<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prashant,. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924497#M155231</link>
    <description>&lt;P&gt;&lt;G class="gr_ gr_122 gr-alert gr_gramm undefined Punctuation multiReplace" id="122" data-gr-id="122"&gt;Prashant,.&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;In Summary- can we conclude that just global based policies are enough in the production network ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;No, global policies are not enough as it ideally does not cover all the restrictions that you will need to have on the ASAs.&lt;BR /&gt;&lt;BR /&gt;In real work scenarios, you will have different traffic restrictions based on interfaces.&lt;BR /&gt;So , to sum up, customers use the&amp;nbsp;combination of global ACLs and interface ACLs and never rely on global ACLs alone.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Mar 2016 05:53:36 GMT</pubDate>
    <dc:creator>Dinesh Moudgil</dc:creator>
    <dc:date>2016-03-30T05:53:36Z</dc:date>
    <item>
      <title>Global Vs Interface Policies</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924492#M155226</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;As now Cisco ASA supports Global ACL wouldn't be this advisable to use it rather than using Interface based ACL ?&lt;/P&gt;
&lt;P&gt;Can someone please advise me positive and negative parts of it?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think once we use global ACL this is more like a Checkpoint firewall and make our configuration and management easy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have got firewall running in multiple context ( just have one context) , this is in Transparent mode, I am still in the process of configuring it, hence need your inputs to finalize the policies.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Prashant&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924492#M155226</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2019-03-12T07:33:21Z</dc:date>
    </item>
    <item>
      <title>Prashant,Global access rules</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924493#M155227</link>
      <description>&lt;P&gt;Prashant,&lt;BR /&gt;&lt;BR /&gt;Global access rules allow you to apply a global rule to ingress traffic without the need to specify an interface to which the rule must be applied. Using global access rules provides the following benefits:&lt;/P&gt;
&lt;P&gt;•When migrating to the adaptive security appliance from a competitor appliance, you can maintain a global access rule policy instead of &lt;G class="gr_ gr_186 gr-alert gr_gramm undefined Grammar multiReplace" id="186" data-gr-id="186"&gt;needing&lt;/G&gt; to apply an interface-specific policy on each interface.&lt;/P&gt;
&lt;P&gt;•Global access control policies are not replicated on each interface, so they save memory space.&lt;/P&gt;
&lt;P&gt;•Global access rules &lt;G class="gr_ gr_188 gr-alert gr_gramm undefined Grammar multiReplace" id="188" data-gr-id="188"&gt;provides&lt;/G&gt; flexibility in defining a security policy. You do not need to specify which interface a packet comes in on, as long as it matches the source and destination IP addresses.&lt;/P&gt;
&lt;P&gt;•Global access rules use the same &lt;G class="gr_ gr_176 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace gr-progress" id="176" data-gr-id="176"&gt;mtrie&lt;/G&gt; and stride tree as interface-specific access rules, so scalability and performance for global rules are the same as for interface-specific rules.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can configure global access rules in&amp;nbsp; conjunction with interface access rules, in which case, the specific&amp;nbsp; interface access rules are always processed before the general global&amp;nbsp; access rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Ref :&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa83/configuration/guide/config/access_rules.html#wp1083595"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa83/configuration/guide/config/access_rules.html#wp1083595&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 04:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924493#M155227</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-30T04:25:30Z</dc:date>
    </item>
    <item>
      <title>Hi Dinesh,</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924494#M155228</link>
      <description>&lt;P&gt;Hi Dinesh,&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;However, am aware about these benefits, I wanted to know since global ACL is far better than the interface one then why and on what cases one should be using interface ACLs ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am sure there should be some use of them else Cisco would have stopped supporting Interface based policies - just a thought.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 05:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924494#M155228</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2016-03-30T05:20:53Z</dc:date>
    </item>
    <item>
      <title>Primarily customers use</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924495#M155229</link>
      <description>&lt;P&gt;Primarily customers use interface &lt;G class="gr_ gr_86 gr-alert gr_spell undefined ContextualSpelling" id="86" data-gr-id="86"&gt;access-lists&lt;/G&gt; to restrict traffic specific to those interfaces and apply global access-lists to cover the common restrictions which can be applied irrespective of interfaces.&lt;/P&gt;
&lt;P&gt;In essence, use interface access-list in those cases where the traffic is to be permitted and denied and is part of only that interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 05:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924495#M155229</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-30T05:32:35Z</dc:date>
    </item>
    <item>
