<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Randy for your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720461#M193842</link>
    <description>&lt;P&gt;Thanks Randy for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's recommended to use ACL to allow traffic from internet to LAN using NAT?&lt;/P&gt;&lt;P&gt;My case&lt;/P&gt;&lt;P&gt;one application with data base in local network with private ip&lt;/P&gt;&lt;P&gt;I want to allow access to this data base from Internet (like bank account consulting).&lt;/P&gt;&lt;P&gt;I used on public ip and natted this public ip to application private ip (application in located in lan)&lt;/P&gt;&lt;P&gt;finally, i make a acl from any to public ip which is natted to internal ip, or with this, we have traffic from Internet to Internal, is this correct or there is a security risk?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jul 2015 23:52:01 GMT</pubDate>
    <dc:creator>Rowlands Price</dc:creator>
    <dc:date>2015-07-14T23:52:01Z</dc:date>
    <item>
      <title>Security Traffic flow in Firewall</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720459#M193840</link>
      <description>&lt;P&gt;Dear Support&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have many question regarding traffic flow passing &amp;nbsp;firewall&lt;/P&gt;&lt;P&gt;I have Cisco ASA 5520 firewall with 3 interfaces used. Internet, Lan and DMZ&lt;/P&gt;&lt;P&gt;My concern is about traffic passing according to this scenario&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 LAN to Internet&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 LAN to DMZ&lt;/P&gt;&lt;P&gt;3 Dmz to Internet&lt;/P&gt;&lt;P&gt;4 Internet to LAN&lt;/P&gt;&lt;P&gt;5 Dmz to LAN&lt;/P&gt;&lt;P&gt;Can you please tell permit or denied from one zone to another?&lt;/P&gt;&lt;P&gt;The second concer is that i have one application running http installed in local network, it's critical application for business and i want to allow acces to that application from Internet (users will have login/password to access), it's normal to allow from internet to internal lan using nat with no risk?&lt;/P&gt;&lt;P&gt;Attached is the firewall diagram&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720459#M193840</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2019-03-26T00:56:36Z</dc:date>
    </item>
    <item>
      <title>Hi Roland ,The ASA use the</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720460#M193841</link>
      <description>&lt;P&gt;Hi Roland ,&lt;/P&gt;&lt;P&gt;The ASA use the security level to allow the communication between interfaces,&amp;nbsp; an interface with a higher security level can communicate with an interface with a lower security level, but not backwards.&lt;/P&gt;&lt;P&gt;For example if we assign the following security level to your interfaces:&lt;/P&gt;&lt;P&gt;Internet = Security level 0&lt;/P&gt;&lt;P&gt;DMZ = Security level 50&lt;/P&gt;&lt;P&gt;Inside = Security Level 100&lt;/P&gt;&lt;P&gt;The communication will be allow as follows:&lt;/P&gt;&lt;P&gt;1 LAN to Internet&amp;nbsp; =&amp;nbsp; Allow&lt;/P&gt;&lt;P&gt;2 LAN to DMZ = Allow&lt;/P&gt;&lt;P&gt;3 Dmz to Internet = Allow&lt;/P&gt;&lt;P&gt;4 Internet to LAN = Deny&lt;/P&gt;&lt;P&gt;5 Dmz to LAN = Deny.&lt;/P&gt;&lt;P&gt;Regarding the http application , you can create a port-forwarding to be accessed from internet.&amp;nbsp; If the port forwarding is properly configured only the port 80 should be allowed. You should keep the application up to date and patched to avoid any security issue.&lt;/P&gt;&lt;P&gt;As an alternative solution you can use a VPN client&amp;nbsp; (Anyconnect)&amp;nbsp; to access your internal application.&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;- Randy-&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 22:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720460#M193841</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-07-14T22:51:52Z</dc:date>
    </item>
    <item>
      <title>Thanks Randy for your</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720461#M193842</link>
      <description>&lt;P&gt;Thanks Randy for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's recommended to use ACL to allow traffic from internet to LAN using NAT?&lt;/P&gt;&lt;P&gt;My case&lt;/P&gt;&lt;P&gt;one application with data base in local network with private ip&lt;/P&gt;&lt;P&gt;I want to allow access to this data base from Internet (like bank account consulting).&lt;/P&gt;&lt;P&gt;I used on public ip and natted this public ip to application private ip (application in located in lan)&lt;/P&gt;&lt;P&gt;finally, i make a acl from any to public ip which is natted to internal ip, or with this, we have traffic from Internet to Internal, is this correct or there is a security risk?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 23:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720461#M193842</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-14T23:52:01Z</dc:date>
    </item>
    <item>
      <title>Roland , Keep in mind  with</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720462#M193843</link>
      <description>&lt;P&gt;Roland ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind &amp;nbsp;with that configuration this data base is not only public to your co-workers , is public to everybody literally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this application is related to &amp;nbsp;bank or sensitive information , I strongly recommend you to send that traffic encrypted over a VPN.&lt;/P&gt;&lt;P&gt;However if that is not a possibility , you can enforce the security on your internal network , you can add to your ASA an IPS module to monitor the traffic to this applications.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As best practice you can run an Nmap scan against your ASA once &amp;nbsp;it has been configured to make sure the application is only open on the ports is supposed to be.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 02:58:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720462#M193843</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-07-15T02:58:02Z</dc:date>
    </item>
    <item>
      <title>Dear RandyThe application is</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720463#M193844</link>
      <description>&lt;P&gt;Dear Randy&lt;/P&gt;&lt;P&gt;The application is sensitive and many users from internet will connect to it, so it's not possible to use vpn.&lt;/P&gt;&lt;P&gt;My question is general, when you have sensitive application with data base and need users from internet to connect, put and down files, exactly like online account, what is the best solution for securing the application and database?&lt;/P&gt;&lt;P&gt;I cannot move the application to DMZ, it's enterprise main application.&lt;/P&gt;&lt;P&gt;For now there is an acl, any to public ip and that public ip is natted to the application on the LAN.&lt;/P&gt;&lt;P&gt;Is this secure to nat traffic from Internet to lan directly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 07:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720463#M193844</guid>
      <dc:creator>Rowlands Price</dc:creator>
      <dc:date>2015-07-15T07:11:34Z</dc:date>
    </item>
    <item>
      <title>Hi Roland , When you have</title>
      <link>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720464#M193845</link>
      <description>&lt;P&gt;Hi Roland ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you have this ACL on your ASA , basically this behaves like a proxy forwarding information between the application an &amp;nbsp;the internet users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means the normal firewall &amp;nbsp;rules does not apply for this connection , &amp;nbsp;with this configuration from the security perspective, the security perimeter needs to be out of the scope of the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example if the users needs to login on the application prior to have access, make sure the AAA server is secure and the application itself is &amp;nbsp;running an&amp;nbsp;up-to-date software.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jul 2015 16:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/security-traffic-flow-in-firewall/m-p/2720464#M193845</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2015-07-15T16:16:43Z</dc:date>
    </item>
  </channel>
</rss>

