34-10
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter34 Configuring Access Rules
Feature History for Access Rules
Feature History for Access Rules
Table34-2 lists each feature change and the platform release in which it was implemented.
Table34-2 Feature History for Access Rules
Feature Name
Platform
Releases Feature Information
Interface access rules 7.0(1) Controlling network access through the ASA using access
lists.
We introduced the following command: access-group.
Global access rules 8.3(1) Global access rules were introduced.
We modified the following command: access-group.
Support for Identity Firewall 8.4(2) You can now use identity firewall users and groups for the
source and destination. You can use an identity firewall
ACL with access rules, AAA rules, and for VPN
authentication.
We modified the following commands: access-list
extended.
EtherType ACL support for IS-IS traffic
(transparent firewall mode)
8.4(5) In transparent firewall mode, the ASA can now pass IS-IS
traffic using an EtherType ACL.
We modified the following command: access-list ethertype
{permit | deny} is-is.
Not available in Version 8.5(1), 8.6(1), or 9.0(1).