<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM and security levels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709252#M1025797</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that's correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 17 Feb 2007 04:40:07 GMT</pubDate>
    <dc:creator>daviddtran</dc:creator>
    <dc:date>2007-02-17T04:40:07Z</dc:date>
    <item>
      <title>FWSM and security levels</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709249#M1025794</link>
      <description>&lt;P&gt;I'm hoping someone can clarify a difference that I'm seeing between the PIX 6.x and FWSM 3.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assume a 3 interface firewall (outside,inside,dmz) with no address translation going on at all. The inside has the highest security level, the dmz is lower, and the outside is 0. With 6.x, to allow connections from lower to higher interfaces I would configure a static and use an access list to permit the desired traffic (along with a nat 0  statement for the inside and dmz).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now assume a FWSM running 3.1.3 (routed context) using the same configuration as above. I understand that NAT statements in this case are no longer needed. It would also appear that I no longer need a static either, and connections between security levels (even lower to higher) seem to be solely controlled by access lists. I'm attaching the config of a FWSM context that I used for testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this test config I purposely set the security level of the Inside to be lower then the DMZ, unless I modify the inside_in access-list to prevent it, the FWSM happily allows connections from lower to higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused that the security levels don't seem to be preventing traffic by default. If someone could confirm if this is proper behavior for the FWSM that would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709249#M1025794</guid>
      <dc:creator>KENT EITZMANN</dc:creator>
      <dc:date>2019-03-11T09:34:43Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM and security levels</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709250#M1025795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fwsm 3.1(3) and 7.x is behaved this way by &lt;/P&gt;&lt;P&gt;default.  By default, "no nat-control" is &lt;/P&gt;&lt;P&gt;enabled, unless you decide to disable it with&lt;/P&gt;&lt;P&gt;"nat-control".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, the FWSM is operating in "routed" &lt;/P&gt;&lt;P&gt;in your configuration.  Because you are NOT&lt;/P&gt;&lt;P&gt;doing any static NAT, traffics are controlled&lt;/P&gt;&lt;P&gt;by your ACL which they are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2007 00:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709250#M1025795</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-17T00:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM and security levels</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709251#M1025796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. So, if I'm not using address translation and follow these steps with the FWSM I will be Ok ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- no nat-control&lt;/P&gt;&lt;P&gt;- no nat0 statements&lt;/P&gt;&lt;P&gt;- no static statements&lt;/P&gt;&lt;P&gt;- control packet flow with access lists&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2007 03:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709251#M1025796</guid>
      <dc:creator>KENT EITZMANN</dc:creator>
      <dc:date>2007-02-17T03:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM and security levels</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709252#M1025797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that's correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2007 04:40:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-and-security-levels/m-p/709252#M1025797</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-17T04:40:07Z</dc:date>
    </item>
  </channel>
</rss>

