<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, The &amp;quot;security-level&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-access-rules/m-p/2622322#M197046</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value of an interface (for the most part) only affects the connectivity through that interface if the interface &lt;STRONG&gt;DOES NOT&lt;/STRONG&gt; have an ACL attached. So as soon as you attach the ACL to the interface then you need to allow/deny the traffic you need in that ACL and the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value does not apply anymore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The special cases where &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value still plays a part is when you have 2 interfaces with equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value. In that case even if you allow traffic in interface ACL the ASA will by default block the connections. In those cases you either have to change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value so that they are &lt;STRONG&gt;NOT&lt;/STRONG&gt; equal. Or if you dont want to change &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value then you need to add the command &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other special case is when a connection goes in and out through the same interface. Most common example might be VPN Client connnections that come to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface and leave to Internet through &lt;STRONG&gt;"outside"&lt;/STRONG&gt; also. In this case you will need a similiar command as above. The command is &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would personally suggest using interface ACLs on each interface as using the &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;does not give you any chance to have specific rules. I guess in a simple setup you might use only the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; but I use interface ACLs even on my home ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
    <pubDate>Mon, 16 Feb 2015 11:00:07 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2015-02-16T11:00:07Z</dc:date>
    <item>
      <title>ASA Access Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-rules/m-p/2622321#M197045</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just need to confirm if I have understood about the access rules correctly.&lt;/P&gt;&lt;P&gt;Say I have three interfaces with security levels as specified.&amp;nbsp;Inside(100), Outside(0) and DMZ(50).&lt;/P&gt;&lt;P&gt;By default, DMZ (Security Level of 50) can access Outside(0).&lt;/P&gt;&lt;P&gt;Say I have applied an incoming rule on the DMZ interface, will it still hold the default behavior of DMZ able to access Outside?&amp;nbsp;&lt;/P&gt;&lt;P&gt;or do I need to specify an access-list to allow it? Please advise&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to my testing, I need to allow it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-rules/m-p/2622321#M197045</guid>
      <dc:creator>rakeshvelagala</dc:creator>
      <dc:date>2019-03-12T05:30:28Z</dc:date>
    </item>
    <item>
      <title>Hi, The "security-level"</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-rules/m-p/2622322#M197046</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value of an interface (for the most part) only affects the connectivity through that interface if the interface &lt;STRONG&gt;DOES NOT&lt;/STRONG&gt; have an ACL attached. So as soon as you attach the ACL to the interface then you need to allow/deny the traffic you need in that ACL and the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value does not apply anymore.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The special cases where &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value still plays a part is when you have 2 interfaces with equal &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value. In that case even if you allow traffic in interface ACL the ASA will by default block the connections. In those cases you either have to change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value so that they are &lt;STRONG&gt;NOT&lt;/STRONG&gt; equal. Or if you dont want to change &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value then you need to add the command &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other special case is when a connection goes in and out through the same interface. Most common example might be VPN Client connnections that come to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface and leave to Internet through &lt;STRONG&gt;"outside"&lt;/STRONG&gt; also. In this case you will need a similiar command as above. The command is &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would personally suggest using interface ACLs on each interface as using the &lt;STRONG&gt;"security-level" &lt;/STRONG&gt;does not give you any chance to have specific rules. I guess in a simple setup you might use only the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; but I use interface ACLs even on my home ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 11:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-rules/m-p/2622322#M197046</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-02-16T11:00:07Z</dc:date>
    </item>
  </channel>
</rss>

