<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Same security level interfaces with access lists in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/same-security-level-interfaces-with-access-lists/m-p/2580341#M205945</link>
    <description>&lt;P&gt;We have an ASA 5510 with 3 connections, outside, inside and point2point running version 8.2 without nat control. We need hosts on the inside interface to communicate to hosts on the point2point interface. When we use the same-security-traffic permit inter-interface all works fine but we need to limit host to host traffic so we think ACLs will be the solution. Is there a way to establish inter interface traffic without same-security-traffic permit inter-interface and use access-lists or use this global command with access lists?&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:56:24 GMT</pubDate>
    <dc:creator>jeff6strings</dc:creator>
    <dc:date>2019-03-12T04:56:24Z</dc:date>
    <item>
      <title>Same security level interfaces with access lists</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-interfaces-with-access-lists/m-p/2580341#M205945</link>
      <description>&lt;P&gt;We have an ASA 5510 with 3 connections, outside, inside and point2point running version 8.2 without nat control. We need hosts on the inside interface to communicate to hosts on the point2point interface. When we use the same-security-traffic permit inter-interface all works fine but we need to limit host to host traffic so we think ACLs will be the solution. Is there a way to establish inter interface traffic without same-security-traffic permit inter-interface and use access-lists or use this global command with access lists?&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-interfaces-with-access-lists/m-p/2580341#M205945</guid>
      <dc:creator>jeff6strings</dc:creator>
      <dc:date>2019-03-12T04:56:24Z</dc:date>
    </item>
    <item>
      <title>HiYes, as you were saying,</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-interfaces-with-access-lists/m-p/2580342#M205946</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Yes, as you were saying, the best way is to configure the two interfaces with different security-levels and then use ACLs to restric the traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 18:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-interfaces-with-access-lists/m-p/2580342#M205946</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2014-10-15T18:23:29Z</dc:date>
    </item>
  </channel>
</rss>

