Extended ACL configuration

Hello everyone,
I use ACLs on a daily basis and every now and then I need to insert a remark above a particulare line.
As of today I do the following:
Step 1: Creating a temp. copy of the desired ACL and bind it to the Interface to ensure functionality while editing the original ACL
Step 2: Delete the original ACL and then recreate it with the added line(s)
Step 3: Bind the newly created ACL to the Interface, delete the temp. created ACL
Is there a way similar to include new lines by useing the sequence numbers to insert a remark above a specific line?
thanks in advance
Marcel

Hi Marcel
you didn't mentioning about what kind of device (model, firmware/ios version) you are writing.
ACL's can be done on variety of devices with very different forms of configuration, moreover you are writing inside Small Business section of this forum (related to specified group devices without using IOS software).

Similar Messages

  • WAAS: Standard vs Extended ACL's for WCCP Transparent Redirection

    I've come across a number of implementations where the ACL's associated with services 61 & 62 are using extended access-list. I am writing with specific reference to wccp configured in promiscuous mode.
    Since WCCP will only redirect TCP, and the WAAS solution in general applies only to TCP - then is there really a need for extended acls for redirection?. Furthermore, in a simple implementation you do not need separate acls linked to 61 & 62 - i don't think so.
    Standard acls parse the filteration process more quickly than extended.
    thanks
    Ajaz

    The extended access-lists are used because some TCP traffic does not to be optimized (telnet, BGP, SNMP, ...), or some hosts have compressed traffic for any application and need to be excluded from redirection. Besides that standard access-lists can be used.

  • Extended ACL TCP port control

    Hi all,
    I have configured an acl to control traffic going in/out of an interface via tcp ports. However, after applying the acl to the interface, i find that eventhough ports are allowed, traffic is blocked by the acl.
    I suspected that it could be the initial tcp handshake (SYN, SYNACK, ACK etc) is not being allowed (due to the implicit deny). When i included that in the acl, it worked. Is this a necessary step in an acl that controls by tcp port?
    Reason is, some of the acl configured with tcp port control has not been configured to allow SYN, ACK etc but it works when some of these ACLs are applied to other interface.

    Hi,
    Thanks for the response. As far as the config of the ACL, it's quite straight forward with the thing i'm trying to achieve. 1.1.1.190 & 1.1.1.192 are Mail servers. The objective is to control both .190 & .192. The config is as below:
    interface Vlan2
    description For Mail
    ip address 1.1.1.129 255.255.255.0
    ip access-group 2002 in
    end
    C6500#sh access-li 2002
    Extended IP access list 2002
    10 permit icmp any any (272 matches)
    20 permit tcp host 1.1.1.0 any syn (10467 matches)
    30 permit tcp host 1.1.1.0 any ack (781 matches)
    40 permit tcp host 1.1.1.190 eq smtp any
    50 permit tcp host 1.1.1.190 eq pop3 any
    60 permit tcp host 1.1.1.192 eq smtp any
    70 permit tcp host 1.1.1.192 eq pop3 any (4 matches)
    80 permit ip host 1.1.1.183 2.2.0.0 0.0.255.255 (19 matches)
    When I first created this ACL, without the SYN & ACK configured, users failed to connect to the servers. I personally believe users could connect, but it's the return packets from the servers that might have gotten blocked by the ACL. However, after I added in the SYN & ACK, all went well. I could see counters incrementing for the SYN & ACK as well.
    Whereas, some other applications that use some custom ports, ie. 10000, 10001, didn't seem to need the explicit configuration of the SYN/ACKs & the ACL worked well.

  • Catalyst 3560 Extended ACLs

    I have a VoIP / QoS situation I just discovered on the Cat 3560's. In this case, a particular manufacturer's IP Phones do not tag CoS or DSCP. As such, I have defined extended ACL's/Policies on the Cat 3560 switches to detect and mark traffic from the IP Phones. My policies are designed to identify and mark Call Bearer with DSCP 46 and Call Control traffic with DSCP 26 based upon source address and UDP port. What I see however, is that all VoIP traffic is marked at DSCP 46, and nothing is marked at 26. (It's not so bad having control and bearer marked with DSCP EF, but I like to put call control in a different queue when possible.)
    I am looking for confirmaton of the following theory. I suspect that the 3560's ((C3560-IPBASEK9-M), Version 12.2(25)SED) are not layer 4 aware, thus extended access lists function only as standard access lists - (even though the switch allows me to create an extended ACL). As such, my attempt to identify call bearer and call signalling based upon UDP port will not work.
    Below is the ACL / Policy config. Note that on downstream routers, I only see DSCP 46 and never match DSCP 26 (af31). From the switch, using "sh mls qos interface statistics", I see no traffic with DSCP 26 at all (output attached).
    I believe this is because the switch is only reading the layer 3 portion of the ACL. Since both ACL 101 and ACL 102 have the same layer 3 source adress, then all classified traffic will match class "IngressVoiceBearer" and get marked with 46.
    access-list 101 remark Voice Bearer Signalling
    access-list 101 permit udp 192.168.100.0 0.0.0.255 any eq 5004
    access-list 102 remark Call Control Signalling (udp 5440-5445)
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5440
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5441
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5442
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5443
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5444
    access-list 102 permit udp 192.168.100.0 0.0.0.255 any eq 5445
    class-map match-any IngressCallControlSignalling
    match access-group 102
    class-map match-any IngressVoiceBearer
    description All Inbound Voice Bearer traffic on UDP 5004
    match access-group 101
    policy-map IngressVoIP
    class IngressVoiceBearer
    set dscp ef
    class IngressCallControlSignalling
    set dscp af31
    class class-default
    set dscp default
    Switch Output:
    switch#sh mls qos int g0/1 statistics
    GigabitEthernet0/1
    dscp: outgoing
    0 - 4 : 12359302 0 0 0 0
    5 - 9 : 0 0 0 0 0
    10 - 14 : 0 0 0 0 0
    15 - 19 : 0 0 0 0 0
    20 - 24 : 0 0 0 0 0
    25 - 29 : 0 0 0 0 0
    30 - 34 : 0 0 0 0 0
    35 - 39 : 0 0 0 0 0
    40 - 44 : 0 0 0 0 0
    45 - 49 : 0 1837749 0 9716 0
    50 - 54 : 0 0 0 0 0
    55 - 59 : 0 0 0 0 0
    60 - 64 : 0 0 0 0

    Are the ports correct for the call control ACL? In the Cisco VoIP world we use an ACL like this for call control:
    ip access-list extended VOICE-CONTROL
    permit tcp any any range 2000 2002
    permit tcp any range 2000 2002 any
    permit tcp any any range 11000 11999
    permit tcp any any range 1718 1720
    permit udp any any range 1718 1719
    permit udp any any range 2427 2428
    permit tcp any any range 2443 2445
    permit tcp any any range 5555 5599
    But Cisco uses different protocols. Your ACL is configured correctly and the 3560 is supposed to support extended ACLs. Does your 3560 have an enhanced image or a standard image?
    Are these Avaya phones? I have had to do software updates on Avaya phones to get them to behave correctly.
    -Mark

  • Acl configuration

    Hello everyone,
    I have a doubt about the ACL configuring in my ASA
    I have this acl witch it means that 10.10.11.2 can do www to the host 10.10.10.1
    access-list 100 extended permit tcp host 10.10.11.2 host 10.10.10.1 eq www
    and 
    access-list 100 extended permit tcp host 10.10.10.1 eq www host 10.10.11.2 (hitcnt=31)
    witch it means that the host 10.10.10.1 can make www to the host 10.10.11.2
    the host 10.10.10.1 can't do www to the host 10.10.11.2, but the host 10.10.11.2 can do, and the second ACL have hits.
    is ti right?
    Thanks.

    If you want to allow hosts 10.10.10.1 to hit 10.10.11.2 on www then you should change the syntax to:
    access-list 100 extended permit tcp host 10.10.10.1 host 10.10.11.2 eq www
    Your original syntax:
    access-list 100 extended permit tcp host 10.10.10.1 eq www host 10.10.11.2
    By placing the "eq www" after the source IP, you are telling the ASA that the source port is 80/www. Instead, you want the destination port to be "80/www" and as a result, you need to place is after the destination IP. 
    Also, you can always use the "packet-tracer" command to see exactly what is blocking your traffic :)
    Thank you for rating helpful posts!

  • Applying Extended ACL close to Destination

                       Hi Everyone,
    Need to share something here.Mostly we use extended ACL close to the source.
    Here is this scenario i need to use the extended ACL  close to destination to fix the issue.
    Here is info
    Server 1  connected to interface X  ASA1  it has wan connection to ASA2---ASA2 has connection to ASA3.
    Now  ASA3 is learning source server IP via its Y interface.
    In order to reach the destination server ASA3  has to through its interface Z.
    Now there was ACL  on ASA3 which denies traffic from source server IP  to destination IP on interface Y.
    I apply the ACL  on ASA3 to allow the traffic and it worked.
    Dooes someone elase also has seen this behaviour?
    Regards
    Mahesh

    Hi,
    The thing depends on the fact if I understood your setup correctly. If you have traffic flowing through 3 different firewalls to reach its final destination then naturally you have to make sure that each of those firewalls allow that traffic. Even if the first ASA1 allows this connections in its ACL rules it might still be that ASA2 or ASA3 has a configuration that doesnt allow this traffic (like it seemed to be originally in your situation). The fact that ASA1 allowed the connection attempt through itself doesnt mean that it would reach its destination as there are differen firewalls on the way.
    Just as an example I could mention one real life setup that I manage.
    The setup contains 4 firewalls always (at minimum)
    One is customer firewall/vpn device
    One is our vpn device
    One is our firewall device
    One is our partner firewall device
    This means essentially that for the Customer to reach the Partner sites servers the traffic has to go through 4 firewalls atleast. Because of the policy chosen we only have to make sure that the Customer and the Partner firewall allows the traffic as Our firewalls dont do any access control (just provide the connectivity between sites)
    - Jouni

  • ACL - configuration help

    Hello I've a newly configured 5510 would appreciate a look over of the configuration and some questions I have:  Its a long post and I appreciate anyone taking time to read through it.
    My goals are the following:
         to make the inside network 10.20.145.0 to allow internet access - as long as the connection starts inside
         To allow neighbor network that comes in through outside interface origin 170.20.0.0/16 access to the 10.20.145.0 (bidirectional)
         The tunnel from neighbor lan to inside lan happens through vpn concentrator that has external ip address and 77.76.19.35
         Allow certain devices on the DMZ to access the internet and allow outside to inside connections on certain ports
    Much of the settings I have configured are coming from juniper that is currently online but needs to be replaced.
    The network is set up as below for a chart of traffic:
    ISP ---- Internet router ---- switch (3 active connections) 1. firewall  2. internet router   3. vpn concentrator
    There is an internal 3750 that I have configured with ip 10.20.145.15 since it comes up often
    I'm using pub IPs on the machines on the DMZ though I'm thinking of changing that to an internal vlan and than nating it out.  Well here's what I have so far:
    =================================================================================================
    ASA Version 8.3(2)
    hostname ASA
    domain-name a.domain.com
    enable password l4Tu/tqHeN0MdD7t encrypted
    passwd dL9fmCBkHiwx4Iib encrypted
    names
    interface Management0/0
    nameif management
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    management-only
    interface GigabitEthernet1/0
    description outside-interface-connected-to-internet-switch
    speed 1000
    duplex full
    shutdown
    nameif outside
    security-level 0
    ip address 76.77.19.34 255.255.255.240
    interface GigabitEthernet1/1
    description inside-int-10.20.145-network
    speed 1000
    duplex full
    shutdown
    nameif inside
    security-level 100
    ip address 10.20.145.3 255.255.255.192
    interface GigabitEthernet1/2
    shutdown
    nameif DMZ
    security-level 50
    ip address 76.77.19.49 255.255.255.240
    interface GigabitEthernet1/3
    shutdown
    no nameif
    no security-level
    no ip address
    boot system disk0:/asa832-k8.bin
    ftp mode passive
    clock timezone EST -5
    lock summer-time EDT recurring
    dns domain-lookup outside
    dns server-group DefaultDNS
    name-server 76.77.6.11
    name-server 66.72.76.84
    name-server 4.2.2.1
    name-server 8.8.8.8
    domain-name a.domain.com
    object network Inside_lan
    subnet 10.20.145.0 255.255.255.0
    object network NET-neighbor
    subnet 170.20.0.0 255.255.0.0
    description neighbor_LAN 
    object network 76.77.19.44_cake
    host 76.77.19.44
    description cake 
    object network 76.77.19.59
    host 76.77.19.59
    description streaming 
    object network 76.77.19.61
    host 76.77.19.61
    description streaming 
    object network cindy
    host 50.56.249.224
    description cindy 
    object-group network internal-LAN
    network-object object Inside_lan
    object-group service 3306 tcp
    description 3306
    port-object eq 3306
    object-group service 4567 tcp
    description 4567
    port-object eq 4567
    object-group icmp-type ICM
    description ICM_basic
    icmp-object echo
    icmp-object echo-reply
    icmp-object time-exceeded
    icmp-object traceroute
    icmp-object unreachable
    object-group service Retriever_SVC tcp
    description Retriever
    port-object range 8000 8001
    object-group service Production tcp
    description PM
    port-object range www www
    object-group service RDP tcp
    description RDP
    port-object eq 3389
    object-group service Streaming tcp
    description streaming server
    port-object eq 7009
    object-group service UDP123 udp
    description 123
    port-object eq ntp
    object-group service affordable tcp
    description affordable legacy
    port-object eq 85
    object-group service market tcp
    description ports for market  dmz
    port-object eq 2189
    port-object eq 2190
    port-object eq 2192
    port-object eq 2194
    object-group service messenger tcp
    description air messenger
    port-object eq 444
    object-group service traffic-701 tcp
    description 701
    port-object eq 701
    object-group service ntp1 udp
    description ntp-udp-1
    group-object UDP123
    object-group service payroll tcp
    description payroll port
    port-object eq 714
    object-group service snmp-udp udp
    description snmp udp 1
    port-object eq snmp
    object-group service vitrol tcp
    description vitrol custom
    port-object eq 5986
    object-group service webconferrence tcp
    description webconference legacy port
    port-object eq 1417
    port-object eq 407
    object-group service webmail tcp
    description webmail ports
    port-object eq 2095
    object-group service INLINE_TCP_1 tcp
    port-object eq ftp
    port-object eq ftp-data
    object-group service INLINE_SERVICE_1
    service-object tcp
    service-object icmp echo-reply
    service-object icmp traceroute
    service-object icmp unreachable
    service-object tcp destination eq ftp
    service-object tcp destination eq ftp-data
    service-object tcp destination eq www
    service-object tcp destination eq https
    service-object udp destination eq echo
    service-object udp destination eq ntp
    service-object udp destination eq radius
    service-object udp destination eq radius-acct
    service-object udp destination eq syslog
    object-group network INLINE_NETWORK_1
    network-object host 76.57.19.53
    network-object host 255.255.255.255
    object-group service INLINE_TCP_2 tcp
    group-object Streaming
    group-object vitrol
    object-group service INLINE_SERVICE_2
    service-object ip
    service-object tcp
    service-object tcp destination eq ftp
    service-object tcp destination eq ftp-data
    service-object tcp destination eq www
    service-object tcp destination eq https
    service-object tcp destination eq ssh
    access-list internet extended permit ip object Inside_lan interface outside
    access-list internet extended permit object-group DM_INLINE_SERVICE_1 object Inside_lan any
    access-list syndicaster extended permit tcp object Cindy object Inside_lan object-group INLINE_TCP_1
    access-list streaming extended permit tcp interface DMZ any object-group Streaming
