Examples
The following examples show brief information about the specified access policy in hexadecimal format (ACEs in which the hitcount
is not zero). The first two columns display identifiers in hexadecimal format, the third column lists the hit count, and the
fourth column displays the timestamp value, also in hexadecimal format. The hit count value represents the number of times
the rule has been hit by traffic. The timestamp value reports the time of the last hit. If the hit count is zero, no information
is displayed.
The following is sample output from the
show
access-list
command and shows the access list name “test,” which is applied on an outside interface in the “IN” direction:
ciscoasa# show access-list test
access-list test; 3 elements; name hash: 0xcb4257a3
access-list test line 1 extended permit icmp any any (hitcnt=0) 0xb422e9c2
access-list test line 2 extended permit object-group TELNET-SSH object-group S1 object-group D1 0x44ae5901
access-list test line 2 extended permit tcp 100.100.100.0 255.255.255.0 10.10.10.0 255.255.255.0 eq telnet (hitcnt=1) 0xca10ca21
access-list test line 2 extended permit tcp 100.100.100.0 255.255.255.0 10.10.10.0 255.255.255.0 eq ssh(hitcnt=1) 0x5b704158
The following is sample output from the
show
access-list
command when
object-group-search
is not enabled:
ciscoasa# show access-list KH-BLK-Tunnel
access-list KH-BLK-Tunnel; 9 elements
access-list KH-BLK-Tunnel line 1 extended permit ip object-group KH-LAN object-group BLK-LAN 0x724c956b
access-list KH-BLK-Tunnel line 1 extended permit ip 192.168.97.0 255.255.255.0 192.168.4.0 255.255.255.0 (hitcnt=10) 0x30fe29a6
access-list KH-BLK-Tunnel line 1 extended permit ip 13.13.13.0 255.255.255.0 192.168.4.0 255.255.255.0 (hitcnt=4) 0xc6ef2338
access-list KH-BLK-Tunnel line 1 extended permit ip 192.168.97.0 255.255.255.0 14.14.14.0 255.255.255.0 (hitcnt=2) 0xce8596ec
access-list KH-BLK-Tunnel line 1 extended permit ip 13.13.13.0 255.255.255.0 14.14.14.0 255.255.255.0 (hitcnt=0) 0x9a2f1c4d
access-list KH-BLK-Tunnel line 2 extended permit ospf interface pppoe1 host 87.139.87.200 (hitcnt=0) 0xb62d5832
access-list KH-BLK-Tunnel line 3 extended permit ip interface pppoe1 any (hitcnt=0) 0xa2c9ed34
access-list KH-BLK-Tunnel line 4 extended permit ip host 1.1.1.1 any (hitcnt=0) 0xd06f7e6b
access-list KH-BLK-Tunnel line 5 extended deny ip 1.1.0.0 255.255.0.0 any (hitcnt=0) 0x9d979934
access-list KH-BLK-Tunnel line 6 extended permit ip 1.1.1.0 255.255.255.0 any (hitcnt=0) 0xa52a0761
The following is sample output from the
show
access-list
command when
object-group-search
is enabled:
ciscoasa# show access-list KH-BLK-Tunnel
access-list KH-BLK-Tunnel; 6 elements
access-list KH-BLK-Tunnel line 1 extended permit ip object-group KH-LAN(1) object-group BLK-LAN(2)(hitcount=16) 0x724c956b
access-list KH-BLK-Tunnel line 2 extended permit ospf interface pppoe1 host 87.139.87.200 (hitcnt=0) 0xb62d5832
access-list KH-BLK-Tunnel line 3 extended permit ip interface pppoe1 any (hitcnt=0) 0xa2c9ed34
access-list KH-BLK-Tunnel line 4 extended permit ip host 1.1.1.1 any (hitcnt=0) 0xd06f7e6b
access-list KH-BLK-Tunnel line 5 extended deny ip 1.1.0.0 255.255.0.0 any (hitcnt=0) 0x9d979934
access-list KH-BLK-Tunnel line 6 extended permit ip 1.1.1.0 255.255.255.0 any (hitcnt=0) 0xa52a0761
Starting with 9.22(1), with object group search enabled, the information includes the hexadecimal object ID and the timestamp
for the last hit (if any).
