<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Depending on the size of the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435127#M268064</link>
    <description>&lt;P&gt;Depending on the size of the network, I've seen most companies use a different VLAN for their users and for their servers, but they both live on the "inside" interface of the firewall. &amp;nbsp;Front-end web-facing servers typically live in the DMZ. &amp;nbsp;Unless there is an explicit reason to route your user traffic destined for your servers through a firewall (sometimes, PCI or other regulations are the case) then &amp;nbsp;you should not need any more interfaces than the 3 you mentioned.&lt;/P&gt;&lt;P&gt;So:&lt;BR /&gt;Inside security level = 100&lt;BR /&gt;DMZ security level = 50&lt;BR /&gt;Outside security level = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setup NAT and access-lists accordingly.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Mar 2014 16:46:47 GMT</pubDate>
    <dc:creator>jj27</dc:creator>
    <dc:date>2014-03-25T16:46:47Z</dc:date>
    <item>
      <title>ASA Interfaces best practice</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435126#M268054</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;on an ASA (8.4) should the Servers such as Active Directory be behind the same interface as the Office Network pc's and than seperated on different VLAN's ? (Or split-up and behind different ASA interfaces?)&lt;/P&gt;&lt;P&gt;In a basic setup I believe that only 3 interfaces are enough (inside, DMZ, outside). This would mean that the Servers (excluding front end servers which would be in DMZ) will be behind the inside interface along end users computers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know any suggesstions/best practices even by linking documentation so that I configure these 3 interfaces correctly in terms of security levels and access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435126#M268054</guid>
      <dc:creator>aconticisco</dc:creator>
      <dc:date>2019-03-12T03:59:34Z</dc:date>
    </item>
    <item>
      <title>Depending on the size of the</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435127#M268064</link>
      <description>&lt;P&gt;Depending on the size of the network, I've seen most companies use a different VLAN for their users and for their servers, but they both live on the "inside" interface of the firewall. &amp;nbsp;Front-end web-facing servers typically live in the DMZ. &amp;nbsp;Unless there is an explicit reason to route your user traffic destined for your servers through a firewall (sometimes, PCI or other regulations are the case) then &amp;nbsp;you should not need any more interfaces than the 3 you mentioned.&lt;/P&gt;&lt;P&gt;So:&lt;BR /&gt;Inside security level = 100&lt;BR /&gt;DMZ security level = 50&lt;BR /&gt;Outside security level = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setup NAT and access-lists accordingly.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2014 16:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435127#M268064</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-03-25T16:46:47Z</dc:date>
    </item>
    <item>
      <title>Great yes in fact I want to</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435128#M268073</link>
      <description>&lt;P&gt;Great yes in fact I want to simulate a network as much as possible to a real corporate one. In fact I forgot to mention the management side where management servers are used to manage the network - are these also to go behind the inside interface and again on a seperate VLAN ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2014 19:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435128#M268073</guid>
      <dc:creator>aconticisco</dc:creator>
      <dc:date>2014-03-26T19:56:36Z</dc:date>
    </item>
    <item>
      <title>Yes, usually people have a</title>
      <link>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435129#M268078</link>
      <description>&lt;P&gt;Yes, usually people have a separate management network (VLAN) for their switches, server KVM management interfaces, etc. &amp;nbsp;Again, it all depends on how big the network is. &amp;nbsp;If it's a 10-PC and 1-2 server network with one switch, it may be a little overkill to segment it that much.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2014 20:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-interfaces-best-practice/m-p/2435129#M268078</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-03-26T20:12:51Z</dc:date>
    </item>
  </channel>
</rss>

