[Webinar] Learn how to a build a cloud-first strategyRegister Now


ASA5520 -- Which is more CPU intensive?  Deny ACLs or Object-groups?

Posted on 2008-11-07
Medium Priority
Last Modified: 2012-08-14
I need to block all traffic entering our network from an MPLS interface destined to a handful of "protected" subnets (mostly RFC 1918) but allow it out the Internet interface...Which of these is least cpu intensive, or is there perhaps a better way to do this?

1)  Make an object-group that contains all of the subnets I want to allow traffic to (all non-RFC 1918 addresses) and let the implicity deny at the end handle blocking traffic to the "protected" subnets, or
2)  Make an object-group that contains all of the RFC 1918 subnets and place an explicit deny ACL above the "permit any any" ACLs?

....also....is it generally better to use object-groups or separate ACLs, strictly from a performance perspective?

 (5)               |                 (0)

security-levels in ():

Question by:j4llen

Author Comment

ID: 22909435
I just realized what a stupid question this is -- I can much more easily filter out the blocks I want to deny than allow all the blocks in between....I just don't like the idea of Deny ACLs since their placement in the ACL stack matters, and its easy for somebody to miss something later down the road....I guess I was wondering if there's a better way to do what I'm trying to do....

anyways, I'll keep this open to answer that and my other question:

is it generally better to use object-groups or separate ACLs, strictly from a performance perspective?
LVL 79

Accepted Solution

lrmoore earned 2000 total points
ID: 22912309
Personally, I like using object groups because you can add/remove individual networks/hosts with a couple mouse clicks without having to re-create the access-list each time.
Yes, placement matters, but you only have to place it once using a group.
unless you have hundreds of entries, I wouldn't worry about CPU on the 5520. It can take it and not even breath hard.

Featured Post

Prep for the ITIL® Foundation Certification Exam

December’s Course of the Month is now available! Enroll to learn ITIL® Foundation best practices for delivering IT services effectively and efficiently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We sought a budget ($5,000) firewall solution that would provide all the performance we needed with no single point of failure.  Hosting a SAAS web application in our datacenter, it was critical that we find a way to keep connectivity up and inbound…
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Want to learn how to record your desktop screen without having to use an outside camera. Click on this video and learn how to use the cool google extension called "Screencastify"! Step 1: Open a new google tab Step 2: Go to the left hand upper corn…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question