![standard access acl packet tracer activity 1 standard access acl packet tracer activity 1](https://itexamanswers.net/wp-content/uploads/2018/05/2018-05-07_104941.jpg)
In id=0x7f51499fc4f0, priority=0, domain=inspect-ip-options, deny=true Hits=640, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 In id=0x7f514980bc90, priority=70, domain=qos-per-class, deny=false In id=0x7f51499a4690, priority=0, domain=inspect-ip-options, deny=true
![standard access acl packet tracer activity 1 standard access acl packet tracer activity 1](https://itexamanswers.net/wp-content/uploads/2021/02/26.2.1-2021-07-13_161552.jpg)
Hits=638, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
![standard access acl packet tracer activity 1 standard access acl packet tracer activity 1](https://ccna-200-301.online/wp-content/uploads/2020/09/Apply-a-Numbered-Extended-IPv4-ACL.png)
In id=0x7f51495dca10, priority=1, domain=nat-per-session, deny=true Object-group network SSH_Server (this is basically a Linux Machine)Īccess-list inside-out extended permit tcp object-group inside object-group SSH_Server eq sshĪccess-group inside-out out interface insideĪlthough in the ACL is allows only ssh trafficĪSAv# packet-trace input inside tcp 192.168.200.10 1024 4.2.2.2 10000 detailedįound next-hop 202.110.0.2 using egress ifc Outside I was wondering what is the logic used to apply access-group to an Interface in ASA.