<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD security level 0 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4804951#M1099118</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt; yes you can just allow traffic from one&amp;nbsp; (inside) zone to another (outside) zone.&lt;/P&gt;
&lt;P&gt;Or you could set the default action to allow, instead of drop.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2023 17:54:01 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-03-30T17:54:01Z</dc:date>
    <item>
      <title>FTD security level 0</title>
      <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4271395#M1077239</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am new on the Cisco FPR 2130 device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some questions below after hands-on pratices:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. The default config contains inside and outside interfaces. But why do they both have security-level 0 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Do I need to change it ? How ? (I didn't find out security-level on the FDM GUI)&lt;/P&gt;&lt;P&gt;2. I would like to create subinterface (802.1Q trunk) on the outside interface. Do I need to delete the outside interfacename first?&lt;/P&gt;&lt;P&gt;3. Do I need to create Policy rules if I want to allow ICMP, Traceroute traffic ? (as I did on ASA)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4271395#M1077239</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2021-01-13T08:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD security level 0</title>
      <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4271404#M1077240</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/179629"&gt;@h.dam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On FTD all interfaces have a security level of 0 (you cannot change this), this has changed from the way you are used to configuring an ASA.&lt;/P&gt;
&lt;P&gt;You don't necessarily need to delete the name, but all interface names must be unique.&lt;/P&gt;
&lt;P&gt;You will need to configure a Service Policy in order to allow traceroute.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215237-allow-traceroute-through-firepower-threa.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215237-allow-traceroute-through-firepower-threa.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 08:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4271404#M1077240</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-01-13T08:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTD security level 0</title>
      <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4804949#M1099117</link>
      <description>&lt;P&gt;So to allow traffic you must always have ACLs applied, can't just allow inside zone to outside zone as an example?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 17:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4804949#M1099117</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-03-30T17:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD security level 0</title>
      <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4804951#M1099118</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt; yes you can just allow traffic from one&amp;nbsp; (inside) zone to another (outside) zone.&lt;/P&gt;
&lt;P&gt;Or you could set the default action to allow, instead of drop.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 17:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4804951#M1099118</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-30T17:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: FTD security level 0</title>
      <link>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4805013#M1099121</link>
      <description>&lt;P&gt;How do I verify that via FMC or CLI for FTD I cant even see it or find the documentation covering that?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 19:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-security-level-0/m-p/4805013#M1099121</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2023-03-30T19:53:46Z</dc:date>
    </item>
  </channel>
</rss>

