<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practice for Security Zones in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181076#M1075626</link>
    <description>&lt;P&gt;I usually create a zone per. interface and then create a category in the ACP section for each interface. I then place all access rules sourced from that particular interface under that category, so the ACP config will end up looking like en ASA Config.&amp;nbsp;Example:&lt;/P&gt;&lt;P&gt;Category: INSIDE_ZONE&lt;/P&gt;&lt;P&gt;&amp;lt;All rules sourced from the Inside Zone&amp;gt;&lt;/P&gt;&lt;P&gt;Category: OUTSIDE_ZONE&lt;/P&gt;&lt;P&gt;&amp;lt;All rules sourced from the internet&amp;gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 18:35:28 GMT</pubDate>
    <dc:creator>Nicolai Borchorst</dc:creator>
    <dc:date>2020-11-09T18:35:28Z</dc:date>
    <item>
      <title>Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181033#M1075620</link>
      <description>&lt;P&gt;A Customer will modernize a small/medium Network with seven FTDs (1120 / 2110) at &amp;nbsp;1 HQ and 3 Branches.&lt;/P&gt;&lt;P&gt;so I am looking for best practice example for Security Zones form CISCO to pitch my Migration Plan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 17:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181033#M1075620</guid>
      <dc:creator>alex.f.</dc:creator>
      <dc:date>2020-11-09T17:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181035#M1075621</link>
      <description>&lt;P&gt;It all depends on how your exiting environment, are you looking exiting to migrate to FTD ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or you looking to deploy FTD greenfield and migrate ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/621/asa2ftd-migration/asa2ftd-migration-guide-621/asa2ftd_migration_procedure.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/621/asa2ftd-migration/asa2ftd-migration-guide-621/asa2ftd_migration_procedure.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 17:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181035#M1075621</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-11-09T17:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181066#M1075625</link>
      <description>&lt;P&gt;We used the migration tool to import the existing access rules and the basic Configuration but ist created a zone for each interface.&lt;/P&gt;&lt;P&gt;The Customer is not so&amp;nbsp;experienced and need the push in the right direction. Actually we have a Greenfield deployment of the new FTDs running with the old Concept.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181066#M1075625</guid>
      <dc:creator>alex.f.</dc:creator>
      <dc:date>2020-11-09T18:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181076#M1075626</link>
      <description>&lt;P&gt;I usually create a zone per. interface and then create a category in the ACP section for each interface. I then place all access rules sourced from that particular interface under that category, so the ACP config will end up looking like en ASA Config.&amp;nbsp;Example:&lt;/P&gt;&lt;P&gt;Category: INSIDE_ZONE&lt;/P&gt;&lt;P&gt;&amp;lt;All rules sourced from the Inside Zone&amp;gt;&lt;/P&gt;&lt;P&gt;Category: OUTSIDE_ZONE&lt;/P&gt;&lt;P&gt;&amp;lt;All rules sourced from the internet&amp;gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181076#M1075626</guid>
      <dc:creator>Nicolai Borchorst</dc:creator>
      <dc:date>2020-11-09T18:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181088#M1075630</link>
      <description>&lt;P&gt;Security zones are used to segment your network and make it easier to classify traffic.&amp;nbsp; Usually you would group interfaces that provide similar services.&amp;nbsp; For example, DMZ1, DMZ2, and DMZ3 could be grouped into a single security zone called DMZ.&amp;nbsp; Interface facing the internet could be placed in the Outside zone or a zone called Internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it all boils down to what does your security policy dictate, and what are your network needs.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 19:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181088#M1075630</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-11-09T19:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practice for Security Zones</title>
      <link>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181125#M1075633</link>
      <description>&lt;P&gt;My best approach Lan side 1 Zone, Outside you can make any zones since the Lan side always is only 1Zone and trusted network. if you have more then you need to create more, but i prefer to make simple so easy to manage the network, rather a complex task for engineers when required to diagnosis the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Inside LAN Zone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outside 1&amp;nbsp; Zone&lt;/P&gt;
&lt;P&gt;WAN 2&amp;nbsp; Zone&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DMZ Zone&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 20:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/best-practice-for-security-zones/m-p/4181125#M1075633</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-11-09T20:24:00Z</dc:date>
    </item>
  </channel>
</rss>