ciscoasa# show access-list
access-list ALPHA line 1 advanced permit ip object-group SOG1 host 5.5.5.5(0xf0050004) (hitcnt=1) (Last Hit=04:38:46 UTC Feb 6 2024) 0x9ee966bb
access-list ALPHA line 1 advanced permit ip v4-object-group SOG1(0xf0000004) host 5.5.5.5(0xf0050004) (hitcnt=1) (Last Hit=04:38:46 UTC Feb 6 2024) 0x13d72f03
The following is sample output from the
show
access-list
brief
command when Telnet traffic is passed:
ciscoasa (config)# sh access-list test brief
access-list test; 3 elements; name hash: 0xcb4257a3
ca10ca21
44ae5901 00000001 4a68aa7e
The following is sample output from the
show
access-list
brief
command when SSH traffic is passed:
ciscoasa (config)# sh access-list test brief
access-list test; 3 elements; name hash: 0xcb4257a3
ca10ca21 44ae5901 00000001 4a68aa7e
5b704158
44ae5901 00000001 4a68aaa9
The following is sample output from the
show
access-list
command and shows the access list name “test,” which is applied on an outside interface in the “IN” direction, with ACL Optimization
enabled:
ciscoasa# show access-list test
access-list test; 3 elements; name hash: 0xcb4257a3
access-list test line 1 extended permit icmp any any (hitcnt=0) 0xb422e9c2
access-list test line 2 extended permit object-group TELNET-SSH object-group S1 object-group D1 0x44ae5901
access-list test line 2 extended permit tcp object-group S1(1) object-group D1(2) eq telnet (hitcnt=1) 0x7b1c1660
access-list test line 2 extended permit tcp object-group S1(1) object-group D1(2) eq ssh (hitcnt=1) 0x3666f922
The following is sample output from the
show
access-list
brief
command when Telnet traffic is passed:
ciscoasa (config)# sh access-list test brief
access-list test; 3 elements; name hash: 0xcb4257a3
7b1c1660
44ae5901 00000001 4a68ab51
The following is sample output from the
show
access-list
brief
command when SSH traffic is passed:
ciscoasa (config)# sh access-list test brief
access-list test; 3 elements; name hash: 0xcb4257a3
7b1c1660 44ae5901 00000001 4a68ab51
3666f922
44ae5901 00000001 4a68ab66
The following example shows the element count, which is the total number of access control entries for all access lists defined
on the system. For access lists that are assigned as access groups, to control access globally or on an interface, you can
reduce the element count by enabling object group search using the
object-group-search
access-control
command. When object group search is enabled, network objects are used in the access control entries; otherwise, the objects
are expanded into the individual IP addresses contained in the objects and separate entries are written for each source/destination
address pair. Thus, a single rule that uses a source network object with 5 IP addresses, and a destination object with 6 addresses,
would expand into 5 * 6 entries, 30 elements rather than one. The higher the element count, the larger the access lists, which
can potentially impact performance.
asa(config)# show access-list element-count
Total number of access-list elements: 33934
Starting with 9.17(1), if you enable object-group search,
additional information is presented about the number of object groups in the rules
(OBJGRP), including the split between source (SRC OBJ) and destination (DST OBJ)
objects, and the added and deleted groups.
ciscoasa/act/ciscoasactx001(config)# show access-list element-count
Total number of access-list elements: 892
OBJGRP SRC OG DST OG ADD OG DEL OG
842 842 842 842 0
In multiple context mode, if you use the element-count
keyword in the system context, the statistics apply to all contexts, summarizing the
count across the systems. If you enable object-group search, the information includes
counts for total access control entries (ACE), objects (OBJGRP), and source (SRC) and
destination (DST) object groups. If object-group search is disabled, the object counts
will always be 0. The following example is for a system context when you have enabled
object-group search.
