I have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031400#M916189</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T16:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031401#M916194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;inside_access_in is not created. It should have errored when you typed in. Do not copy paste the whole, do it line by line and try to see errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post your running config and let me see if object groups are created&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 16:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031401#M916194</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T16:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031402#M916198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is config.  I am confused, ha.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;domain-name xxxxxx&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description ASA outside interface&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.120.115 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan70&lt;/P&gt;&lt;P&gt; description Inside network for Touchnet&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.xxx.180.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 70&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name tarleton.edu&lt;/P&gt;&lt;P&gt;object-group network Allowed_Int&lt;/P&gt;&lt;P&gt; network-object xxx.xxx.23.128 255.255.255.128&lt;/P&gt;&lt;P&gt; network-object xxx.xxx.26.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object-group network Allowed_Out&lt;/P&gt;&lt;P&gt; network-object 198.187.196.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 198.136.211.12 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 198.187.196.0&lt;/P&gt;&lt;P&gt; network-object host 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any object-group DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging host outside xxx.xxx.23.140&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit xxx.xxx.21.0 255.255.255.128 outside&lt;/P&gt;&lt;P&gt;icmp permit 10.xx.180.0 255.255.255.128 inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-603.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.xxx.180.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;router eigrp 165&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt; eigrp stub connected&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.120.125 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http xxx.xxx.21.0 255.255.255.128 outside&lt;/P&gt;&lt;P&gt;http 10.xxx.180.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host outside 165.95.23.140 community TSUroCN&lt;/P&gt;&lt;P&gt;snmp-server communit&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec start&lt;/P&gt;&lt;P&gt;telnet xxx.xxx.21.0 255.255.255.128 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh xxx.xxx.21.0 255.255.255.128 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns xxx.xxx.23.137 165.95.23.137&lt;/P&gt;&lt;P&gt;dhcpd wins xxx.xxx.23.133 165.95.23.133&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 60&lt;/P&gt;&lt;P&gt;dhcpd domain xxxx&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;dhcpd update dns&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.xxx.180.2-10.xxx.180.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns xxx.xxx.23.137 xxx.xxx.23.133 interface inside&lt;/P&gt;&lt;P&gt;dhcpd wins xxx.xxx.23.137xxx.xxx.23.133 interface inside&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 30 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain xxxxxx interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;ntp server xxx.xxx.1.1 source outside prefer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ITSCR3AS01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want my private network to access only computers on&lt;/P&gt;&lt;P&gt;xxx.xxx.23.0/25&lt;/P&gt;&lt;P&gt;xxx.xxx.26.0/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and only these web sites&lt;/P&gt;&lt;P&gt;198.187.196.0/24&lt;/P&gt;&lt;P&gt;198.136.211.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;everything else is denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 17:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031402#M916198</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T17:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031403#M916200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, two commands. You should be in hostname(config)#  mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip object-group Allowed_Int object-group Allowed_Out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the above command issued without errors, issue the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another issue is, you have xxx.xxx.23.0/25 &lt;/P&gt;&lt;P&gt;xxx.xxx.26.0/25 networks, but your firewall does not have an interface in these networks. Are these networks connected to a L3 device which is connected to inside interface? Assuming yes, you need a route back to that device like following in ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside xxx.xxx.23.0 255.255.255.128 10.xxx.180.xx&lt;/P&gt;&lt;P&gt;route inside xxx.xxx.26.0 255.255.255.128 10.xxx.180.xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 17:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031403#M916200</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T17:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031404#M916203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Access to the outside is not working vorrectly.  198.187.xxx.xxx and 198.136.211.12&lt;/P&gt;&lt;P&gt;I keep getting can't desplay the page.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx.xx.23 and xxx.xxx.26 are networks on the outside coonnected on the outside interface.  The asa and these network are on the same L3 device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 18:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031404#M916203</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T18:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031405#M916205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your initail query states " would like to only allow access to two internal nets &lt;/P&gt;&lt;P&gt;10.10.23.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;10.10.26.0 255.255.255.128 " and now you say "xxx.xx.23 and xxx.xxx.26 are networks on the outside coonnected on the outside interface"&lt;/P&gt;&lt;P&gt;  Please describe your network in details&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 19:00:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031405#M916205</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-23T19:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031406#M916206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry about the confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my inside network on ASA is 10.xx.180.0&lt;/P&gt;&lt;P&gt;and ouside network on ASA is xxx.xx.120.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxx.xxx.23.0 and xxx.xxx.26.0  are networks ouside of the ASA by coonect to same l3 device as ASA outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I have computers on the inside of the ASA to talk to these two networks because they house DNS and other important assets.    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 19:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031406#M916206</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-23T19:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031407#M916207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, &lt;/P&gt;&lt;P&gt;  "xxx.xxx.23.0 and xxx.xxx.26.0 are networks ouside of the ASA... these two networks because they house DNS and other important assets"&lt;/P&gt;&lt;P&gt;  I can give you some pretty weird configurations like outside nat and outside acls that will make your system work, but this will totaly make your firewall a huge "nothing". The ACL that will make things work will open your outside interface totally open to spoofing attack since traffic should be permit from a private IP range which should not be done. An outside NAT with the global again outside, intra-interface permit... just forget about that. Lets make a best practise design.&lt;/P&gt;&lt;P&gt;  The place for these networks is not! your outside interface. They also has to be protected since they hold DNS and some important servers and accessed by both inside and outside. You should create a DMZ for these. Remove the switchport statement from one of the ethernet ports, make it DMZ and connect that networks to this port. For further advise, I need to know what L3 device is all networks and outside interface are connected to. Where does the ISP connection come from (device) and where does these networks come from (device)? Is inside also connected to same segment?&lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 00:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031407#M916207</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-24T00:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031408#M916208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I took the information you gave me and set up my ACLs I got it working, very simplified ACLS but it will do for what we want it to do.  &lt;/P&gt;&lt;P&gt;Thanks so much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 17:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031408#M916208</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2008-07-24T17:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 ACL help</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031409#M916209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear that your issue is sorted out &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 22:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-acl-help/m-p/1031409#M916209</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-24T22:08:28Z</dc:date>
    </item>
  </channel>
</rss>

