<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow traffic from lower security level to higher - ASA 5515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178538#M1066530</link>
    <description>&lt;P&gt;I am running latest 9.8.1 code. I need assistance in allowing traffic from lower security level to higher. Below is the config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface g0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.20.5.1 255.255.255.0 standby 10.20.5.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface g0/2&lt;/P&gt;&lt;P&gt;nameif DMZ1&lt;BR /&gt;security-level 15&lt;BR /&gt;ip address 10.20.3.1 255.255.255.0 standby 10.20.3.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface g0/3&lt;/P&gt;&lt;P&gt;description SQL subnet&lt;BR /&gt;vlan 5&lt;BR /&gt;nameif DMZ2&lt;BR /&gt;security-level 25&lt;BR /&gt;ip address 10.20.4.1 255.255.255.0 standby 10.20.4.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help in allowing traffic both ways between inside and DMZ1 and inside and DMZ2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:15:44 GMT</pubDate>
    <dc:creator>Pratik Prajapati</dc:creator>
    <dc:date>2020-02-21T14:15:44Z</dc:date>
    <item>
      <title>Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178538#M1066530</link>
      <description>&lt;P&gt;I am running latest 9.8.1 code. I need assistance in allowing traffic from lower security level to higher. Below is the config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interface g0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.20.5.1 255.255.255.0 standby 10.20.5.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface g0/2&lt;/P&gt;&lt;P&gt;nameif DMZ1&lt;BR /&gt;security-level 15&lt;BR /&gt;ip address 10.20.3.1 255.255.255.0 standby 10.20.3.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface g0/3&lt;/P&gt;&lt;P&gt;description SQL subnet&lt;BR /&gt;vlan 5&lt;BR /&gt;nameif DMZ2&lt;BR /&gt;security-level 25&lt;BR /&gt;ip address 10.20.4.1 255.255.255.0 standby 10.20.4.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need help in allowing traffic both ways between inside and DMZ1 and inside and DMZ2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178538#M1066530</guid>
      <dc:creator>Pratik Prajapati</dc:creator>
      <dc:date>2020-02-21T14:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178573#M1066533</link>
      <description>&lt;P&gt;Higher security to lower security is allowed by default. Only if you have an ACL applied for other reasons on the interface do you need to add a rule for traffic to lower security interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the lower to higher use case you just need to permit it with an access-list and then assign the access-list with the access-group command.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In both cases, return traffic for a given flow is always allowed since the ASA is a stateful firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 17:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178573#M1066533</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-31T17:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178587#M1066535</link>
      <description>&lt;P&gt;Sound dumb but I need help with creating those ACLs. I have tried different ways but haven't been successful.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 17:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178587#M1066535</guid>
      <dc:creator>Pratik Prajapati</dc:creator>
      <dc:date>2017-08-31T17:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178593#M1066537</link>
      <description>&lt;P&gt;Two lines should do it. Assuming you want any host in DMZ2 to communicate with any host in DMZ1, something like this should work:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list dmz2-dmz1 permit ip 10.20.3.0 255.255.255.0 10.20.4.0 255.255.255.0&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-group dmz2-dmz1 in interface dmz2&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Of course if that's your policy, you could just make them same security level and "permit same-security traffic intra-interface"&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 17:51:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3178593#M1066537</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-08-31T17:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3873844#M1066545</link>
      <description>&lt;P&gt;Hey, I know this is an old thread but its the top google result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem with the written ACL solution is that the implicit deny at the end of the ACL will break the built-in permission for traffic to move from higher to lower level security zones. If you have a management network, an internal network for VMs, and an internet network (outside), adding one ACL to permit one VM to access one management network IP will break the outbound internet access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way short of manually blocking traffic to each higher-level network, then allowing any any, to resolve this?&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jun 2019 21:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3873844#M1066545</guid>
      <dc:creator>KylePericak9919</dc:creator>
      <dc:date>2019-06-16T21:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from lower security level to higher - ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3873921#M1066546</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/874971"&gt;@KylePericak9919&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;Is there any way short of manually blocking traffic to each higher-level network, then allowing any any, to resolve this?&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That's the recommended solution.&lt;/P&gt;
&lt;P&gt;Typically, where the internal networks are RFC 1918, you can just do the single allow and then a couple of lines do deny the three RFC 1918 supernets (or one line of you define a network object group for 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16) and then a final "allow any any".&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 02:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-lower-security-level-to-higher-asa-5515/m-p/3873921#M1066546</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-06-17T02:33:04Z</dc:date>
    </item>
  </channel>
</rss>

