Examples
Access Rule Specifying Individual Networks
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0
access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
Any |
Permit equivalent |
True |
Access Rule with Network Object Groups
ASA configuration:
access-list acp1 extended permit ip object-group host1 object-group host2
access-group acp1 global
Converts to:
Name |
Domain |
Value (Network) |
Type |
Override |
---|---|---|---|---|
host1 |
None |
obj1 obj2 |
Group |
False |
host2 |
None |
obj3 obj4 |
Group |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
host1 |
host2 |
Any |
Any |
Permit equivalent |
True |
Access Rule Specifying Individual Networks and Ports
ASA access rule:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 5.6.7.0 255.255.255.0 eq 80
access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/32 |
5.6.7.0/32 |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |
Access Rule with Service Object
ASA configuration:
object service servObj1
service tcp destination eq 78
access-list acp1 extended permit object servObj1 any any
access-group acp1 in interface outside
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
servObj1 |
Object |
None |
TCP(6)/78 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
servObj1 |
Permit equivalent |
True |
Access Rule with Service Object Group
ASA configuration:
object-group service legServGroup tcp
port-object eq 78
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 object-group legServGroup
access-group acp1 global
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
legServGroup |
Object |
None |
TCP(6)/78 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
legServGroup |
Permit equivalent |
True |
Access Rule with Nested Service Object Group
ASA configuration:
object-group service legServGroup1 tcp
port-object eq 78
port-object eq 79
object-group service legServGroup2 tcp
port-object eq 80
port-object eq 81
object-group service legacyServiceNestedGrp tcp
group-object legServGroup1
group-object legServGroup2
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 object-group legacyServiceNestedGrp
access-group acp1 global
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
legServGroup1_1 |
Object |
None |
TCP(6)/78 |
False |
legServGroup1_2 |
Object |
None |
TCP(6)/79 |
False |
legServGroup2_1 |
Object |
None |
TCP(6)/80 |
False |
legServGroup2_2 |
Object |
None |
TCP(6)/81 |
False |
legServGroup1 |
Group |
None |
legServGroup1_1 legServGroup1_2 |
False |
legServGroup2 |
Group |
None |
legServGroup2_1 legServGroup2_2 |
False |
Note that the converted configuration does not contain an equivalent for the nested group, legacyServiceNestedGrp, because that group has been flattened.
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
legServGroup1 legServGroup2 |
Permit equivalent |
True |
Access Rule with Nested Extended Service Object Group
ASA configuration:
object service http
service tcp source range 9000 12000 destination eq www
object service http-proxy
service tcp source range 9000 12000 destination eq 8080
object-group service all-http
service-object object http
service-object object http-proxy
object-group service all-httpz
group-object all-http
service-object tcp destination eq 443
access-list acp1 extended permit object-group all-httpz any any
access-group acp1 in interface inside
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
http_src |
Object |
None |
TCP(6)/9000-12000 |
False |
http_dst |
Object |
None |
TCP(6)/80 |
False |
http-proxy_src |
Object |
None |
TCP(6)/9000-12000 |
False |
http-proxy_dst |
Object |
None |
TCP(6)/8080 |
False |
all-httpz-dst |
Group |
None |
TCP(6)/443 |
False |
Note that the converted configuration does not contain an equivalent for the nested group, all-httpz, because that group has been flattened.