    access-list streaming59 extended permit tcp object 76.77.19.59 interface outside object-group Streaming
    access-list streaming_outside_in extended permit tcp interface outside object-group INLINE_NETWORK_1 object-group DM_INLINE_TCP_2
    access-list neighbor extended permit object-group INLINE_SERVICE_2 object NET-neighbor object Inside_lan
    pager lines 24
    logging enable
    logging asdm informational
    mtu management 1500
    mtu outside 1500
    mtu inside 1500
    mtu DMZ 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    nat (inside,outside) source dynamic any interface
    object network Inside_lan
    nat (any,outside) dynamic interface
    access-group neighbor in interface outside
    access-group neighbor out interface inside
    route outside 0.0.0.0 0.0.0.0 76.77.19.33 1
    route inside 10.0.0.0 255.255.255.0 10.20.145.4 1
    route inside 10.0.1.0 255.255.255.0 10.20.145.2 1
    route inside 10.20.145.0 255.255.255.0 10.20.145.15 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    http server enable
    http 192.168.1.0 255.255.255.0 management
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    telnet 10.20.145.39 255.255.255.255 inside
    telnet timeout 5
    ssh 10.20.145.39 255.255.255.255 inside
    ssh timeout 5
    console timeout 0
    dhcpd dns 76.77.6.11 64.22.16.84
    dhcpd domain a domain
    dhcpd option 6 ip 4.2.2.1
    dhcpd address 192.168.1.2-192.168.1.254 management
    dhcpd enable management
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    username joe password m6OO.pH/13qc7ypS encrypted privilege 15
    username bob password N./x1Ut.gM.QGZLa encrypted privilege 15
    username bill password uZjIWeHtovCOweHJ encrypted
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect icmp
      inspect icmp error
    service-policy global_policy global
    prompt hostname context
    call-home
    profile CiscoTAC-1
      no active
      destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    Cryptochecksum:06eb82d8d8a3ae82352512cd707e7f4a
    ========================================================================================================================================================
    access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)
                alert-interval 300
    access-list internet; 14 elements; name hash: 0xb30cf7fe
    access-list internet line 1 extended permit ip object Inside_lan interface outside 0xe073f975
      access-list internet line 1 extended permit ip 10.20.1450 255.255.255.0 interface outside (hitcnt=0) 0xe073f975
    access-list internet line 2 extended permit object-group INLINE_SERVICE_1 object Inside_lan any 0x2e33ca08
      access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any (hitcnt=0) 0xa576d14f
      access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any echo-reply (hitcnt=0) 0x15cccd5c
      access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any traceroute (hitcnt=0) 0x8aab2f53
      access-list internet line 2 extended permit icmp 10.20.145.0 255.255.255.0 any unreachable (hitcnt=0) 0xe02606e1
      access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq ftp (hitcnt=0) 0x6d0043b6
      access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq ftp-data (hitcnt=0) 0xce904411
      access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq www (hitcnt=0) 0x1ddebc69
      access-list internet line 2 extended permit tcp 10.20.145.0 255.255.255.0 any eq https (hitcnt=0) 0x1a3b15bc
      access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq echo (hitcnt=0) 0xadc66030
      access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq ntp (hitcnt=0) 0xa67a4406
      access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq radius (hitcnt=0) 0x230419e6
      access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq radius-acct (hitcnt=0) 0xa8ae0824
      access-list internet line 2 extended permit udp 10.20.145.0 255.255.255.0 any eq syslog (hitcnt=0) 0x051c7ef5
    access-list cindy; 2 elements; name hash: 0x807c55e5
    access-list cindy line 1 extended permit tcp object cindy object Inside_lan object-group DM_INLINE_TCP_1 0xe35e702c
      access-list cindy line 1 extended permit tcp host 50.56.249.224 10.20.145.0 255.255.255.0 eq ftp (hitcnt=0) 0x64b321cc
      access-list cindy line 1 extended permit tcp host 50.56.249.224 10.20.145.0 255.255.255.0 eq ftp-data (hitcnt=0) 0x55109118
    access-list streaming; 1 elements; name hash: 0xfd34cf16
    access-list streaming line 1 extended permit tcp interface DMZ any object-group Streaming_custom 0x8b2e87d1
    access-list streaming line 1 extended permit tcp interface DMZ any eq 7009 (hitcnt=0) 0xb13a2776
    access-list streaming59; 1 elements; name hash: 0x959c1f3b
    access-list streaming59 line 1 extended permit tcp object 76.77.19.59 interface outside object-group Streaming_custom 0xc173840d
    access-list streaming59 line 1 extended permit tcp host 76.77.19.59 interface outside eq 7009 (hitcnt=0) 0x84cd9084
    access-list streaming_outside_in; 4 elements; name hash: 0x3f86c9d4
    access-list streaming_outside_in line 1 extended permit tcp interface outside object-group INLINE_NETWORK_1 object-group DM_INLINE_TCP_2
      access-list streaming_outside_in line 1 extended permit tcp interface outside host 206.57.19.53 eq 7009 (hitcnt=0) 0x06c04720
      access-list streaming_outside_in line 1 extended permit tcp interface outside host 206.57.19.53 eq 5986 (hitcnt=0) 0x9ae9047e
      access-list streaming_outside_in line 1 extended permit tcp interface outside host 255.255.255.255 eq 7009 (hitcnt=0) 0x5e3553e8
      access-list streaming_outside_in line 1 extended permit tcp interface outside host 255.255.255.255 eq 5986 (hitcnt=0) 0x1f5d8fd9
    access-list neighbor; 7 elements; name hash: 0xc99eb2b4
    access-list neighbor line 1 extended permit object-group INLINE_SERVICE_2 object NET-neighbor object Inside_lan 0xc9688a21
      access-list neighbor line 1 extended permit ip 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 (hitcnt=0) 0xe1e8b995
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 (hitcnt=0) 0x462beedc
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ftp (hitcnt=0) 0xf238c75e
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ftp-data (hitcnt=0) 0x266e675b
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq www (hitcnt=0) 0x8627ec0a
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq https (hitcnt=0) 0x3cae424a
      access-list neighbor line 1 extended permit tcp 170.20.0.0 255.255.0.0 10.20.145.0 255.255.255.0 eq ssh (hitcnt=0) 0xcb6666b3

