10-26-2014 03:53 AM - edited 03-11-2019 09:59 PM
Dear All,
I have ASA 5520 which was running on software version 8.2, I have upgraded it to 8.4.7.
Migration process completed successfully and seems everything went good, I just got one weird issue related to the ACLs associated to object group, below is the explanation before and after the migration:
on the old configs I had something like the below configs:
object-group network Remote_FW
description Threadneedle remote firewalls
network-object object FW01
network-object object FW02
network-object object FW03
network-object object FW04
object-group network Internal_Net
description Internal Networks
network-object 10.10.102.0 255.255.255.0
network-object 10.10.104.0 255.255.255.0
network-object 10.10.105.0 255.255.255.0
network-object 10.10.122.0 255.255.255.0
access-list outside-in extended permit tcp object-group Remote_FW object-group Internal_Net eq ftp log
After the upgrade to 8.4, I got the access list like:
same objects are there but the access-list becomes:
access-list outside-in remark Migration, ACE (line 3) expanded: permit tcp object-group Remote_FW eq ftp
access-list outside-in extended permit tcp object FW01 10.10.102.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW01 10.10.104.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW01 10.10.105.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW01 10.10.122.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW02 10.10.102.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW02 10.10.104.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW02 10.10.105.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW02 10.10.122.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW03 10.10.102.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW03 10.10.104.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW03 10.10.105.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW03 10.10.122.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW04 10.10.102.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW04 10.10.104.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW04 10.10.105.0 255.255.255.0 eq ftp log
access-list outside-in extended permit tcp object FW04 10.10.122.0 255.255.255.0 eq ftp log
so it seems to make a separate line for each source against each destination of the objects !!
at the beginning, I though this is the behaviour of the new OS, but I have noticed in different access-list it is using the same object without any issue !!
Any idea why is that ?!
10-26-2014 10:01 AM
so what is the problemo ?
access-list is working
10-26-2014 04:03 PM
access-list is working, but instead of having a single line access-list, I got more than 2500 lines which makes it very long running configs !!
10-26-2014 04:59 PM
Hi Eng.Bader,
I would try to remove it and reapply it. If you would do that please try this:
clear configure access-list outside-in
access-list outside-in extended permit tcp object-group Remote_FW object-group Internal_Net eq ftp log
Please note that if you are going to do that remotely and you are connected to the outside interface you will be locked out as soon as you remove the access list, so you should do it from inside network.
Regards,
Aref
10-26-2014 09:15 PM
Hi,
This is expected when upgrading to the broad view [8.3+] versions.
I would request you to use this command to compress this ACL and any other expanded ACL:-
object-group-search access-control
http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/o.html#pgfId-1866962
Thanks and Regards,
Vibhor Amrodia
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide