Cisco Systems ASA 5580 Manual De Usuario

Descargar
Página de 712
 
6-11
Cisco ASA Series Firewall CLI Configuration Guide
 
Chapter 6      Configuring Access Rules
  Feature History for Access Rules
hostname (config-service)# service-object tcp source range 2000 3000
hostname (config-service)# service-object tcp source range 3000 3010 destinatio$
hostname (config-service)# service-object ipsec
hostname (config-service)# service-object udp destination range 1002 1006
hostname (config-service)# service-object icmp echo
ciscoasa(config)# access-list outsideacl extended permit object-group myaclog interface 
inside any
Feature History for Access Rules
 lists each feature change and the platform release in which it was implemented.
Table 6-2
Feature History for Access Rules
Feature Name
Platform 
Releases
Feature Information
Interface access rules
7.0(1)
Controlling network access through the ASA using ACLs.
We introduced the following command: access-group.
Global access rules
8.3(1)
Global access rules were introduced.
We modified the following command: access-group.
Support for Identity Firewall
8.4(2)
You can now use identity firewall users and groups for the 
source and destination. You can use an identity firewall 
ACL with access rules, AAA rules, and for VPN 
authentication.
We modified the following commands: access-list 
extended
.
EtherType ACL support for IS-IS traffic
8.4(5), 9.1(2)
In transparent firewall mode, the ASA can now pass IS-IS 
traffic using an EtherType ACL.
We modified the following command: access-list ethertype 
{permit | denyis-is.
Support for TrustSec
9.0(1)
You can now use TrustSec security groups for the source 
and destination. You can use an identity firewall ACL with 
access rules.
We modified the following commands: access-list 
extended
.