    Hi,
    For the Default Dynamic PAT rule that you are asking for the single "inside" network I would suggest the following
    First remove the current NAT configurations
    nat (inside,outside) source dynamic any interface
    object network Inside_lan
    nat (any,outside) dynamic interface
    Then reconfigure the NAT in the following way
    object-group network DEFAULT-PAT-SOURCE
    network-object 10.20.145.0 255.255.255.0
    nat (inside,outside) after-auto sourece dynamic DEFAULT-PAT-SOURCE interface
    This will create and "object-group" for the networks or hosts that should be PATed to the "outside" interface IP address when accessing the Internet. If you want more internal networks to get PATed the same way, you simply add the network under the "object-group" among the already existing "inside" network.
    The "after-auto" parameter also makes sure that this NAT rule doesnt override any other future rules. The parameter in question moves the NAT rule at the bottom of the NAT rules so its one of the last matched agains when traffic arrives on the firewall from behind "inside"
    With regards to the neighbor network of 172.20.0.0/16, is this some network that is going to be behind a L2L VPN or is simply almost directly behind the "outside" interface?
    In general the NAT format for this kind NAT is
    object network NEIGHBOR
    subnet 172.20.0.0 255.255.0.0
    object-group network NEIGHBOR-SOURCE
    network-object 10.20.145.0 255.255.255.0
    nat (inside,outside) source static NEIGHBOR-SOURCE NEIGHBOR-SOURCE destination static NEIGHBOR NEIGHBOR
    I basically use an "object network" to define the remote network and "object-group network" to define the source network for this NAT. I use "object-group" for the source again because it leaves us room to add more networks under it if needed. Notice that "object network" can only hold one subnet/range/host while "object-group network" can hold pretty much as many as you want.
    I think the ACL configurations will have to be looked through also.
    Notice that if you want to control traffic from a behind "outside" for example, then you can only use 1 interface bound ACL to control that traffic. So every rule from "outside" to "inside" or to "dmz" has to be in the same ACL. Also this ACL would be attached to the "outside" interface in "in" direction. For example "access-group OUTSIDE-IN in interface outside"
    If we are talking about VPN connections configured directly to the ASA there are some other options compared to the above.
    But as I said its better that your needs regards the ACL rules are gone through more in depth to really know how we should configure them as I am myself not sure what all the above ACL are supposed to do.
    One final question for you. You have this network directly on the "inside" interface 10.20.145.3 255.255.255.192. But you also talk about it with mask /24. Is the ASA "inside" connected to some internal L3 device which hosts rest of the segments of this whole /24 network as currently the "inside" interface holds /26.
    Is ANY users/networks behind the ASA "inside" interface using the ASA directly as their gateway? I noticed that you setup would seem to have (as I mentioned in another thread to you) several devices on connected by the same LAN network (Router,VPN,firewall). What I fear will happen is that IF any "inside" users uses the ASA as their gateway and has to be routed back through the ASA "inside" interface to some other gateway that this will result in asymmetric routing and the ASA doesnt really handle that kind of situation that well.
    - Jouni

  • Use extended ACL with NAT

    Believe it or not, once in a while, i fumble with some basic concepts. Here is one, on our perimeter FW, ASA, there are these NATTING configured.
    I just couldnt figure out why they use extended ACL for the sources? isnt the standard one good enough?
    thanks in advance,
    Han                  
    access-list dmz_nat0_outbound extended permit ip any 1XX.169.0.0 255.255.0.0
    access-list dmz_nat0_outbound extended permit ip any 10.48.240.0 255.255.255.0
    access-list dmz_nat0_outbound extended permit ip any 10.48.243.0 255.255.255.0
    access-list inside_nat0_outbound_5 extended permit ip any 172.17.13.0 255.255.255.0
    access-list inside_nat0_outbound_5 extended permit ip any 192.168.12.0 255.255.255.0
    access-list inside_nat0_outbound_5 extended permit ip any 192.168.221.0 255.255.255.0
    global (Outside) 2 2XX.YY.13.244 netmask 255.255.255.0
    global (Outside) 1 2XX.YY.13.12 netmask 255.255.255.255
    nat (inside) 0 access-list inside_nat0_outbound_5
    nat (inside) 1 0.0.0.0 0.0.0.0
    nat (dmz) 0 access-list dmz_nat0_outbound
    nat (dmz) 2 0.0.0.0 0.0.0.0

    Hi Han,
    If you go for the standard ACL then you cannot specify the destination subnets and ports. You can specify only the source and the destination is considered any by default.
    standard ACL:
    access-list 10 standard permit ip 172.16.0.0
    Extended ACL:
    access-list abc permit tcp 172.16.0.0 255.255.255.0 10.0.0.0 255.255.255.0 eq 80
    This is how it differs. In your scenario destination is specific rather the source is any. So you have the extended ACL in picture for that. Hope this clears you.
    Please do rate if the given information helps.
    By
    Karthik

  • Standard and Extended ACLs?

