22-2
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter22 Adding a StandardACL
Default Settings
Context Mode Guidelines
Supported in single context mode only.
Firewall Mode Guidelines
Supported in routed and transparent firewall modes.
IPv6 Guidelines
Supports IPv6.
Additional Guidelines and Limitations
The following guidelines and limitations apply for standard ACLs:
Standard ACLs identify the destination IP addresses (not source addresses) of OSPF routes and can
be used in a route map for OSPF redistribution. Standard ACLs cannot be applied to interfaces to
control traffic.
When specifying a source, local, or destination address, use the following guidelines:
Use a 32-bit quantity in four-part, dotted-decimal format.
If you add descriptive remarks to your ACL with non-English characters on one platform (such as
Windows) then try to remove them from another platform (such as Linux), you might not be able to
edit or delete them because the original characters might not be correctly recognized. This limitation
is due to an underlying platform dependency that encodes different language characters in different
ways.
Default Settings
Table22-1 lists the default settings for standard ACL parameters.
Using Standard ACLs
Standard ACLs identify the destination IP addresses (not source addresses) of OSPF routes and can be
used in a route map for OSPF redistribution. Standard ACLs cannot be applied to interfaces to control
traffic.
This section includes the following topics:
Adding a Standard ACL, page22-3
Adding an ACE to a Standard ACL, page22-3
Table22-1 Default Standard Access List Parameters
Parameters Default
deny The ASA denies all packets on the originating
interface unless you specifically permit access.
Access list logging generates system log message
106023 for denied packets. Deny packets must be
present to log denied packets.