Solved

Cisco Firewall Access List Delete

Posted on 2010-11-09
4
1,312 Views
Last Modified: 2012-05-10
Is there a way that I can delete all the access lists on a cisco pix, asa and FWSM that have a zero hit count?  Or to print out the entries that have a zero hit count?  

Right now if i do a show access-list it will show me the hitcount="X", but on the rules with groups, it lists the source and / or destination group name then lists all the members below it broken out.

Thanks

Don
0
Comment
Question by:dhrehor
4 Comments
 
LVL 17

Accepted Solution

by:
Kvistofta earned 250 total points
Comment Utility
There is no automatic way of deleting zero hitcounts acl-lines. However, you could use this command to show acl-lines with "hitcnt=0":show access-list | incl hitcnt=0/Kvistofta
0
 
LVL 34

Assisted Solution

by:Istvan Kalmar
Istvan Kalmar earned 250 total points
Comment Utility
after that you deleted the the ACL you need 'clear xlate'
0
 
LVL 68

Expert Comment

by:Qlemo
Comment Utility
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now