Cisco ASA Series Configuration Manual page 46

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

History for ACLs
Feature Name
Unified extended and webtype ACLs for IPv4
and IPv6
Extended ACL and object enhancement to filter
ICMP traffic by ICMP code
Configuration session for editing ACLs and
objects.
Forward referencing of objects and ACLs in
access rules.
Cisco ASA Series Firewall CLI Configuration Guide
3-22
Releases
Description
9.0(1)
Extended and webtype ACLs now support IPv4 and IPv6
addresses. You can even specify a mix of IPv4 and IPv6
addresses for the source and destination. The any keyword
was changed to represent IPv4 and IPv6 traffic. The any4
and any6 keywords were added to represent IPv4-only and
IPv6-only traffic, respectively. The IPv6-specific ACLs are
deprecated. Existing IPv6 ACLs are migrated to extended
ACLs. See the release notes for more information about
migration.
We modified the following commands: access-list
extended, access-list webtype.
We removed the following commands: ipv6 access-list,
ipv6 access-list webtype, ipv6-vpn-filter.
9.0(1)
ICMP traffic can now be permitted/denied based on ICMP
code.
We introduced or modified the following commands:
access-list extended, service-object, service.
9.3(2)
You can now edit ACLs and objects in an isolated
configuration session. You can also forward reference
objects and ACLs, that is, configure rules and access groups
for objects or ACLs that do not yet exist.
We introduced the clear configuration session, clear
session, configure session, forward-reference, and show
configuration session commands.
Chapter 3
Access Control Lists

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents