EasyManuals Logo
Home>Cisco>Network Hardware>ASA Series

Cisco ASA Series User Manual

Cisco ASA Series
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #562 background imageLoading...
Page #562 background image
1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Adding an Extended Access Control List
Default Settings
Default Settings
Table 1-1 lists the default settings for extended ACL parameters.
Configuring Extended ACLs
This section shows how to add ACEs of various types to an ACL and includes the following topics:
Adding an ACE for IP Address or Fully Qualified Domain Name-Based Policy, page 1-4
Adding an ACE for TCP or UDP-Based Policy, with Ports, page 1-6
Adding an ACE for ICMP-Based Policy, with ICMP Type, page 1-7
Adding an ACE for User-Based Policy (Identity Firewall), page 1-7
Adding an ACE for Security Group-Based Policy (TrustSec), page 1-8
Adding Remarks to ACLs, page 1-9
Adding an ACE for IP Address or Fully Qualified Domain Name-Based
Policy
This section lets you control traffic based on IP addresses or fully qualified domain names (FQDNs). An
ACL is made up of one or more access control entries (ACEs) with the same ACL ID. To create an ACL
you start by creating an ACE and applying a list name. An ACL with one entry is still considered a list,
although you can add multiple entries to the list.
Prerequisites
(Optional) Create network objects or object groups according to the “Configuring Network Objects and
Groups” section on page 1-2. Objects can contain an IP address (host, subnet, or range) or an FQDN.
Object groups contain multiple objects or inline entries.
Guidelines
To delete an ACE, enter the no access-list command with the entire command syntax string as it appears
in the configuration. To remove the entire ACL, use the clear configure access-list command.
Table 1-1 Default Extended ACL Parameters
Parameters Default
ACE logging ACE logging generates system log message
106023 for denied packets. A deny ACE must be
present to log denied packets.
log When the log keyword is specified, the default
level for system log message 106100 is 6
(informational), and the default interval is 300
seconds.

Table of Contents

Other manuals for Cisco ASA Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA Series and is the answer not in the manual?

Cisco ASA Series Specifications

General IconGeneral
BrandCisco
ModelASA Series
CategoryNetwork Hardware
LanguageEnglish

Related product manuals