    I just want to know that if extended IP access lists can do all tasks, I mean extended access lists have a lot of controlling parameters, then why people use Standard Access lists instead of Extended access lists.
    I just want to know that in which scenario we should use STD ACLs instead of EXTD ACLs, what special advantage of using STD over EXTD ACLs,
    Please reply.

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    To summarize what the other posters have already noted, the two principle reasons why one might use a standard ACL (which could also be functionally accomplished) by an extended ACL are 1) some commands that rely on ACLs might still only support standard ACLs (more likely in older IOS versions) and 2) a standard ACL might be just a little clearer to understand.
    Another (hopefully needless) reason why you might want to use a standard ACL, when an extended ACL would do, could be the device's processing performance might be better with a standard ACL.
    Logically the standard ACL ACE:
    access-list 10 permit host 1.1.1.1
    should be the same as this extended ACL ACE:
    permit ip host 1.1.1.1 any
    But a "dumb" implementation of processing the extended ACL might wildcard compare the destination IP and other optional parameters while the standard ACL only examines the source IP.  Should this happen?  No, but such might happen because of different generations of code and/or different teams working on ACL processing.
    BTW, if there is a significant performance difference, it's just as possible extended works better.
    Again, this is very extreme and unlikely, but this could be a reason to use one form of ACL vs. the other when both can provide the same filtering.  (Also, if this is "discovered", it's very likely to be very device and IOS version specific.  Personally I would consider taking "advantage" of such a discovery poor practice, except in extreme situations.)

  • Extended Accounting - Configuration info

    Hi all,
    My understanding is that the file '/etc/acctadm.conf' is created / changed, whenever extended accounting is enabled / changed. I noticed that this file is not getting created when extended accounting is enabled.
    Also is there a function which would return the extended accounting configuration information like providing information that /usr/sbin/acctadm prints out.
    Thanks
    Edited by: 849028 on Mar 31, 2011 12:41 PM

    Here are the specs and factory configurable options for the HP ENVY 700-200z CTO Desktop Computer you are interesrted in. Based on the specs, this model uses an HP JasmineR MS-7778 motherboard. The JasmineR motherboard supports an optical S/PDIF output, as shown below;
    2 - Optical S/PDIF-out port
    If you have any further questions, please don't hesitate to ask.
    Please click the white KUDOS star to show your appreciation
    Frank
    {------------ Please click the "White Kudos" Thumbs Up to say THANKS for helping.
    Please click the "Accept As Solution" on my post, if my assistance has solved your issue. ------------V
    This is a user supported forum. I am a volunteer and I don't work for HP.
    HP 15t-j100 (on loan from HP)
    HP 13 Split x2 (on loan from HP)
    HP Slate8 Pro (on loan from HP)
    HP a1632x - Windows 7, 4GB RAM, AMD Radeon HD 6450
    HP p6130y - Windows 7, 8GB RAM, AMD Radeon HD 6450
    HP p6320y - Windows 7, 8GB RAM, NVIDIA GT 240
    HP p7-1026 - Windows 7, 6GB RAM, AMD Radeon HD 6450
    HP p6787c - Windows 7, 8GB RAM, NVIDIA GT 240

  • Coherence *Extend-TCP configuration not working

    Hi,
         I was trying to setup the Coherence *Extend-TCP configuration on my solaris box.
         To start with, i'm trying to start a Cache server instance by using the cluster-side configuration XML (given at URL below)
         http://wiki.tangosol.com/display/COH32UG/Configuring+and+Using+Coherence*Extend
         But while starting its throwing me the below error. The Coherence version that i'm using is 3.2/353. Please advise.
         Exception in thread "main" java.lang.IllegalArgumentException: The "Proxy" element is missing a required acceptor configuration element
         at com.tangosol.coherence.component.util.daemon.queueProcessor.service.ProxyService.configure(ProxyService.CDB:30)
         at com.tangosol.coherence.component.util.SafeService.startService(SafeService.CDB:5)
         at com.tangosol.coherence.component.util.SafeService.getRunningService(SafeService.CDB:26)
         at com.tangosol.coherence.component.util.SafeService.ensureRunningService(SafeService.CDB:1)
         at com.tangosol.coherence.component.util.SafeService.start(SafeService.CDB:9)
         at com.tangosol.net.DefaultConfigurableCacheFactory.ensureService(DefaultConfigurableCacheFactory.java:775)
         at com.tangosol.net.DefaultCacheServer.start(DefaultCacheServer.java:138)
         at com.tangosol.net.DefaultCacheServer.main(DefaultCacheServer.java:60)
         regards
         Mike

