<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Mike, Security-level will in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fw-best-practices/m-p/2527260#M235215</link>
    <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security-level will not play a crucial role, when you have other filtering mechanisms in place..... if you have ACL allowed for certain access in the respective interfaces.... asa will allow by looking at the acl,nat, inspection..... So security-level is not a big challenge.... more over inside interface requires more sec-level than anything...... that is for protecting the outside hackers to get in to internal system.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that makes nothing when you have other security configurations in place to filter for permit/deny access.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2014 06:36:50 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2014-08-29T06:36:50Z</dc:date>
    <item>
      <title>FW Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/fw-best-practices/m-p/2527259#M235214</link>
      <description>&lt;P&gt;This&amp;nbsp;question is about best practices regarding firewalling personal identifiable information such as health records (please see attached image). This scenario assumes the use of Cisco ASA 5500 firewalls.&lt;/P&gt;&lt;P&gt;If the majority of cyber attacks happen from within an organization is it more important to give the "internal" interface a higher security&amp;nbsp;level (higher level of trust)&amp;nbsp;than the DMZ interface that connects to customer information or should the internal interface have a lower security level? I have included a visual depiction of this scenario in my attached document. I would like to know what others are doing to firewall critical information. Would an organization be remiss in not assigning the data servers the highest level of security while assuming that the internal network should be the most secure? Any insight into this question would be appreciated. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-best-practices/m-p/2527259#M235214</guid>
      <dc:creator>Mike Keenan</dc:creator>
      <dc:date>2019-03-12T04:41:29Z</dc:date>
    </item>
    <item>
      <title>Hi Mike, Security-level will</title>
      <link>https://community.cisco.com/t5/network-security/fw-best-practices/m-p/2527260#M235215</link>
      <description>&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security-level will not play a crucial role, when you have other filtering mechanisms in place..... if you have ACL allowed for certain access in the respective interfaces.... asa will allow by looking at the acl,nat, inspection..... So security-level is not a big challenge.... more over inside interface requires more sec-level than anything...... that is for protecting the outside hackers to get in to internal system.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that makes nothing when you have other security configurations in place to filter for permit/deny access.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2014 06:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fw-best-practices/m-p/2527260#M235215</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-29T06:36:50Z</dc:date>
    </item>
  </channel>
</rss>

