<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Level Cisco 5506x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303701#M1004552</link>
    <description>&lt;P&gt;I'm configuring my firewall using FDM (Firepower Device Manager) by typing my management IP address in browser https://MgmtIP&lt;/P&gt;
&lt;P&gt;And yes, i'm able to ping 8.8.8.8 from my firewall i test by taking SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured a default route which is pointing towards ISP&lt;/P&gt;
&lt;P&gt;I have configured NAT rule which is translating my inside IP addresses to outside&lt;/P&gt;
&lt;P&gt;I have configured ACL which is allowing inside interface traffic to any destination.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Dec 2017 05:10:59 GMT</pubDate>
    <dc:creator>shehrozceh</dc:creator>
    <dc:date>2017-12-29T05:10:59Z</dc:date>
    <item>
      <title>Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303092#M1004548</link>
      <description>&lt;P&gt;I'm configuring interfaces by GUI in Cisco 5506x but i'm unable to configure security level for specific interface. I have two interfaces in up/up states and both are configured with security level 0. I just want to configure my inside interface with security level 100 so my internet traffic will be passed by default from higher to lower security level.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have no command in CLI to configure security level but when i hit show running-config or show nameif so these commands are shown me required information with security level 0 but i'm unable to configure even through GUI.&lt;/P&gt;
&lt;P&gt;I'm running FTD 6.1.0 Build 330 and this commands are accessible after (firepower login:)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303092#M1004548</guid>
      <dc:creator>shehrozceh</dc:creator>
      <dc:date>2020-02-21T15:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303141#M1004549</link>
      <description>&lt;P&gt;FTD doesn't use security level as ASA does, but rather it uses security zones.&amp;nbsp; When you issue the show nameif command you should see that all interfaces have security-level 0.&amp;nbsp; This is because this is the most restrictive level and all other access should manually be configured.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 07:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303141#M1004549</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-12-28T07:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303342#M1004550</link>
      <description>&lt;P&gt;Alright i got it. But, i have configured manually the NAT and ACL policy but my internet traffic isn't pass through firewall. I had removed ACL entry and only configured NAT rule because initial traffic is allowed by default. Also i created two security zones 1. Inside 2. outside but i'm unable to allow my internet traffic and i'm doing all of this task by using GUI.&lt;/P&gt;
&lt;P&gt;Can you please give an example about how to allow internet traffic using my firepower.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 12:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303342#M1004550</guid>
      <dc:creator>shehrozceh</dc:creator>
      <dc:date>2017-12-28T12:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303344#M1004551</link>
      <description>&lt;P&gt;of course you are using GUI since Firepower doesn't allow configuration from CLI. But are you using FMC or ASDM?&lt;/P&gt;
&lt;P&gt;So, you are just trying to get traffic from inside to outside (internet)? are you able to ping 8.8.8.8 from the FTD?&lt;/P&gt;
&lt;P&gt;You need the following to get this to work:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;a default route pointing towards your ISP router&lt;/LI&gt;
&lt;LI&gt;a hide NAT statement translating your inside IP to the outside interface IP (remember to assosiate the NAT policy with the device as this is not done by default)&lt;/LI&gt;
&lt;LI&gt;Access control policy with a rule allowing traffic from the inside to any destination on all ports&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 28 Dec 2017 13:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303344#M1004551</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-12-28T13:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303701#M1004552</link>
      <description>&lt;P&gt;I'm configuring my firewall using FDM (Firepower Device Manager) by typing my management IP address in browser https://MgmtIP&lt;/P&gt;
&lt;P&gt;And yes, i'm able to ping 8.8.8.8 from my firewall i test by taking SSH.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured a default route which is pointing towards ISP&lt;/P&gt;
&lt;P&gt;I have configured NAT rule which is translating my inside IP addresses to outside&lt;/P&gt;
&lt;P&gt;I have configured ACL which is allowing inside interface traffic to any destination.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Dec 2017 05:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303701#M1004552</guid>
      <dc:creator>shehrozceh</dc:creator>
      <dc:date>2017-12-29T05:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Level Cisco 5506x</title>
      <link>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303750#M1004554</link>
      <description>&lt;P&gt;have you checked the log events?&lt;/P&gt;
&lt;P&gt;You could also ssh to the FTD and run system support firewall-engine-debug between your PC inside IP and an external IP (client and server). and see if there is a drop action being performed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from CLI if you issue the command show running-config policy-map, is inspect icmp configured there?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Dec 2017 07:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-level-cisco-5506x/m-p/3303750#M1004554</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-12-29T07:39:14Z</dc:date>
    </item>
  </channel>
</rss>

