<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This is the message I was in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710246#M190654</link>
    <description>&lt;P&gt;This is the message I was expecting to get when initiating traffic from security 5 to 100.&amp;nbsp; This is a packet trace I did from google to the outside interface.&lt;/P&gt;&lt;P&gt;ASA(config)# packet-tracer input outside tcp 8.8.8.8 80 x.x.x.x 1025&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; x.x.x.x &amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop &amp;nbsp;&lt;BR /&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;ASA(config)#&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 13 Jun 2015 21:08:25 GMT</pubDate>
    <dc:creator>ty.masse</dc:creator>
    <dc:date>2015-06-13T21:08:25Z</dc:date>
    <item>
      <title>ASA Security Level traffic flow question</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710243#M190650</link>
      <description>&lt;P&gt;I'm having a strange issue with an ASA configuration.&amp;nbsp; I'm configuring a guest network which allows them to go to the internet, but not have access to anything on the inside or dmz interface.&amp;nbsp; I also have the dhcp relay configuration to allow the guest devices to get an IP address from our main dhcp server located on the inside.&amp;nbsp; Below is the security level of my interfaces:&lt;/P&gt;&lt;P&gt;outside 0&lt;/P&gt;&lt;P&gt;guest 5&lt;/P&gt;&lt;P&gt;dmz 50&lt;/P&gt;&lt;P&gt;inside 100&lt;/P&gt;&lt;P&gt;By default I was expect the implicit rule in the ASA to allow&amp;nbsp;higher security to lower security.&amp;nbsp; Which in this case would allow the guest devices to go to the internet with no access to the dmz or inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When configured in this way&amp;nbsp;they had no internet access at all.&amp;nbsp; They did get an IP address.&amp;nbsp; Which told me that the relay config is working.&lt;/P&gt;&lt;P&gt;To get it to work I had to create an ACL and allowed internet traffic.&amp;nbsp; But it also allows backflow traffic all the way to the inside interface.&amp;nbsp; I had to put deny statement in the ACL to prevent that.&lt;/P&gt;&lt;P&gt;My question is why is it not working implicitly?&amp;nbsp; I shouldn't need an ACL at all.&amp;nbsp; Please assist me with this issue.&lt;/P&gt;&lt;P&gt;Thanks for your assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710243#M190650</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2019-03-12T06:06:34Z</dc:date>
    </item>
    <item>
      <title>You're right - an access list</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710244#M190651</link>
      <description>&lt;P&gt;You're right - an access list should not be required.&lt;/P&gt;
&lt;P&gt;Try removing it and then running the ASA packet-tracer command to see where the problem lies. i.e.:&lt;/P&gt;

&lt;PRE&gt;
packet-tracer input guest tcp &amp;lt;guest ip address&amp;gt; 1025 8.8.8.8 80&lt;/PRE&gt;</description>
      <pubDate>Sat, 13 Jun 2015 18:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710244#M190651</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-06-13T18:52:50Z</dc:date>
    </item>
    <item>
      <title>Thanks for your reply.  When</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710245#M190652</link>
      <description>&lt;P&gt;Thanks for your reply.&amp;nbsp; When I did that it works.&amp;nbsp; However I forgot one part in my description.&amp;nbsp; The clients need to make a connection to the inside to get to a captive portal page on port 80.&amp;nbsp; That's the real reason why we have the ACL.&lt;/P&gt;&lt;P&gt;1. Why would it work backwards to the higher security interface with ACL only and no NAT?&amp;nbsp; I'm puzzled by that.&lt;/P&gt;&lt;P&gt;2. How can I get it to work by allowing&amp;nbsp; access to the captive portal device only?&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2015 20:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710245#M190652</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2015-06-13T20:44:55Z</dc:date>
    </item>
    <item>
      <title>This is the message I was</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710246#M190654</link>
      <description>&lt;P&gt;This is the message I was expecting to get when initiating traffic from security 5 to 100.&amp;nbsp; This is a packet trace I did from google to the outside interface.&lt;/P&gt;&lt;P&gt;ASA(config)# packet-tracer input outside tcp 8.8.8.8 80 x.x.x.x 1025&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; x.x.x.x &amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop &amp;nbsp;&lt;BR /&gt;Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;ASA(config)#&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2015 21:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710246#M190654</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2015-06-13T21:08:25Z</dc:date>
    </item>
    <item>
