Cisco ASA Series Cli Configuration Manual page 986

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Information About Access Rules
Figure 1-1
10.1.1.14
See the following commands for this example:
hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.1.14
host 209.165.200.225 eq www
hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.2.67
host 209.165.200.225 eq www
hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.3.34
host 209.165.200.225 eq www
hostname(config)# access-group OUTSIDE out interface outside
Information About Extended Access Rules
This section describes information about extended access rules and includes the following topics:
Access Rules for Returning Traffic
For TCP and UDP connections for both routed and transparent mode, you do not need an access rule to
allow returning traffic because the ASA allows all returning traffic for established, bidirectional
connections.
Cisco ASA Series CLI Configuration Guide
1-4
Outbound Access List
ASA
Inside
ACL Inbound
Permit from
any
to
any
209.165.201.4
Static NAT
Access Rules for Returning Traffic, page 1-4
Allowing Broadcast and Multicast Traffic through the Transparent Firewall Using Access Rules,
page 1-5
Management Access Rules, page 1-5
Web Server:
209.165.200.225
Outside
ACL Outbound
Permit HTTP from 10.1.1.14, 10.1.2.67,
and
10.1.3.34
to
209.165.200.225
Deny all others
HR
ACL Inbound
Permit from
any
to
10.1.2.67
209.165.201.6
Static NAT
Chapter 1
Configuring Access Rules
Eng
ACL Inbound
any
Permit from
any
10.1.3.34
Static NAT
to
any
209.165.201.8

Advertisement

Table of Contents
loading

Table of Contents