Cisco FirePOWER ASA 5500 series Configuration Manual page 272

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 16
Identifying Traffic with Access Lists
Access List Overview
If you want to allow an outside host to access an inside host, you can apply an inbound access list on the
outside interface. You need to specify the translated address of the inside host in the access list because
that address is the address that can be used on the outside network (see
Figure
16-2).
Figure 16-2
IP Addresses in Access Lists: NAT used for Destination Addresses
209.165.200.225
ACL
Permit from
209.165.200.225
to
209.165.201.5
Outside
Inside
10.1.1.34
209.165.201.5
Static NAT
See the following commands for this example:
hostname(config)# access-list OUTSIDE extended permit ip host 209.165.200.225 host
209.165.201.5
hostname(config)# access-group OUTSIDE in interface outside
Cisco Security Appliance Command Line Configuration Guide
16-4
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents