<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA and enable traffic between two interfaces with same security level in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-enable-traffic-between-two-interfaces-with-same-security/m-p/3324942#M1064239</link>
    <description>&lt;P&gt;I have multiple DMZ servers in seperate interfaces on my ASA with the same security level defined. I notice that if I do not check the box "enable traffic between two interfaces with same security level", then I cannot communicate between two servers in the seperate interfaces even if I have an ACL rule allowing them to communicate. Do you still have to have an ACL defined in order for these to communicate even if you have the box checked above? I hope this is the case since I want all of the DMZ networks at the same security level but only want them to be able to communicate if I have an ACL defined.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:17:24 GMT</pubDate>
    <dc:creator>Phil Bradley</dc:creator>
    <dc:date>2020-02-21T15:17:24Z</dc:date>
    <item>
      <title>ASA and enable traffic between two interfaces with same security level</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-enable-traffic-between-two-interfaces-with-same-security/m-p/3324942#M1064239</link>
      <description>&lt;P&gt;I have multiple DMZ servers in seperate interfaces on my ASA with the same security level defined. I notice that if I do not check the box "enable traffic between two interfaces with same security level", then I cannot communicate between two servers in the seperate interfaces even if I have an ACL rule allowing them to communicate. Do you still have to have an ACL defined in order for these to communicate even if you have the box checked above? I hope this is the case since I want all of the DMZ networks at the same security level but only want them to be able to communicate if I have an ACL defined.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-enable-traffic-between-two-interfaces-with-same-security/m-p/3324942#M1064239</guid>
      <dc:creator>Phil Bradley</dc:creator>
      <dc:date>2020-02-21T15:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and enable traffic between two interfaces with same security level</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-enable-traffic-between-two-interfaces-with-same-security/m-p/3324964#M1064240</link>
      <description>&lt;P&gt;Thats exactly the way to go. You need the checkbox to let them communicate, but you also need an ACL to control what these systems are allowed to do.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2018 21:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-enable-traffic-between-two-interfaces-with-same-security/m-p/3324964#M1064240</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-02-04T21:58:00Z</dc:date>
    </item>
  </channel>
</rss>

