<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC: Security Zones and Interfaces on ASA Failover Pair in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389997#M1080145</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Zones and security levels in ASA and Zones in Firepower are two separate things, although they are similar to each other.&amp;nbsp; Security levels on the ASA are used in absence of access lists on an Interface to define which interface is "more trusted", once you apply an access list to an interface the security levels have no meaning other than a visual representation of that trust.&amp;nbsp; Zones in Firepower, however, are used to group interfaces together.&amp;nbsp; How they are grouped is up to the administrator, but as I mentioned earlier I tend to group the interfaces together based on the services or functions that are provided.&amp;nbsp; You would still need to apply access lists to allow traffic, but it adds an extra layer of security when you reference the Zone in the access list.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Apr 2021 10:17:18 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2021-04-20T10:17:18Z</dc:date>
    <item>
      <title>FMC: Security Zones and Interfaces on ASA Failover Pair</title>
      <link>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389911#M1080142</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;&lt;P&gt;I have just setup my first FMC (6.6.1) for a ASA Failover Pair (9.8(2)20)&lt;BR /&gt;with Firepower modules (6.6.1).&lt;/P&gt;&lt;P&gt;At the moment still no traffic will be handled by the module (neither&lt;BR /&gt;"sfr fail-open" nor " sfr fail-open monitor-only" is currently configured&lt;BR /&gt;in the policy-map under "class sfr".&lt;/P&gt;&lt;P&gt;The are still no zones in the FMC and I want to know how you would proceed&lt;BR /&gt;with creating zones.&lt;/P&gt;&lt;P&gt;Attached you find the zones on the ASA.&lt;/P&gt;&lt;P&gt;Do you put the interfaces with the same security level in the same zone,&lt;BR /&gt;or is there a better model? For example the outside interfaces on primary&lt;BR /&gt;and secondary ASA in the outside zone (see attached)?&lt;/P&gt;&lt;P&gt;Every hint is welcome!&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Bye&lt;BR /&gt;R.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 07:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389911#M1080142</guid>
      <dc:creator>swscco001</dc:creator>
      <dc:date>2021-04-20T07:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: FMC: Security Zones and Interfaces on ASA Failover Pair</title>
      <link>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389970#M1080143</link>
      <description>&lt;P&gt;My normal "go to" is to create zones based on functions.&amp;nbsp; So Internet goes in the outside zone, local lan goes in the inside zone, branch offices goes in another zone (for example branch_office or dmz-2), servers go in yet another zone (for example dmz).&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 09:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389970#M1080143</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-04-20T09:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: FMC: Security Zones and Interfaces on ASA Failover Pair</title>
      <link>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389979#M1080144</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the reply!&lt;BR /&gt;&lt;BR /&gt;I have searched for a 'how to' but could not find any.&lt;BR /&gt;&lt;BR /&gt;I thought the security zones at Firepower are the equivalent to the security levels at the ASA. That's why I want to create the zones&lt;BR /&gt;according to the security levels.&lt;BR /&gt;&lt;BR /&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 09:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389979#M1080144</guid>
      <dc:creator>swscco001</dc:creator>
      <dc:date>2021-04-20T09:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: FMC: Security Zones and Interfaces on ASA Failover Pair</title>
      <link>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389997#M1080145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Zones and security levels in ASA and Zones in Firepower are two separate things, although they are similar to each other.&amp;nbsp; Security levels on the ASA are used in absence of access lists on an Interface to define which interface is "more trusted", once you apply an access list to an interface the security levels have no meaning other than a visual representation of that trust.&amp;nbsp; Zones in Firepower, however, are used to group interfaces together.&amp;nbsp; How they are grouped is up to the administrator, but as I mentioned earlier I tend to group the interfaces together based on the services or functions that are provided.&amp;nbsp; You would still need to apply access lists to allow traffic, but it adds an extra layer of security when you reference the Zone in the access list.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Apr 2021 10:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-security-zones-and-interfaces-on-asa-failover-pair/m-p/4389997#M1080145</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-04-20T10:17:18Z</dc:date>
    </item>
  </channel>
</rss>