    Sorry,
         I noticed that the above error occurs for version 3.1.1 (& not for 3.2) as previously
         specified in previous message (above). My apologies.
         As a follow-up, i've now installed 3.2 jars on my environment & i noticed that the
         above error doesnt occur for this version. The cache server seems to be coming
         up fine now (with the appropriate TCP/IP configuration tag in the xml).
         But when i try to run my client application (which attempts to connect to this
         remote cache server), it throws an InvocationTargetException error (full exception
         below).
         The error indicates that i'm missing some elements in the XML configuration.
         Exception
         (Wrapped) java.lang.reflect.InvocationTargetException
              at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
              at sun.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
              at sun.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
              at java.lang.reflect.Method.invoke(Unknown Source)
              at com.tangosol.net.extend.AdapterFactory.ensureCacheServiceAdapter(AdapterFactory.java:69)
              at com.tangosol.net.DefaultConfigurableCacheFactory.ensureService(DefaultConfigurableCacheFactory.java:729)
              at com.tangosol.net.DefaultConfigurableCacheFactory.ensureCache(DefaultConfigurableCacheFactory.java:650)
              at com.tangosol.net.DefaultConfigurableCacheFactory.configureCache(DefaultConfigurableCacheFactory.java:831)
              at com.tangosol.net.DefaultConfigurableCacheFactory.ensureCache(DefaultConfigurableCacheFactory.java:284)
              at com.tangosol.net.CacheFactory.getCache(CacheFactory.java:622)
              at com.tangosol.net.CacheFactory.getCache(CacheFactory.java:600)
              at com.tangosol.examples.explore.SimpleCacheClient.main(SimpleCacheClient.java:25)
         Caused by: java.lang.IllegalArgumentException: Missing required initiator child configuration element: <extend-cache-scheme tier='front'>
         <scheme-name>extend-direct</scheme-name>
         <service-name>ExtendTcpCacheService</service-name>
         <initiator-config tier='front'>
         <tcp-initiator>
         <remote-addresses>
         <socket-address>
         <address>gpblnx1d.nam.nsroot.net</address>
         <port>32000</port>
         </socket-address>
         </remote-addresses>
         <connect-timeout>10s</connect-timeout>
         <request-timeout>5s</request-timeout>
         </tcp-initiator>
         </initiator-config>
         </extend-cache-scheme>
              at com.tangosol.coherence.extend.component.comm.Adapter.getInitiatorElement(Adapter.CDB:13)
              at com.tangosol.coherence.extend.component.comm.adapter.CacheServiceStub.configure(CacheServiceStub.CDB:5)
              at com.tangosol.coherence.extend.component.application.library.generic.CoherenceExtend.createCacheServiceStub(CoherenceExtend.CDB:4)
              at com.tangosol.coherence.extend.component.application.library.generic.CoherenceExtend.ensureCacheServiceStub(CoherenceExtend.CDB:15)

  • SLM2024 ACL configuration

    I have a question on how to setup an ACL configuration on the SLM2024.  I originally got this switch to just be able to monitor network ups/downs on the ports.  and this has worked great in diagnosing the problems I was having originally.  Now however I have to setup something on here that I have never had to do, and am unsure how to do it.
    I have a computer that sends out a UDP broadcast that is causing our Xerox Phaser network printer to shutdown if it sees the broadcast.  The Phaser is designed in a way that if it sees something on the network it thinks is harmful it will shut itself off to protect itself.  and on startup if it sees something harmful it will not startup, it will go into an infinite restart loop.
    After fully testing everything I can think of I got it down to a piece of software on the computer that sends the UDP broadcast.  If this software is not running the printer works fine.  Unfortunately the software needs to run 24/7, and we need to print.
    Both the computer and printer have static ip addresses.  and basically all I want to do is setup an ACL (at least thats what others have told me) to block communication between those two ip addresses so that the printer won't see the UDP broadcast anymore.
    So my question is, would an ACL block that traffic?  and if so how do I set it up?  I looked in the manuals that came with the switch, and i'm not really seeing any information on how to do it.  If anyone can give me some insight into what I need to do I would greatly appreciate it.
    Thanks

    I have a question on how to setup an ACL configuration on the SLM2024.  I originally got this switch to just be able to monitor network ups/downs on the ports.  and this has worked great in diagnosing the problems I was having originally.  Now however I have to setup something on here that I have never had to do, and am unsure how to do it.
    I have a computer that sends out a UDP broadcast that is causing our Xerox Phaser network printer to shutdown if it sees the broadcast.  The Phaser is designed in a way that if it sees something on the network it thinks is harmful it will shut itself off to protect itself.  and on startup if it sees something harmful it will not startup, it will go into an infinite restart loop.
    After fully testing everything I can think of I got it down to a piece of software on the computer that sends the UDP broadcast.  If this software is not running the printer works fine.  Unfortunately the software needs to run 24/7, and we need to print.
    Both the computer and printer have static ip addresses.  and basically all I want to do is setup an ACL (at least thats what others have told me) to block communication between those two ip addresses so that the printer won't see the UDP broadcast anymore.
    So my question is, would an ACL block that traffic?  and if so how do I set it up?  I looked in the manuals that came with the switch, and i'm not really seeing any information on how to do it.  If anyone can give me some insight into what I need to do I would greatly appreciate it.
    Thanks

  • [SOLVED] Clonning window in extended desktop configuration

    Hello,
    Does anyone know whether it is possible to clone a window in a extended desktop configuration running two monitors?
    I would like something like cloning the displays, but not for the entire screen, just for the windows that I want.
    Something like I did on this poorly made image
    Here is some link that I found, but I think that this doesn't cover this:
    http://jonblack.org/2013/06/02/the-stat … r-support/
    Sincerely
    Last edited by gbc921 (2013-11-01 17:52:58)

    I made a little script to automate this process.
    So one can just run it, select the window with the mouse and the vnc viewer pops out!
    http://pastebin.com/9H1ESz9q
    Feel free to say something!
    Thanks!

