<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I don't actually need ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797349#M165414</link>
    <description>&lt;P&gt;I don't actually need ASA services in general, but I need only a possibility of ASA to filter hhtp-headers and url filtration. But anyway,&lt;/P&gt;
&lt;P&gt;Is it OK?&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif inside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif outside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY ethertype permit any&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY-IP extended permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group ALLOW-ANY out interface inside&lt;BR /&gt;access-group ALLOW-ANY-IP out interface inside&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;access-group ALLOW-ANY in interface outside&lt;BR /&gt;access-group ALLOW-ANY-IP in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I need a piece of advice.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Thu, 03 Dec 2015 13:35:58 GMT</pubDate>
    <dc:creator>S.Girutskiy1</dc:creator>
    <dc:date>2015-12-03T13:35:58Z</dc:date>
    <item>
      <title>ASA transparent mode allows all traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797347#M165412</link>
      <description>&lt;P&gt;Hello, everyone!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'd like to know how I can allow any traffick to pass through ASA on transparent mode. My idea was to use the same security level on inside and outside interfaces. What do you think about it? What problems can I face?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;P.S.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ASA5585-SSP-60,&amp;nbsp;Cisco Adaptive Security Appliance Software Version 9.1(5)21.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797347#M165412</guid>
      <dc:creator>S.Girutskiy1</dc:creator>
      <dc:date>2019-03-12T06:59:13Z</dc:date>
    </item>
    <item>
      <title>Is this in a production</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797348#M165413</link>
      <description>&lt;P&gt;Is this in a production Scenario? Is your plan to apply ploicies on the traffic eventually?&lt;/P&gt;
&lt;P&gt;You can acieve this by adding Access rules to the traffic while still maintaining the Security levels where you want it for INSIDE and OUTSIDE traffic.&lt;/P&gt;
&lt;P&gt;You could do it with same security levels but you might run into some issues with traffic being inspected or not inspected through the firewall. So certain traffic may not be allowed dynamically. You&amp;nbsp; have to configure "allow same security traffic through the firewall. This adds complexity to your config which may be difficult to undo when you decide to control traffic through your Firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 12:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797348#M165413</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-03T12:54:33Z</dc:date>
    </item>
    <item>
      <title>I don't actually need ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797349#M165414</link>
      <description>&lt;P&gt;I don't actually need ASA services in general, but I need only a possibility of ASA to filter hhtp-headers and url filtration. But anyway,&lt;/P&gt;
&lt;P&gt;Is it OK?&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif inside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif outside&lt;BR /&gt; bridge-group 1&lt;BR /&gt; security-level 0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY ethertype permit any&lt;/P&gt;
&lt;P&gt;access-list ALLOW-ANY-IP extended permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group ALLOW-ANY out interface inside&lt;BR /&gt;access-group ALLOW-ANY-IP out interface inside&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;access-group ALLOW-ANY in interface outside&lt;BR /&gt;access-group ALLOW-ANY-IP in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I need a piece of advice.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 13:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797349#M165414</guid>
      <dc:creator>S.Girutskiy1</dc:creator>
      <dc:date>2015-12-03T13:35:58Z</dc:date>
    </item>
    <item>
      <title>That should work. You don't</title>
      <link>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797350#M165416</link>
      <description>&lt;P&gt;That should work. You don't need the entries in the direction out on both interfaces. Is there any ethertype traffic you want to allow? Like cdp or other layer 2 protocols. If not then you don't need the ethertype acl.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2015 14:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-transparent-mode-allows-all-traffic/m-p/2797350#M165416</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-12-03T14:19:23Z</dc:date>
    </item>
  </channel>
</rss>