Name |
Source Zone |
Dest Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1_1 |
Any |
Any |
Any |
Any |
http_src |
http_dst |
Permit equivalent |
True |
acp1#1_2 |
Any |
Any |
Any |
Any |
http-proxy_src |
http-proxy_dst |
Permit equivalent |
True |
acp1#1_3 |
Any |
Any |
Any |
Any |
Any |
all-httpz-dst |
Permit equivalent |
True |
Access Rule with Service Object Using "gt" and "neq" Operators
ASA configuration:
object service testOperator
service tcp source gt 100 destination neq 200
access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testOperator_src |
Object |
None |
TCP(6)/101-65535 |
False |
testOperator_dst_1 |
Object |
None |
TCP(6)/1-199 |
False |
testOperator_dst_2 |
Object |
None |
TCP(6)/201-65535 |
False |
testOperator_dst |
Group |
None |
testOperator_dst_1, testOperator_dst_2 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
testOperator_src |
testOperator_dst |
Permit equivalent |
True |
Access Rule with Security Objects Using "lt" and "gt" Operators
ASA configuration:
object service testOperator
service tcp source gt 100 destination lt 200
access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testOperator_src |
Object |
None |
TCP(6)/101-65535 |
False |
testOperator_dst |
Object |
None |
TCP(6)/1-199 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
testOperator_src |
testOperator_dst |
Permit equivalent |
True |
Access Rule with TCP Service Object Using "eq" Operator and Port Literal Values
ASA configuration:
object service svcObj1
service tcp source eq telnet destination eq ssh
access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
svcObj1_src |
Object |
None |
TCP(6)/21 |
False |
svcObj1_dst |
Object |
None |
TCP(6)/22 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
svcObj1_src |
svcObj1_dst |
Permit equivalent |
True |
Access Rule with ICMP Service Object
ASA configuration:
object-group service icmpObj
service-object icmp echo-reply 8
access-list acp1 extended permit object icmpObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
icmpObj |
Object |
None |
ICMP(1)/Echo reply |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
icmpObj |
Permit equivalent |
True |
Access Rule with protocol Service Object
ASA configuration:
object-group protocol testProtocol
protocol-object tcp
access-list acp1 extended permit object testProtocol any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testProtocol |
Object |
None |
TCP(6) |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
testProtocol |
Permit equivalent |
True |
Access Rule with Extended Service Object (Source Only)
ASA configuration:
object service serviceObj
service tcp source eq 300
service tcp source eq 800
access-list acp1 extended permit object serviceObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
serviceObj_src_1 |
Object |
None |
TCP(6)/300 |
False |
serviceObj_src_2 |
Object |
None |
TCP(6)/800 |
False |
serviceObj |
Group |
None |
serviceObj_src_1 serviceObj_src_2 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
serviceObj |
Permit equivalent |
True |
Access Rule with Extended Service Object (Source and Destination)
ASA configuration:
object service serviceObj
service tcp source eq 300 destination eq 400
access-list acp1 extended permit tcp object serviceObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
serviceObj_src |
Object |
None |
TCP(6)/300 |
False |
serviceObj_dst |
Object |
None |
TCP(6)/400 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
serviceObj_src |
serviceObj_dst |
Permit equivalent |
True |
Access Rule with Port Argument Operator "neq" in Source Port
ASA configuration:
access-list acp1 extended permit tcp any neq 300
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
1-299, 301-65535 |
Any |
Permit equivalent |
True |
Access Rule with Port Argument Operator "neq" in Source and Destination Ports
ASA configuration:
access-list acp1 extended permit tcp any neq 300 any neq 400
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1_1 |
Any |
Any |
Any |
Any |
1-299 |
1-399 |
Permit equivalent |
True |
acp1#1_2 |
Any |
Any |
Any |
Any |
301-65535 |
1-399 |
Permit equivalent |
True |
acp1#1_3 |
Any |
Any |
Any |
Any |
1-299 |
401-65535 |
Permit equivalent |
True |
acp1#1_4 |
Any |
Any |
Any |
Any |
301-65535 |
401-65535 |
Permit equivalent |
True |
Inactive Access Rule
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 inactive
access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
Any |
Permit equivalent |
False |
Access Control List Applied to Inbound Traffic
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 any eq 80
access-group acp1 in inside
Converts to:
Name |
Interface Type |
Domain |
Selected Interfaces |
---|---|---|---|
acp1_inside_in_zone |
|
None |
Any |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
acp1_inside_in_zone |
Any |
3.4.5.0/24 |
Any |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |
Access Control List Applied to Outbound Traffic
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 any eq 80
access-group acp1 out outside
Converts to:
Name |
Interface Type |
Domain |
Selected Interfaces |
---|---|---|---|
acp1_outside_out_zone |
|
None |
Any |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
acp1_outside_out_zone |
Any |
3.4.5.0/24 |
Any |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |