Solved

Adding new access list to Cisco ASA 5510

Posted on 2014-02-18
1
583 Views
Last Modified: 2014-03-15
I have a Cisco ASA 5510 which has existing access lists.  I need to add new access lists allowing traffic to 192.168.1.12 for port UDP 4500 and TCP 53.  How can I add these without affecting the other access lists?

I will need a detailed example.  Thanks
0
Comment
Question by:wayy2be
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
ffleisma earned 500 total points
ID: 39869516
can you provide the following show commands for us to provide exact configuration to put in place

show run | inc access-group
show run | inc access_in
show ip

for the particular ACL you are adding, is this incoming to the inside interface?

assuming traffic is incoming to inside interface, you'll have to put in something like this:

access-list inside_access_in extended permit udp any host 192.168.1.12 eq 4500
access-list inside_access_in extended permit tcp any host 192.168.1.12 eq 53

if you can share your configuration we can help you out to something more specific to what you are trying to achieve. hope this helps!
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question