<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Karsten. That confirms in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001772#M155509</link>
    <description>&lt;P&gt;Thanks Karsten. That confirms my thinking process!&lt;/P&gt;</description>
    <pubDate>Thu, 17 Nov 2016 11:19:53 GMT</pubDate>
    <dc:creator>GRANT3779</dc:creator>
    <dc:date>2016-11-17T11:19:53Z</dc:date>
    <item>
      <title>ASA Outside Interface Best Practise</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001770#M155507</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;For an ASA Outside Interface (which has no inbound services as such) is there a need for an ACL on the Interface?&lt;/P&gt;
&lt;P&gt;It provides NAT only and access to the Outside world is locked down Inbound on the Inside Interface. All return traffic would be allowed back due to the stateful nature of the ASA.&lt;/P&gt;
&lt;P&gt;What is best practise for the Outside Interface? With it having a lower security level I assume traffic coming into it from the Outside would not be able to pass to the Inside due to the Security Levels alone?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001770#M155507</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-03-12T08:32:57Z</dc:date>
    </item>
    <item>
      <title>You are right, with the given</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001771#M155508</link>
      <description>&lt;P&gt;You are right, with the given security-levels, no traffic that is initiated from outside will get into your network.&lt;/P&gt;
&lt;P&gt;Some people still place an ACL with a line "deny ip any any" to the interface to see the hit count. I wouldn't say it's a best practice, but it's one valid way to handle it.&lt;/P&gt;
&lt;P&gt;And remember that the ACLs on the ASA by default only filter transit traffic and not traffic that is sent to the ASA itself. You don't need any ACEs for that.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2016 11:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001771#M155508</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-11-17T11:07:14Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten. That confirms</title>
      <link>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001772#M155509</link>
      <description>&lt;P&gt;Thanks Karsten. That confirms my thinking process!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2016 11:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-outside-interface-best-practise/m-p/3001772#M155509</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2016-11-17T11:19:53Z</dc:date>
    </item>
  </channel>
</rss>

