Guidelines For Acls - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 3
Access Control Lists
restrictions during working hours, and relax them after work hours or at lunch. Conversely, you could
essentially shut your network down during non-work hours. For information on creating time range
objects, see
Note
Users could experience a delay of approximately 80 to 100 seconds after the specified end time for the
ACL to become inactive. For example, if the specified end time is 3:50, because the end time is inclusive,
the command is picked up anywhere between 3:51:00 and 3:51:59. After the command is picked up, the
ASA finishes any currently running task and then services the command to deactivate the ACL.

Guidelines for ACLs

Firewall Mode
Failover and Clustering
Configuration sessions are not synchronized across failover or clustered units. When you commit the
changes in a session, they are made in all failover and cluster units as normal.
IPv6
Additional Guidelines
Configure Time Ranges, page
Extended and standard ACLs are supported in routed and transparent firewall modes.
Webtype ACLs are supported in routed mode only.
EtherType ACLs are supported in transparent mode only.
Extended and webtype ACLs allow a mix of IPv4 and IPv6 addresses.
Standard ACLs do not allow IPv6 addresses.
EtherType ACLs do not contain IP addresses.
When you specify a network mask, the method is different from the Cisco IOS software access-list
command. The ASA uses a network mask (for example, 255.255.255.0 for a Class C mask). The
Cisco IOS mask uses wildcard bits (for example, 0.0.0.255).
Normally, you cannot reference an object or object group that does not exist in an ACL or object
group, or delete one that is currently referenced. You also cannot reference an ACL that does not
exist in an access-group command (to apply access rules). However, you can change this default
behavior so that you can "forward reference" objects or ACLs before you create them. Until you
create the objects or ACLs, any rules or access groups that reference them are ignored. To enable
forward referencing, use the forward-reference enable command.
(Extended ACL only) Features That Do Not Support Identity Firewall, FQDN, and Cisco TrustSec
ACLs—The following features use ACLs, but cannot accept an ACL with identity firewall
(specifying user or group names), FQDN (fully-qualified domain names), or Cisco TrustSec values:
route-map command
VPN crypto map command
VPN group-policy command, except for vpn-filter
WCCP
DAP
2-9.
Cisco ASA Series Firewall CLI Configuration Guide
Guidelines for ACLs
3-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents