2-10
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 2 Objects for Access Control
Monitoring Objects
Examples
The following is an example of an absolute time range beginning at 8:00 a.m. on January 1, 2006.
Because no end time and date are specified, the time range is in effect indefinitely.
hostname(config)#
time-range for2006
hostname(config-time-range)#
absolute start 8:00 1 january 2006
The following is an example of a weekly periodic time range from 8:00 a.m. to 6:00 p.m on weekdays:
hostname(config)#
time-range workinghours
hostname(config-time-range)#
periodic weekdays 8:00 to 18:00
The following example establishes an end date for the time range, and sets a weekday period from 8 a.m.
to 5 p.m., plus different hours after 5 for Monday, Wednesday, Friday compared to Tuesday, Thursday.
asa4(config)#
time-range contract-A-access
asa4(config-time-range)#
absolute end 12:00 1 September 2025
asa4(config-time-range)#
periodic weekdays 08:00 to 17:00
asa4(config-time-range)#
periodic Monday Wednesday Friday 18:00 to 20:00
asa4(config-time-range)#
periodic Tuesday Thursday 17:30 to 18:30
Monitoring Objects
To monitor objects and groups, enter the following commands:
•
show access-list
Displays the access list entries. Entries that include objects are also expanded out into individual
entries based on the object contents.
•
show running-config object
[
id
object_id
]
Displays all current objects. Use the
id
keyword to view a single object by name.
•
show running-config object
object_type
Displays the current objects by their type,
network
or
service
.
•
show running-config object-group
[
id
group_id
]
Displays all current object groups. Use the
id
keyword to view a single object group by name.
•
show running-config object-group
grp_type
Displays the current object groups by their group type.
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......