      <title>Hi,Can you provide your NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710247#M190656</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you provide your NAT configuration on the ASA device.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 01:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710247#M190656</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-14T01:22:35Z</dc:date>
    </item>
    <item>
      <title>Post your ASA config and don</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710248#M190658</link>
      <description>&lt;P&gt;Post your ASA config and don't forget to remove sensitive information.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 05:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710248#M190658</guid>
      <dc:creator>Rejohn Cuares</dc:creator>
      <dc:date>2015-06-14T05:05:35Z</dc:date>
    </item>
    <item>
      <title>Please re-run packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710249#M190659</link>
      <description>&lt;P&gt;Please re-run packet tracer initiating from guest with an outside destination as I posted earlier.&lt;/P&gt;&lt;P&gt;Introducing packets into the data path from outside to a private internal IP address would not be expected to work (as noted by the ASA in the output you provided).&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 05:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710249#M190659</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-06-14T05:17:16Z</dc:date>
    </item>
    <item>
      <title>I found this link below and</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710250#M190660</link>
      <description>&lt;P&gt;I found this link below and based on that it seems that Cisco has changed things to where if the traffic is to a directly connected network and you have an ACL it will allow the traffic in any direction no matter the security level.&amp;nbsp; That's not the way it used to be.&lt;/P&gt;&lt;P&gt;The old rule was higher security to lower security required NAT. It can only communicate to the lower security via the NAT address. &amp;nbsp; Lower security to higher security required ACL.&amp;nbsp; That way a mistake in the ACL would not expose the more secure side to a security breach since there is not NAT. &amp;nbsp; However with the new rule if there is a mistake in the ACL, the lower security for example the DMZ can initiate traffic to any directly connected network on the ASA.&lt;/P&gt;&lt;P&gt;I used to work on a 8.2 ASA if we had a public web server we natted it to a public address and allowed port 80 on the outside ACL.&amp;nbsp; If that server needed access to a databases server on the inside, we would expose the inside interface to the dmz by natting it to itself and allow access in the DMZ ACL.&amp;nbsp; I was shocked yesterday that the ACL allowed the guest traffic to anything on the inside network. I don't agree with that design but can live with it.&amp;nbsp; It's something I didn't know before.&lt;/P&gt;&lt;P&gt;Am I correct in my understanding on how the new ASA is supposed to work?&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11924711/cisco-asa-security-level-and-explicit-deny-acl"&gt;https://supportforums.cisco.com/discussion/11924711/cisco-asa-security-level-and-explicit-deny-acl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 19:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710250#M190660</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2015-06-14T19:25:12Z</dc:date>
    </item>
    <item>
      <title>The requirement to use NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710251#M190661</link>
      <description>&lt;P&gt;The requirement to use NAT (nat-control) is deprecated as of ASA 8.3.&lt;/P&gt;&lt;P&gt;In the absence of an ACL, higher security level is allowed to initiate traffic to lower security levels. Once any ACL is applied to an interface, that takes precedence (with an implicit "deny any any" as the final entry in the access list).&lt;/P&gt;&lt;P&gt;Lower security level may only initiate traffic to a higher security level if is allowed by an ACL.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 19:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710251#M190661</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-06-14T19:36:56Z</dc:date>
    </item>
    <item>
      <title>I guess I didn't realize that</title>
      <link>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710252#M190665</link>
      <description>&lt;P&gt;I guess I didn't realize that before.&amp;nbsp; I don't know how Cisco thinks that&amp;nbsp; makes the ASA more secure.&amp;nbsp; While it makes it easier, I don't think it's an improvement in security.&lt;/P&gt;&lt;P&gt;Nothing I can do about it.&lt;/P&gt;&lt;P&gt;Thanks everyone for your responses.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jun 2015 19:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-security-level-traffic-flow-question/m-p/2710252#M190665</guid>
      <dc:creator>ty.masse</dc:creator>
      <dc:date>2015-06-14T19:43:36Z</dc:date>
    </item>
  </channel>
</rss>

