Cisco ASA Firewall Access Rules and Management Access Rules Access Control Lists

แชร์
ฝัง

ความคิดเห็น • 11

  • @Chill_Pilgrim
    @Chill_Pilgrim 5 ปีที่แล้ว +3

    Finally! I get Inbound vs Outbound for ASA!

  • @LikeWeDidOutdoors
    @LikeWeDidOutdoors 5 ปีที่แล้ว

    great vid mate thanks for sharing, my first day working with ASDM and this is helping me find my feet.

  • @cyberpsych1
    @cyberpsych1 7 ปีที่แล้ว

    Dude, you are soooo English!!! :-) I just don't have the accent (grew up in the UK when I was younger). Excellent explanations by the way...

  • @SH-os1ck
    @SH-os1ck 5 ปีที่แล้ว

    Thank you. This was very good!

  • @flibbertigibbet6200
    @flibbertigibbet6200 ปีที่แล้ว

    Mate awesome video, thanks

  • @billybecker3112
    @billybecker3112 9 ปีที่แล้ว

    With ACL's, I am trying to allow an inside network to a AnyConnect VPN IP for port 443, that does not seem to be tied to ACL's or at least everything I've tried has not worked. Any ideas where this is covered?

  • @PUNEETHAH
    @PUNEETHAH 9 ปีที่แล้ว

    can you please guide me to make one system to access from outside the our network,my configuration like one D-link Modem ,modem was connected to cisco firewal ,in firewall one interface connected to modem and another interface was connected to local lan ,so i nned to access local lan pc from outside the our network means i need to access from internet ,can u please help me

  • @keefa79
    @keefa79 10 ปีที่แล้ว

    do you know how can configure one way connection using ASA5500 Series ?

    • @JaferSabir
      @JaferSabir  10 ปีที่แล้ว +1

      Create a rule on the inside interface. Just to note, the rules are stateful so the ASA will remember the state of the connection and allow it back in. If this is not desired then I believe you can create one way access lists from the ASA which do not remember the state of a particular connection.

  • @brookchelmo1573
    @brookchelmo1573 4 ปีที่แล้ว

    This was like 6 run-on sentences.