
15-3
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 15 Permitting or Denying Network Access
Inbound and Outbound Access List Overview
Then, if you want to allow only certain hosts on the inside networks to access a web server on the outside
network, you can create a more restrictive access list that allows only the specified hosts and apply it to
the outbound direction of the outside interface (see Figure 15-1). See the “IP Addresses Used for Access
Lists When You Use NAT” section on page 13-7 for information about NAT and IP addresses. The
outbound access list prevents any other hosts from reaching the outside network.
Figure 15-2 Outbound Access List
See the following commands for this example:
hostname(config)# access-list INSIDE extended permit ip any any
hostname(config)# access-group INSIDE in interface inside
hostname(config)# access-list HR extended permit ip any any
hostname(config)# access-group HR in interface hr
hostname(config)# access-list ENG extended permit ip any any
hostname(config)# access-group ENG in interface eng
hostname(config)# access-list OUTSIDE extended permit tcp host 209.165.201.4
host 209.165.200.225 eq www
hostname(config)# access-list OUTSIDE extended permit tcp host 209.165.201.6
host 209.165.200.225 eq www
hostname(config)# access-list OUTSIDE extended permit tcp host 209.165.201.8
host 209.165.200.225 eq www
hostname(config)# access-group OUTSIDE out interface outside
Web Server:
209.165.200.225
Inside
HR
Eng
Outside
Static NAT
209.165.201.410.1.1.14
Static NAT
209.165.201.610.1.2.67
Static NAT
209.165.201.810.1.3.34
ACL Outbound
Permit HTTP from 209.165.201.4, 209.165.201.6,
and 209.165.201.8 to 209.165.200.225
Deny all others
132210
ACL Inbound
Permit from any to any
ACL Inbound
Permit from any to any
ACL Inbound
Permit from any to any
Security
appliance
Comentarios a estos manuales