15-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter15 Adding an Extended Access List
Where to Go Next
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.78 host 209.165.201.16
eq www
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.89 host 209.165.201.16
eq www
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.78
eq www
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.78 host 209.165.201.78
eq www
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.89 host 209.165.201.78
eq www
hostname(config)# access-list ACL_IN extended permit ip any any
hostname(config)# access-group ACL_IN in interface inside
If you make two network object groups, one for the inside hosts, and one for the web servers, then the
configuration can be simplified and can be easily modified to add more hosts:
hostname(config)# object-group network denied
hostname(config-network)# network-object host 10.1.1.4
hostname(config-network)# network-object host 10.1.1.78
hostname(config-network)# network-object host 10.1.1.89
hostname(config-network)# object-group network web
hostname(config-network)# network-object host 209.165.201.29
hostname(config-network)# network-object host 209.165.201.16
hostname(config-network)# network-object host 209.165.201.78
hostname(config-network)# access-list ACL_IN extended deny tcp port object-group denied
object-group web eq www
hostname(config)# access-list ACL_IN extended permit ip any any
hostname(config)# access-group ACL_IN in interface inside
Where to Go Next
Apply the access list to an interface. See the “Configuring Access Rules” section on page34-7 for more
information.
Feature History for Extended Access Lists
Table15-2 lists each feature change and the platform release in which it was implemented.
Table15-2 Feature History for Extended Access Lists
Feature Name Releases Feature Information
Extended access lists 7.0(1) Access lists are used to control network access or to specify
traffic for many features to act upon. An extended access
control list is made up of one or more access control entries
(ACE) in which you can specify the line number to insert
the ACE, the source and destination addresses, and,
depending upon the ACE type, the protocol, the ports (for
TCP or UDP), or the IPCMP type (for ICMP).
We introduced the following command: access-list
extended.