ASDM Book 1: Cisco ASA Series General Operations ASDM Configuration Guide, 7.1
Adding a Standard Access List
Downloads: This chapterpdf (PDF - 192.0KB) The complete bookPDF (PDF - 20.37MB) | The complete bookePub (ePub - 6.37MB) | The complete bookMobi (Mobi - 8.31MB) | Feedback

Table of Contents

Adding a Standard Access Control List

Information About Standard ACLs

Licensing Requirements for Standard ACLs

Guidelines and Limitations

Default Settings

Adding Standard ACLs

Using Standard ACLs

Adding a Standard ACL

Adding an ACE to a Standard ACL

Editing an ACE in a Standard ACL

Feature History for Standard ACLs

Adding a Standard Access Control List

This chapter describes how to configure a standard ACL and includes the following sections:

Information About Standard ACLs

Standard ACLs identify the destination IP addresses of OSPF routes and can be used in a route map for OSPF redistribution. Standard ACLs cannot be applied to interfaces to control traffic.

Licensing Requirements for Standard ACLs

The following table shows the licensing requirements for this feature:

 

Model
License Requirement

All models

Base License.

Guidelines and Limitations

This section includes the guidelines and limitations for this feature:

Context Mode Guidelines

Supported in single context mode only.

Firewall Mode Guidelines

Supported in routed and transparent firewall modes.

IPv6 Guidelines

Supports IPv6.

Additional Guidelines and Limitations

The following guidelines and limitations apply for standard ACLs:

  • Standard ACLs identify the destination IP addresses (not source addresses) of OSPF routes and can be used in a route map for OSPF redistribution. Standard ACLs cannot be applied to interfaces to control traffic.
  • When specifying a source, local, or destination address, use the following guidelines:

Use a 32-bit quantity in four-part, dotted-decimal format.

  • If you add descriptive remarks to your ACL with non-English characters on one platform (such as Windows) then try to remove them from another platform (such as Linux), you might not be able to edit or delete them because the original characters might not be correctly recognized. This limitation is due to an underlying platform dependency that encodes different language characters in different ways.

Default Settings

Table 22-1 lists the default settings for standard ACL parameters.

 

Table 22-1 Default Standard ACL Parameters

Parameters
Default

deny

The ASA denies all packets on the originating interface unless you specifically permit access.

ACL logging generates system log message 106023 for denied packets. Deny packets must be present to log denied packets.

Adding Standard ACLs

This section includes the following topics:

Using Standard ACLs

Standard ACLs identify the destination IP addresses (not source addresses) of OSPF routes and can be used in a route map for OSPF redistribution. Standard ACLs cannot be applied to interfaces to control traffic.

This section includes the following topics:

Adding a Standard ACL

To add a standard ACL to your configuration, perform the following steps:


Step 1 Choose Configuration > Firewall > Advanced > Standard ACL.

Step 2 Click Add , and from the drop-down list, choose Add ACL .

Step 3 In the Add ACL dialog box, add a name or number (without spaces) to identify the ACL.

Step 4 Click OK.

The ACL name appears in the main pane.

You may add additional ACLs.

Step 5 Click Apply to save the ACLs to your configuration.

You can now add one or more ACEs to the newly created ACL.

To add an ACE, see the “Adding an ACE to a Standard ACL” section.


 

Adding an ACE to a Standard ACL

Before you can add an ACE to a configuration, you must first add an ACL. For information about adding a standard ACL, see the “Adding a Standard ACL” section. For information about editing ACEs, see the “Editing an ACE in a Standard ACL” section

To add an ACE to an ACL that exists in your configuration, perform the following steps:


Step 1 Choose Configuration > Firewall > Advanced > Standard ACL.

Step 2 In the main pane, select the ACL for which you want to add an ACE.

Step 3 Click Add , and choose Add ACE from the drop-down list.

The Add ACE dialog box appears.

Step 4 (Optional) To specify the placement of the new ACE, select an existing ACE, and click Insert... to add the ACE before the selected ACE, or click Insert After... to add the ACE after the selected ACE.

Step 5 Click one of the following radio buttons to choose an action:

    • Permit —Permits access if the conditions are matched.
    • Deny —Denies access if the conditions are matched.

Step 6 In the Address field, enter the IP address of the destination to which you want to perform or deny access.

You can also browse for the address of a network object by clicking the ellipsis at the end of the Address field.

Step 7 (Optional) In the Description field, enter a description that makes an ACE easier to understand.

The description can contain multiple lines; however, each line can be no more than 100 characters in length.

Step 8 Click OK .

The newly created ACE appears under the ACL.

Step 9 Click Apply to save the ACE to your configuration.


 

Editing an ACE in a Standard ACL

To edit an ACE in a standard ACL, perform the following steps:


Step 1 Choose Configuration > Firewall > Advanced > Standard ACL.

Step 2 In the main pane, select the existing ACE that you want to edit.

Step 3 Click Edit.

The Edit ACE dialog box appears.

Step 4 Enter the desired changes.

Step 5 Click OK .


 

Feature History for Standard ACLs

Table 22-2 lists the release history for this feature.

 

Table 22-2 Feature History for Standard ACLs

Feature Name
Releases
Feature Information

Standard ACLs

7.0(1)

Standard ACLs identify the destination IP addresses of OSPF routes, which can be used in a route map for OSPF redistribution.

The feature was introduced.