<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa zones in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5009068#M1108591</link>
    <description>&lt;P&gt;Basic thread-detection is disabled, but threat-detection statistics is enabled and ASDM doesn't like it. Threat-detection statistics can be quite helpful though as ASDM uses it for graphs on the firewall dashboard.&lt;/P&gt;&lt;P&gt;Be careful when assigning zone to an interface: this can remove static routes on the interface (CSCuu43360). This is documented: When you add an interface to a zone, all static routes for those interfaces are removed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 13:52:16 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-01-30T13:52:16Z</dc:date>
    <item>
      <title>asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004269#M1108332</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;I need to implement one zone on asa withe several interfaces and no zones. I need to put two interfaces into that new zone. Will implementing this zone in any way break traffic toward other interfaces?&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 08:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004269#M1108332</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2024-01-24T08:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004276#M1108334</link>
      <description>&lt;P&gt;Can you more elaborate&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What platform you have fpr ftd ? Or asa?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 08:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004276#M1108334</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T08:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004278#M1108335</link>
      <description>&lt;P&gt;asa&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 08:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004278#M1108335</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2024-01-24T08:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004289#M1108336</link>
      <description>&lt;P&gt;As I know there is secuirty level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can put interface in same secuirty level and permit intra and inter interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This allow traffic between interface to pass without need acl.&lt;/P&gt;
&lt;P&gt;If new interface have secuirty level different than old interface then sure you need acl.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 09:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004289#M1108336</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T09:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004303#M1108337</link>
      <description>&lt;P&gt;but traffic bwtween interfaces should flow, respecting ACL of course, regadless of zone they are mebers of?&amp;nbsp; One is in the zone and others are not member of any zone?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 09:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004303#M1108337</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2024-01-24T09:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004304#M1108338</link>
      <description>&lt;P&gt;Friend there is no zone &lt;STRONG&gt;secuirty&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If old interface in same secuirty level with new then traffic flow no need acl (need only permit intra and inter)&lt;/P&gt;
&lt;P&gt;If the there is different in secuirty level' you need ACL.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 10:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004304#M1108338</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T10:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004310#M1108339</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1169250"&gt;@DraganSkundric87318&lt;/a&gt; zones are only used on the ASA for ECMP (equal cost multi path) routing, you cannot not apply security controls (ACLs) based on the security zone. So normal ACL and security levels apply.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa920/configuration/general/asa-920-general-config/interface-zones.html?bookSearch=true" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa920/configuration/general/asa-920-general-config/interface-zones.html?bookSearch=true&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 09:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004310#M1108339</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-24T09:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004331#M1108340</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;, if you are referring to the traffic zone then I would say the ASA traffic zone concept has nothting to do with some other vendors security zones concept such as Palo Alto for example. The traffic zone on the ASA could mainly be used to workaround some asymmetric routing scenarios and to allow some load balancing across multiple interfaces within a traffic zone which usually you can't do without a traffic zone. However, even with a traffic zone, the ACL and NAT for example will still be applied per interface basis, not per traffic zone basis.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 09:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004331#M1108340</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-01-24T09:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004338#M1108341</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1169250"&gt;@DraganSkundric87318&lt;/a&gt;&amp;nbsp;dont confuse&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Traffic zone is different than secuirty zone.&lt;/P&gt;
&lt;P&gt;Traffic zone is another long story.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 09:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004338#M1108341</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T09:59:17Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004358#M1108342</link>
      <description>&lt;P&gt;I need to implement zone because of ECMP and just want to know if it will somehow negativelly impact existing traffic flow&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 10:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004358#M1108342</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2024-01-24T10:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004359#M1108343</link>
      <description>&lt;P&gt;thanks for clarify&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you use Zone traffic then you need to make all interface in that traffic Zone in same security level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and then as I mention before check the security level with other interface and use ACL if needed&amp;nbsp;&lt;/P&gt;
&lt;H3 class="title sectiontitle"&gt;from cisco doc.&lt;BR /&gt;Security Levels&lt;/H3&gt;
&lt;P class="p"&gt;The first interface that you add to a zone determines the security level of the zone. All additional interfaces must have the same security level. To change the security level for interfaces in a zone, you must remove all but one interface, and then change the security levels, and re-add the interfaces.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 10:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5004359#M1108343</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T10:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5008903#M1108576</link>
      <description>&lt;P&gt;ok, and now .... another problem. I can create zone but cannot add interfaces to it .... I have this message on ASDM&amp;nbsp;&lt;/P&gt;&lt;P&gt;threat detection is enabled no interface can be associated with traffic zone&lt;/P&gt;&lt;P&gt;and threat detection is turned off. !?!?!?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or is it not?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;no threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 10:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5008903#M1108576</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2024-01-30T10:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: asa zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/5009068#M1108591</link>
      <description>&lt;P&gt;Basic thread-detection is disabled, but threat-detection statistics is enabled and ASDM doesn't like it. Threat-detection statistics can be quite helpful though as ASDM uses it for graphs on the firewall dashboard.&lt;/P&gt;&lt;P&gt;Be careful when assigning zone to an interface: this can remove static routes on the interface (CSCuu43360). This is documented: When you add an interface to a zone, all static routes for those interfaces are removed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 13:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/5009068#M1108591</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-30T13:52:16Z</dc:date>
    </item>
  </channel>
</rss>

