<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA and Security Levels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141319#M359288</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In practice, most interesting firewall designs end up putting access-lists on all the interfaces, at which point the security levels are moot.&amp;nbsp;&amp;nbsp; The primary effect of Cisco security-level concept is that an out of the box vanilla configuration with just an inside and an outside network will more or less work: the firewall will block unsolicited inbound traffic, allow outbound traffic, and allow reply packets for existing connections in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Mar 2013 18:54:21 GMT</pubDate>
    <dc:creator>James Leinweber</dc:creator>
    <dc:date>2013-03-29T18:54:21Z</dc:date>
    <item>
      <title>ASA and Security Levels</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141315#M359284</link>
      <description>&lt;P&gt;Hey guys I have a very basic question, as much as I know about Firewalls. This matter escapes, can someone explain to me what does the security levels mean on the interface and could have the same security level on two different interfaces that facing the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise and thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141315#M359284</guid>
      <dc:creator>mingram27</dc:creator>
      <dc:date>2019-03-12T01:21:08Z</dc:date>
    </item>
    <item>
      <title>ASA and Security Levels</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141316#M359285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Matthew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security level protects higher security&amp;nbsp; networks&amp;nbsp; from lower security networks by imposing additional protection&amp;nbsp; between&amp;nbsp; the two. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The level controls the following behavior: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1422206"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Network&amp;nbsp;&amp;nbsp; access—By default, there is an implicit permit from a higher security&amp;nbsp;&amp;nbsp; interface to a lower security interface (outbound). Hosts on the higher&amp;nbsp;&amp;nbsp; security interface can access any host on a lower security interface.&amp;nbsp;&amp;nbsp; You can limit access by applying an access list to the interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally,&amp;nbsp; interfaces on the same security level&amp;nbsp; cannot communicate. If you want&amp;nbsp; interfaces on the same security level to&amp;nbsp; communicate, you need to add&amp;nbsp; the same-security-traffic inter-interface. You might want to assign two&amp;nbsp; interfaces to the same level and&amp;nbsp; allow protection features to be&amp;nbsp; applied&amp;nbsp; equally for traffic between two interfaces; for example, you&amp;nbsp; have two&amp;nbsp; departments that are equally secure. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 14:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141316#M359285</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-03-28T14:17:19Z</dc:date>
    </item>
    <item>
      <title>ASA and Security Levels</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141317#M359286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect answer!!! Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 15:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141317#M359286</guid>
      <dc:creator>mingram27</dc:creator>
      <dc:date>2013-03-28T15:42:27Z</dc:date>
    </item>
    <item>
      <title>ASA and Security Levels</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141318#M359287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your welcome!!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 15:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141318#M359287</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-03-28T15:45:51Z</dc:date>
    </item>
    <item>
      <title>ASA and Security Levels</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141319#M359288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In practice, most interesting firewall designs end up putting access-lists on all the interfaces, at which point the security levels are moot.&amp;nbsp;&amp;nbsp; The primary effect of Cisco security-level concept is that an out of the box vanilla configuration with just an inside and an outside network will more or less work: the firewall will block unsolicited inbound traffic, allow outbound traffic, and allow reply packets for existing connections in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Mar 2013 18:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-security-levels/m-p/2141319#M359288</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-03-29T18:54:21Z</dc:date>
    </item>
  </channel>
</rss>