ciscoasa/act(config)# show access-list element-count
Context Name ACE OBJGRP SRC OG DST OG
system 0 0 0 0
admin 0 0 0 0
ciscoasactx001 892 842 842 842
ciscoasactx002 312 298 298 298
ciscoasactx003 398 306 306 306
ciscoasactx004 162 132 132 132
ciscoasactx005 1280 583 583 583
ciscoasactx006 352 345 345 345
ciscoasactx007 353 351 351 351
ciscoasactx008 348 346 346 346
ciscoasactx009 433 420 420 420
ciscoasactx010 342 340 340 340
ciscoasactx011 363 361 361 361
ciscoasactx012 409 406 406 406
ciscoasactx013 381 373 373 373
ciscoasactx014 332 330 330 330
ciscoasactx015 465 374 374 374
ciscoasactx016 444 316 316 316
ciscoasactx017 284 268 268 268
sciscoasactx018 8837 0 0 0
ciscoasactx019 467 412 412 412
ciscoasactx020 934 527 527 527
ciscoasactx021 415 401 401 401
ciscoasactx022 676 562 562 562
ciscoasactx023 1208 1099 1099 1099
ciscoasactx024 350 322 322 322
ciscoasactx025 638 252 252 252
ciscoasactx026 318 304 304 304
ciscoasactx027 359 308 308 308
ciscoasactx028 1249 1087 1087 1087
ciscoasactx029 451 326 326 326
ciscoasactx030 377 315 315 315
ciscoasactx031 445 418 418 418
ciscoasactx032 347 309 309 309
ciscoasactx033 583 317 317 317
ciscoasactx034 340 311 311 311
ciscoasactx035 350 301 301 301
Total access-list elements in all Context: 25894
The following example shows show access-list internal output.
ciscoasa(config)# show access-list internal
Id Type Count OG-Cnt Permit Trust Deny fwd-ref Mode OGS IOO Name
1 Extended 40682 7086 39632 0 1050 No Config Enabled Enabled IDC_SUPER-VRF999_access_in
2 Extended 5266 1019 5147 0 119 No Config Enabled Enabled OSS_BSS_DMZ-SYS00111_access_in
3 Extended 19 4 16 0 3 No Config Enabled Enabled R4G_UIDAI_ADHAR_access_in
4 Extended 480 72 474 0 6 No Config Enabled Enabled global_access
5 Extended 2 0 2 0 0 No Config Disabled Disabled TCP-Conn
6 Extended 8779 12 8778 0 1 No Config Disabled Disabled LIM_DSS-LIM_DSS-SY00402_access_in
7 Extended 1 0 0 0 1 Yes Config Enabled Enabled test
---------------------------------------------------------
Total 55230 8193 54049 0 1178
The show access-list internal command provides a table with the following information:
-
Id—The index identifier.
-
Type—The ACL type: Extended, Ethertype, Standard.
-
Count—The total number of elements in the ACL.
-
OG-cnt—The number of object groups used in the ACL.
-
Permit—The number of Permit rules in the ACL.
-
Deny—The number of Deny rules in the ACL.
-
AG-fwdref—Yes if the access-group command is configured for an undefined ACL. No if the ACL exists.
-
Mode—How the AC was created: Config means it is directly configured, such as access control rules; Dynamic means is it a dynamic
ACL (DACL)
-
OGS—Whether object-group-search applies for the ACL, Enabled or Disabled. Object-group-search applies for ACL used in access
control (access-group) only.
-
IOO—Whether interface object optimization applies for the ACL, Enabled or Disabled.
-
Name—The name of the ACL.
-
Total—Totals for all ACLs for the numeric columns.