      <title>Thanks Dinesh! So can we say</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924496#M155230</link>
      <description>&lt;P&gt;Thanks Dinesh! So can we say that by using global ACl we can achieve everything that we are gaining from the interface based, rather Global acls are also useful from system resource perspective as they are using less system memory.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In Summary- can we conclude that just global based policies are enough in the production network ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 05:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924496#M155230</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2016-03-30T05:44:55Z</dc:date>
    </item>
    <item>
      <title>Prashant,.</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924497#M155231</link>
      <description>&lt;P&gt;&lt;G class="gr_ gr_122 gr-alert gr_gramm undefined Punctuation multiReplace" id="122" data-gr-id="122"&gt;Prashant,.&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;In Summary- can we conclude that just global based policies are enough in the production network ?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;No, global policies are not enough as it ideally does not cover all the restrictions that you will need to have on the ASAs.&lt;BR /&gt;&lt;BR /&gt;In real work scenarios, you will have different traffic restrictions based on interfaces.&lt;BR /&gt;So , to sum up, customers use the&amp;nbsp;combination of global ACLs and interface ACLs and never rely on global ACLs alone.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 05:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924497#M155231</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-30T05:53:36Z</dc:date>
    </item>
    <item>
      <title>Thanks Again!</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924498#M155232</link>
      <description>&lt;P&gt;Thanks Again!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, I am not fully convinced with it, just to give an example here, Checkpoint doesn't has any concept of interface based ACL still that has been the reliable firewall.&lt;/P&gt;
&lt;P&gt;My thought- Cisco Introduced Global ACL&amp;nbsp;just to make management/configuration easier and might they get&amp;nbsp;rid off interface&amp;nbsp;based ACLs soon.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 05:57:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924498#M155232</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2016-03-30T05:57:41Z</dc:date>
    </item>
    <item>
      <title>There is an architectural</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924499#M155233</link>
      <description>&lt;P&gt;There is an architectural difference between how Checkpoint and Cisco's firewall works. Some feature which is stable and working on one might not be the optimum solution on the other.&lt;/P&gt;
&lt;P&gt;As far as Cisco deprecating the interface ACLs, I don't think it is going to happen any soon.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 06:04:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924499#M155233</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-30T06:04:21Z</dc:date>
    </item>
    <item>
      <title>Thanks!</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924500#M155234</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 06:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924500#M155234</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2016-03-30T06:14:21Z</dc:date>
    </item>
    <item>
      <title>Prashant,</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924501#M155236</link>
      <description>&lt;P&gt;Prashant,&lt;/P&gt;
&lt;P&gt;If your queries have been answered, please mark the thread as answered to benefit other community members.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 10:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/2924501#M155236</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-30T10:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Prashant,</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/3940339#M155237</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I have some additional questions about this:&lt;BR /&gt;- I ran a packet tracer and I could spot the ACL applied on the interface but I see no mention of the global ACL?&lt;BR /&gt;can you detail where is this being checked?&lt;BR /&gt;- let's say we have a classic ASA deployment with several interfaces acting as LAN and one WAN ; all interfaces (7xLAN + WAN) have inbound (IN direction) ACLs applied on with a deny any any statement at the end of each ACL&lt;BR /&gt;Now I receive today an emergency change order on which I need to apply on all LAN interfaces severall outbound allow policies. Can I use this global ACL? Bear in mind each interface ACL ends with a deny. What's the fastest way for me to do this?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Florin.&lt;BR /&gt;</description>
      <pubDate>Mon, 14 Oct 2019 18:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/3940339#M155237</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2019-10-14T18:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: Prashant,</title>
      <link>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/3954879#M155238</link>
      <description>&lt;P&gt;Hi Florin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as the global rules are parsed after the interface-specific ones, AND it only permits inbound rules, you need to implement it into the interface-specific ACLs. I think your emergency change is over and you have implemented it that way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;Axel&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2019 15:53:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/global-vs-interface-policies/m-p/3954879#M155238</guid>
      <dc:creator>axlh</dc:creator>
      <dc:date>2019-11-07T15:53:44Z</dc:date>
    </item>
  </channel>
</rss>