  • 4500 IOS-XE: Crash on ACL configuration

    Hi All ,
    We have recently migrated from standalone to VSS on our C4500 switches with Sup 7-E.
    but the switch crashes every time we edit or modify the ACL with below error message :
    %SYS-3-BADBLOCK: Bad block pointer 
    %SYS-6-MTRACE: mallocfree: addr, pc
    %SYS-6-BLKINFO: Corrupted next pointer blk
    %SYS-6-MEMDUMP: 0x7E043FF8
    We noticed that there is a new bug for this issue i.e
    CSCun33897 Symptom:
    A Catalyst 4500 series switch running IOS-XE may unexpectedly reboot when ACL configuration is applied to an interface.
    but there is no fix available yet.
    Please let me know if anyone had this kind of issue. Appreciate your suggestion and feedback on this issue .
    Current used Image : cat4500e-universalk9.SPA.03.05.00.E.152-1.E.bin .
    Thanks in advance .

    its seems to be closely matching to the bug you mentioned
    If you upload crashinfo i can look it and try to confirm.
    Regards
    Naveen
    ***rate if it is helpful***

  • Extended ACL permit ip and allowed ports

                       Hi everyone
    Need to confirm if we have extended ACL with object group below
    access-list xy_access_in extended permit ip object-group xy_subnets object-group cisco_ynetworks
    will above ACL allow all the ports  on the destination object group?
    Thanks
    mahesh

    And to illustrate the situation above
    Situation 1 - Only allow rule exists on the ACL
    object-group network SOURCE
    network-object 10.10.10.0 255.255.255.0
    network-object 10.10.20.0 255.255.255.0
    object-group network DESTINATION
    network-object 10.10.100.0 255.255.255.0
    network-object 10.10.200.0 255.255.255.0
    access-list SOURCE-IN permit ip object-group SOURCE object-group DESTINATION
    The above ACL would
    Allow ALL TCP/UDP source and destination ports
    Allow those from the source networks of SOURCE to the destination networks of DESTINATION
    Situation 2 - Deny rules exist before the allowing rule
    object-group network SOURCE
    network-object 10.10.10.0 255.255.255.0
    network-object 10.10.20.0 255.255.255.0
    object-group network DESTINATION
    network-object 10.10.100.0 255.255.255.0
    network-object 10.10.200.0 255.255.255.0
    access-list SOURCE-IN deny ip host 10.10.10.10 host 10.10.100.100
    access-list SOURCE-IN deny tcp host 10.10.10.10 host 10.10.200.200 eq 80
    access-list SOURCE-IN permit ip object-group SOURCE object-group DESTINATION
    The above ACL would
    First block ALL TCP/UDP traffic from host 10.10.10.10 to host 10.10.100.100
    It would also block TCP traffic from host 10.10.10.10 to host 10.10.200.200 on the destination port TCP/80
    It would then allow ALL TCP/UDP traffic from the source networks of SOURCE to the destination networks of DESTINATION
    The key thing to notice ofcourse would be that we have blocked some traffic on the first 2 lines of the ACL and then allowed ALL TCP/UDP traffic.
    So host 10.10.10.10 cant communicate with host 10.10.100.100 on any port since the "deny" rule for that is at the top of the ACL BEFORE the rule that allows ALL TCP/UDP traffic between these networks.
    In the other case the TCP/80 destination traffic from host 10.10.10.10 to host 10.10.200.200 would be blocked BUT rest of the TCP/UDP traffic would be allowed by the rule using the "object-group"
    - Jouni

Maybe you are looking for

  • Internal Server Error while using IBM HTTP SERVER

    I used Webstudio tool to develop a JSP page and publish it on the IBM HTTP Server. When i was previewing the file, I got a internal server error 500 with the message of misconfiguration. I will be extremely happy if you can provide an answer for this

  • Moving Hard Disk From one Mac to Another

    I am thinking of buying a new macbook. I have the C2D 2.16 Ghz right now. So if I would buy, lets say the new 2.4 Ghz model, could I just take the hard disk from the one I use now and put it into to the new Macbook? Would it boot up? Thanks!

  • Windows does not recognize my iphone name, but itunes does

    This is a reqpost of another forum on diff site, but is the exact same problem i have~ After the IOS5 update~  and and updating two phones on same computer~ I have windows 7 x64bit, and the problem is it does not recognize my iPhone's name anymore..

  • List of cost center users

    Hi friends, How to find users assigned to a cost center? Thanks Nash

  • Software Update version 6.0 bundle 2475

    Hi, I am having problems updating to this bundle - if I try on the handheld, it tells me it can't download, and to use the BB desktop manager. When I try to download it on there, it gets to the stage where it has 269 files to add, then stops.  Doesn'