<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA - Security Level in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899559#M1103271</link>
    <description>&lt;P&gt;Thank u&amp;nbsp;Jonatan,&amp;nbsp;your explanation is good.&lt;BR /&gt;If exist a ACL on interface, the security-level&amp;nbsp;no longer needed...&lt;/P&gt;&lt;P&gt;Good day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 06 Aug 2023 09:01:44 GMT</pubDate>
    <dc:creator>AlessandroAlise</dc:creator>
    <dc:date>2023-08-06T09:01:44Z</dc:date>
    <item>
      <title>Cisco ASA - Security Level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899395#M1103268</link>
      <description>&lt;P&gt;Hi All, i have a problem with this LAB:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AlessandroAlise_0-1691272610044.png" style="width: 522px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/193544i535F4B5527AE3BBA/image-dimensions/522x428?v=v2" width="522" height="428" role="button" title="AlessandroAlise_0-1691272610044.png" alt="AlessandroAlise_0-1691272610044.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is the configuration of ASA:&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;&lt;BR /&gt;ASA Version 9.1(5)16&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.10&lt;BR /&gt;description DATI-VLAN10&lt;BR /&gt;vlan 10&lt;BR /&gt;nameif DATI-VLAN10&lt;BR /&gt;security-level 80&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.20&lt;BR /&gt;description DATI-VLAN10&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif DATI-VLAN20&lt;BR /&gt;security-level 70&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.0.0.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 30&lt;BR /&gt;ip address 10.55.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network VLAN10-LAN-INTERNA&lt;BR /&gt;network-object 192.168.10.0 255.255.255.0&lt;BR /&gt;object-group network VLAN20-LAN-INTERNA&lt;BR /&gt;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;object-group network VLAN30-LAN-ESTERNA&lt;BR /&gt;network-object 10.99.73.0 255.255.255.0&lt;BR /&gt;object-group network SERVER-LAN-INTERNA&lt;BR /&gt;network-object 10.55.0.0 255.255.255.0&lt;BR /&gt;access-list OUTSIDE extended permit ip object-group VLAN30-LAN-ESTERNA object-group VLAN20-LAN-INTERNA&lt;BR /&gt;access-list OUTSIDE extended permit ip any object-group SERVER-LAN-INTERNA&lt;BR /&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group VLAN10-LAN-INTERNA&lt;BR /&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group VLAN30-LAN-ESTERNA&lt;BR /&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group SERVER-LAN-INTERNA&lt;BR /&gt;&lt;BR /&gt;mtu DATI-VLAN10 1500&lt;BR /&gt;mtu DATI-VLAN20 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-733.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;access-group VLAN20 in interface DATI-VLAN20&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.0.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;/P&gt;&lt;P&gt;ciscoasa# sh nameif&lt;BR /&gt;Interface Name Security&lt;BR /&gt;Ethernet0.10 DATI-VLAN10 80&lt;BR /&gt;Ethernet0.20 DATI-VLAN20 70&lt;BR /&gt;Ethernet1 outside 0&lt;BR /&gt;Ethernet2 DMZ 30&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;All the books I've studied say that a higher security-level interface can be allowed towards a lower security-level interface, without ACL right? Indeed the PC1 in VLAN 10 (192.168.10.10) can reach all hosts without any ACL, but PC2 in VLAN 20 (192.168.20.20) has need&amp;nbsp;of the ACLs:&lt;BR /&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group VLAN30-LAN-ESTERNA&lt;BR /&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group SERVER-LAN-INTERNA&lt;BR /&gt;for reach host in interface with lower securiy-level why?&lt;BR /&gt;&lt;BR /&gt;I noticed that if i remove :&lt;BR /&gt;access-group VLAN20 in interface DATI-VLAN20&lt;BR /&gt;PC2 can't reach PC1 (it's OK,Sec-Level VLAN10&amp;gt;VLAN20 need ACL), but can reach PC3 and Server...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Who can explain this to me?&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 05 Aug 2023 22:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899395#M1103268</guid>
      <dc:creator>AlessandroAlise</dc:creator>
      <dc:date>2023-08-05T22:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Security Level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899402#M1103270</link>
      <description>&lt;P&gt;How the security levels work has a long history and dates back to when we had Cisco PIX using conduits, not ASA's with access-lists.&lt;/P&gt;
&lt;P&gt;While some of the basic concepts still work the same with default configuration, you have to consider that the moment you are using access-lists on an interface, the access-list is going to&amp;nbsp; govern all traffic input on that interface regardless of the security level, with an implicit deny rule at the end.&lt;/P&gt;
&lt;P&gt;When you remove the "&lt;SPAN&gt;access-group VLAN20 in interface DATI-VLAN20", PC2 cannot reach PC1 because PC1 is in a higher security zone. As described in the documentation you mentioned.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you add the "access-group VLAN20 in interface DATI-VLAN20", you have an access-list with an implicit "deny ip any any" at the end that doesn't show up in the config.&lt;BR /&gt;So once you have added an access-list entry(ACE) to allow PC2 to contact PC1, the access-list effectively looks like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list VLAN20 extended permit ip object-group VLAN20-LAN-INTERNA object-group VLAN10-LAN-INTERNA&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;access-list VLAN20 extended deny ip any any&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;(The "deny" command just doesn't show up in the config, access-lists have an implicit deny any any at the end.)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Which is why if you want PC2 to be able to communicate to other zones/interfaces, you need a permit entry in the VLAN20 access-list, to access the DMZ, outside, or anything.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In practice, you would probably have an access-list attached inbound to all interfaces, at which point you will stop considering the security-level of each interface and start focusing only on what the access-lists allows or disallows.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Aug 2023 23:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899402#M1103270</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2023-08-05T23:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Security Level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899559#M1103271</link>
      <description>&lt;P&gt;Thank u&amp;nbsp;Jonatan,&amp;nbsp;your explanation is good.&lt;BR /&gt;If exist a ACL on interface, the security-level&amp;nbsp;no longer needed...&lt;/P&gt;&lt;P&gt;Good day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2023 09:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899559#M1103271</guid>
      <dc:creator>AlessandroAlise</dc:creator>
      <dc:date>2023-08-06T09:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA - Security Level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899566#M1103272</link>
      <description>&lt;P&gt;Last question:&lt;BR /&gt;PC2 need ACL for reach PC1 it's OK, but it's possibile with a command for allow all traffic from PC2 to interface with less security-level, without ACL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Aug 2023 09:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-security-level/m-p/4899566#M1103272</guid>
      <dc:creator>AlessandroAlise</dc:creator>
      <dc:date>2023-08-06T09:06:39Z</dc:date>
    </item>
  </channel>
</rss>

