<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you don't want to use  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569738#M203010</link>
    <description>&lt;P&gt;If you don't want to use "same-security ..." then you have to configure your inside interface with a higher security level. The "typical" security-level for inside is "100". But you still need an ACL like the following on the inside interface to restrict you inside users from accessing the guest-network:&lt;/P&gt;

&lt;PRE&gt;
access-list inside_access_in deny ip any object obj_guest
access-list inside_access_in permit ip any any
&lt;/PRE&gt;

&lt;P&gt;Your guest-interface just needs an ACL&lt;/P&gt;

&lt;PRE&gt;
access-list guest_access_in permit tcp object obj_guest object QNAP eq 80
access-list guest_access_in deny   ip  any YOUR-INSIDE-NETWORK
access-list guest_access_in permit ip  object obj_guest any
&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what kind of syn-attacks do you have that you are mentioning?&lt;/P&gt;</description>
    <pubDate>Sun, 30 Nov 2014 17:35:40 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-11-30T17:35:40Z</dc:date>
    <item>
      <title>ASA v9.2.2.4 connecting between interfaces?</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569737#M203009</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to connect/protect interfaces with access-list and there i have some problems that i cannot solve, getting syn attac:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interfaces have same or different security-levels, but i don't use same-security-traffic permit inter-interface, because i don't wan't communication without ACL.&lt;/P&gt;&lt;P&gt;Below is some of the configuration, now it uses any any for inside and guest interfaces inbound, but with that i cannot access from guest to inside (if i enable same-security.. then i can connect). I need to get configuration to connect between interfaces with ACL?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For example, i need configuration that does:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;-enable guest users to access QNAP for port 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;-disallow inside to guest and guest to inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;-allow internet access for all&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.x 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;nameif guest&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 10.1.2.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;object network QNAP&lt;BR /&gt;&amp;nbsp;host 172.16.1.5&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list guest_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;object network obj_guest&lt;BR /&gt;&amp;nbsp;nat (guest,outside) dynamic interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group guest_access_in in interface guest&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wbr,&lt;/P&gt;&lt;P&gt;OLLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569737#M203009</guid>
      <dc:creator>ohenttonen</dc:creator>
      <dc:date>2019-03-12T05:09:30Z</dc:date>
    </item>
    <item>
      <title>If you don't want to use</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569738#M203010</link>
      <description>&lt;P&gt;If you don't want to use "same-security ..." then you have to configure your inside interface with a higher security level. The "typical" security-level for inside is "100". But you still need an ACL like the following on the inside interface to restrict you inside users from accessing the guest-network:&lt;/P&gt;

&lt;PRE&gt;
access-list inside_access_in deny ip any object obj_guest
access-list inside_access_in permit ip any any
&lt;/PRE&gt;

&lt;P&gt;Your guest-interface just needs an ACL&lt;/P&gt;

&lt;PRE&gt;
access-list guest_access_in permit tcp object obj_guest object QNAP eq 80
access-list guest_access_in deny   ip  any YOUR-INSIDE-NETWORK
access-list guest_access_in permit ip  object obj_guest any
&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what kind of syn-attacks do you have that you are mentioning?&lt;/P&gt;</description>
      <pubDate>Sun, 30 Nov 2014 17:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569738#M203010</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-30T17:35:40Z</dc:date>
    </item>
    <item>
      <title>HiThanks, it really was years</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569739#M203011</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Thanks, it really was years when i last used asa's ACL's because i remembered rules wery much other way, that why it wasn't working. Now it works.&lt;/P&gt;&lt;P&gt;But it won't work, if my inside interface is same security-level, when i rise it to default 100 (which i usually use) i get traffic filtered to allow spesific server/port and deny rest and still go to internet, as you wrote! Is this only default behaviour of ASA5505 and this is not same with bigger ASA5510/5512?&lt;/P&gt;&lt;P&gt;There i get this syn (really ftp traffic, but allowing IP in rule)when accessing from inside to guest, from guest to inside rdp traffic flows correctly??:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;2&lt;/TD&gt;&lt;TD&gt;Nov 30 2014&lt;/TD&gt;&lt;TD&gt;21:25:53&lt;/TD&gt;&lt;TD&gt;106001&lt;/TD&gt;&lt;TD&gt;172.16.1.108&lt;/TD&gt;&lt;TD&gt;57293&lt;/TD&gt;&lt;TD&gt;10.1.2.102&lt;/TD&gt;&lt;TD&gt;2123&lt;/TD&gt;&lt;TD&gt;Inbound TCP connection denied from 172.22.82.108/57293 to 10.1.2.102/2123 flags SYN on interface inside&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Second scenario, because my firewall what i'm planning to use another place is ASA5512-x and there is multiple vlans, different customers. How you suggest i should use security-levels of interfaces, can they be same like 50 for every customer?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br,&lt;/P&gt;&lt;P&gt;OLLI&lt;/P&gt;</description>
      <pubDate>Sun, 30 Nov 2014 19:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569739#M203011</guid>
      <dc:creator>ohenttonen</dc:creator>
      <dc:date>2014-11-30T19:35:49Z</dc:date>
    </item>
    <item>
      <title>The behavior with security</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569740#M203012</link>
      <description>&lt;P&gt;The behavior with security-levels is the same in all ASAs.&lt;/P&gt;&lt;P&gt;You can give many interfaces the same security-level. But if they need to communicate with each other, you have to configure "same-security-traffic permit inter-interface". And you should put ACLs&amp;nbsp;on all interfaces that only allow the needed traffic. But that's best practice anyway.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Nov 2014 20:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569740#M203012</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-30T20:42:04Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot for quick reply,</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569741#M203013</link>
      <description>&lt;P&gt;Thanks a lot for quick reply, you rule! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have acl for every interface and got all working!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;wbr,&lt;/P&gt;&lt;P&gt;OLLI&lt;/P&gt;</description>
      <pubDate>Sun, 30 Nov 2014 21:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-connecting-between-interfaces/m-p/2569741#M203013</guid>
      <dc:creator>ohenttonen</dc:creator>
      <dc:date>2014-11-30T21:49:06Z</dc:date>
    </item>
  </channel>
</rss>

