cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1840
Views
0
Helpful
4
Replies

ASA Access-group

noobieee7
Level 1
Level 1

Hi All,

For ASA, is there any standard or a need of having a in and out access-group for each inside or outside interface, or is it base on situation and requirement?

Regards,

Lawrence

2 Accepted Solutions

Accepted Solutions

Jon Marshall
Hall of Fame
Hall of Fame

noobieee7 wrote:

Hi All,

For ASA, is there any standard or a need of having a in and out access-group for each inside or outside interface, or is it base on situation and requirement?

Regards,

Lawrence

Lawrence

It is based purely on situation and requirement. Inbound access-lists are by far the most commonly used but i have had situations in the past where an outbound acl has been very useful.

Jon

View solution in original post

Kureli Sankar
Cisco Employee
Cisco Employee

Mostly people only apply acl "IN" on an interface.  We have seen cases where people apply acl IN and OUT on the same interface by mistake.

In some cases there as been a requirement. Like for example you have inside, dmz and outside.  You manage inside and outside interface acl but another team manages the dmz acl.  They allow everything on their interface but, you want to control what leaves the outside interface so, you can apply an acl OUT on the outside interface.

So, it depeds on the requirement.

-KS

View solution in original post

4 Replies 4

Jon Marshall
Hall of Fame
Hall of Fame

noobieee7 wrote:

Hi All,

For ASA, is there any standard or a need of having a in and out access-group for each inside or outside interface, or is it base on situation and requirement?

Regards,

Lawrence

Lawrence

It is based purely on situation and requirement. Inbound access-lists are by far the most commonly used but i have had situations in the past where an outbound acl has been very useful.

Jon

Kureli Sankar
Cisco Employee
Cisco Employee

Mostly people only apply acl "IN" on an interface.  We have seen cases where people apply acl IN and OUT on the same interface by mistake.

In some cases there as been a requirement. Like for example you have inside, dmz and outside.  You manage inside and outside interface acl but another team manages the dmz acl.  They allow everything on their interface but, you want to control what leaves the outside interface so, you can apply an acl OUT on the outside interface.

So, it depeds on the requirement.

-KS

vilaxmi
Cisco Employee
Cisco Employee

Hello,

I would agree with above replies. Just to add, I would like to mention that on an interface you can apply one ACL per direction. Also please keep in mind mMore the number of ACLs more the packet processing done at each ifc in ASA.

Thanks

Vijaya

Ganesh Hariharan
VIP Alumni
VIP Alumni

Hi All,

For ASA, is there any standard or a need of having a in and out access-group for each inside or outside interface, or is it base on situation and requirement?

Regards,

Lawrence

Hi Lawrence,

Genrally it depends on the situation as good practices we used to do inbound acl with traffic flow coming inside to device in in direction.

HTH

Regards

Ganesh.H

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card