3-13
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 3 Access Control Lists
Configure ACLs
Example of Converting Addresses to Objects for Extended ACLs
The following normal ACL that does not use object groups restricts several hosts on the inside network
from accessing several web servers. All other traffic is allowed.
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.29
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.78 host 209.165.201.29
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.89 host 209.165.201.29
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.16
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.78 host 209.165.201.16
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.89 host 209.165.201.16
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.78
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.78 host 209.165.201.78
eq www
hostname(config)#
access-list ACL_IN extended deny tcp host 10.1.1.89 host 209.165.201.78
eq www
hostname(config)#
access-list ACL_IN extended permit ip any any
hostname(config)#
access-group ACL_IN in interface inside
If you make two network object groups, one for the inside hosts, and one for the web servers, then the
configuration can be simplified and can be easily modified to add more hosts:
hostname(config)#
object-group network denied
hostname(config-network)#
network-object host
10.1.1.4
hostname(config-network)#
network-object host
10.1.1.78
hostname(config-network)#
network-object host
10.1.1.89
hostname(config-network)#
object-group network web
hostname(config-network)#
network-object host
209.165.201.29
hostname(config-network)#
network-object host
209.165.201.16
hostname(config-network)#
network-object host
209.165.201.78
hostname(config-network)#
access-list ACL_IN extended deny tcp object-group denied
object-group web eq www
hostname(config)#
access-list ACL_IN extended permit ip any any
hostname(config)#
access-group ACL_IN in interface inside
Configure Standard ACLs
A standard ACL is composed of all ACEs with the same ACL ID or name. Standard ACLs are used for
a limited number of features, such as route maps or VPN filters. A standard ACL uses IPv4 addresses
only, and defines destination addresses only.
To add a standard access list entry, use the following command:
hostname(config)#
access-list
access_list_name
standard
{
deny
|
permit
}
{
any4
|
host
ip_address
|
ip_address mask
}
Example:
hostname(config)#
access-list OSPF standard permit 192.168.1.0 255.255.255.0
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......