<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: securit level for Asa Management interface ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148686#M1073752</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/462568"&gt;@cyberops123&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, 100 for the management interface is the way forward. Also if that interface is to be purely management and not for "transit traffic" i do also recommend the command management-only which fits that purpose.&lt;/P&gt;</description>
    <pubDate>Wed, 09 Sep 2020 21:37:56 GMT</pubDate>
    <dc:creator>Ruben Cocheno</dc:creator>
    <dc:date>2020-09-09T21:37:56Z</dc:date>
    <item>
      <title>securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148674#M1073750</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I am trying to figure out what would be the best security level for management0/0 interface on my ASA firewall ? Currently I configured it with security level 100 but I am not sure if this is the best security practice so if anyone can help me on this that would be great .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 21:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148674#M1073750</guid>
      <dc:creator>cyberops123</dc:creator>
      <dc:date>2020-09-09T21:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148686#M1073752</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/462568"&gt;@cyberops123&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, 100 for the management interface is the way forward. Also if that interface is to be purely management and not for "transit traffic" i do also recommend the command management-only which fits that purpose.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 21:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148686#M1073752</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2020-09-09T21:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148723#M1073760</link>
      <description>&lt;P&gt;we are not sure how your network designed, so in general Cisco's recommendation as best practice - management interface should be out-of-band if that is possible in your environment?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Using Management Interfaces&lt;/H3&gt;
&lt;P&gt;The management plane of a device is accessed via in-band and out-of-band methods through physical and logical means. Ideally, both in-band and out-of-band management access exists for each network device so that the management plane can be accessed during network outages.&lt;BR /&gt;&lt;BR /&gt;Cisco firewalls define a specific interface as being the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Management&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interface. This designation is defined by configuring the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;management-only&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command on the specific interface. By default the physically defined&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Management&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interface has this command defined. This interface is used for in-band access to a Cisco firewall. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Management&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interface can also be used for regular traffic when removing the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;management-only&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interface configuration command. It is recommended to use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Management&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interface of the ASA device exclusively as a management interface. This allows administrators and engineers to apply management traffic-based policies throughout the network. After the Management interface is configured on a Cisco firewall, it can be used by management plane protocols, such as SSH, SNMP, and syslog.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 08:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4148723#M1073760</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-11T08:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149268#M1073797</link>
      <description>&lt;P&gt;thanks balaji and Ruben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yeah currently we use management interface0/0 with "management only " command dedicated remote access and its configured with security level 100 .and I was doing some research if 100 is the best practice for mngt interface when it comes to hardening the ASA .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 16:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149268#M1073797</guid>
      <dc:creator>cyberops123</dc:creator>
      <dc:date>2020-09-10T16:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149592#M1073824</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt; what source are you quoting? There's been a separate management routing table available on ASAs for several years now.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 08:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149592#M1073824</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-09-11T08:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: securit level for Asa Management interface ?</title>
      <link>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149600#M1073826</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; at this moment i do not have cisco URL in place, this is one of the notes i made for my reference from cisco document, when i was doing some hardening process of network, some time back. let me re-read that statement, yes this may have changed, my document might have been outdated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Agreed ASA has new - below my document that was missed in this post. ( edited orginal post) - thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a standard security practice, it is often necessary to segregate and isolate Management traffic from data traffic. To achieve this isolation, the &lt;SPAN class="ph"&gt;ASA&lt;/SPAN&gt; uses a separate routing table for management-only traffic vs. data traffic. Separate routing tables means that you can create separate default routes for data and management as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Management table from-the-device traffic includes features that open a remote file using HTTP, SCP, TFTP, &lt;SPAN class="ph"&gt;the &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;copy&lt;/SPAN&gt; &lt;/SPAN&gt; command, Smart Call Home, &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;trustpoint&lt;/SPAN&gt; &lt;/SPAN&gt;, &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;trustpool&lt;/SPAN&gt; &lt;/SPAN&gt;, &lt;/SPAN&gt;and so on&lt;/P&gt;</description>
      <pubDate>Fri, 11 Sep 2020 08:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/securit-level-for-asa-management-interface/m-p/4149600#M1073826</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-11T08:56:49Z</dc:date>
    </item>
  </channel>
</rss>

