<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access List in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-list/m-p/878955#M957702</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;to make sure I understand correctly, you want an inside host, 10.1.1.10 (example) to access the public IP address?&lt;/P&gt;&lt;P&gt;Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What host to what address on what ports?&lt;/P&gt;&lt;P&gt;This is how the ACL will read.&lt;/P&gt;&lt;P&gt;As stated by jon you will see this in the xlate table and the traffic going outbound will use the global IP.  If you have a static NAT set-up for the public IP and have an access list set-up for access to that private IP via the NAT, wow that sounded confusing, then you will need to make sure that it is not specific and allows any to access the site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now clear as mud right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Jan 2008 16:57:31 GMT</pubDate>
    <dc:creator>Rick Morris</dc:creator>
    <dc:date>2008-01-04T16:57:31Z</dc:date>
    <item>
      <title>Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878948#M957691</link>
      <description>&lt;P&gt;I would like to allow an inside IP that is not in the permit acl's to access the following website IP addresses&lt;/P&gt;&lt;P&gt;xxx.xxx.xx.170&lt;/P&gt;&lt;P&gt;xxx.xxx.xx.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another engineer added the two access list at the end but I don't think they are much help. If anyone can assist me with this I would deeply appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.210 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.211 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.212 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.213 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.214 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.215 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.216 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.217 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.218 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.219 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.220 any&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip host 192.168.1.12 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip any host xxx.xxx.xx.170&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit ip any host xxx.xxx.xxx.150&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878948#M957691</guid>
      <dc:creator>rmwhite59</dc:creator>
      <dc:date>2019-03-13T00:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878949#M957692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well it's a bit open if you only want http to be allowed out ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit tcp host "inside ip"  host xxx.xxx.xx.170 eq www&lt;/P&gt;&lt;P&gt;access-list outgoing extended permit tcp host "inside ip"  host xxx.xxx.xxx.150 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However this is not your main problem. Are you Natting your internal IP addresses to a publically routable address ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2008 22:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878949#M957692</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-01-03T22:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878950#M957694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2008 23:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878950#M957694</guid>
      <dc:creator>rmwhite59</dc:creator>
      <dc:date>2008-01-03T23:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878951#M957695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the correspondin global statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact it would help if you could post the full config minus any sensitive information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2008 23:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878951#M957695</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-01-03T23:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878952#M957697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have attached the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2008 23:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878952#M957697</guid>
      <dc:creator>rmwhite59</dc:creator>
      <dc:date>2008-01-03T23:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878953#M957699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config looks okay, what is the source IP address you are trying to go from. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you try to connect to that address what do you see in the xlate table - "sh xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2008 23:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878953#M957699</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-01-03T23:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878954#M957701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;192.168.1.107&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2008 00:40:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878954#M957701</guid>
      <dc:creator>rmwhite59</dc:creator>
      <dc:date>2008-01-04T00:40:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access List</title>
      <link>https://community.cisco.com/t5/network-security/access-list/m-p/878955#M957702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;to make sure I understand correctly, you want an inside host, 10.1.1.10 (example) to access the public IP address?&lt;/P&gt;&lt;P&gt;Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What host to what address on what ports?&lt;/P&gt;&lt;P&gt;This is how the ACL will read.&lt;/P&gt;&lt;P&gt;As stated by jon you will see this in the xlate table and the traffic going outbound will use the global IP.  If you have a static NAT set-up for the public IP and have an access list set-up for access to that private IP via the NAT, wow that sounded confusing, then you will need to make sure that it is not specific and allows any to access the site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now clear as mud right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2008 16:57:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-list/m-p/878955#M957702</guid>
      <dc:creator>Rick Morris</dc:creator>
      <dc:date>2008-01-04T16:57:31Z</dc:date>
    </item>
  </channel>
</rss>

