<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question regarding same security level ACLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126440#M393566</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Both interfaces have security-level 100&lt;/LI&gt;&lt;LI&gt;Have NO ACLs (on the interface where the host initiates the connection)&lt;/LI&gt;&lt;LI&gt;The setting "same-security-traffic permit inter-interface" is configured&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the traffic will go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Jan 2013 23:40:20 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-01T23:40:20Z</dc:date>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126437#M393560</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been trying to find a direct answer for this on the web, but couldn't find a clear one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say the asa has&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;NO&lt;/SPAN&gt; &lt;STRONG&gt;same-security-traffic permit inter-interface &lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I have two interfaces with same security level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;interface Ethernet0/1.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; vlan 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif inside1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 99&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;interface Ethernet0/1.6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; vlan 20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; nameif inside2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; security-level 99&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt; ip address 192.168.2.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that without the &lt;STRONG&gt;same-security-traffic permit inter-interface &lt;/STRONG&gt; command,&amp;nbsp; I woudn't be able to talk from host 192.168.1.1 to host 192.168.2.1 because the implicit deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say I want traffic allowed only between these two host ( &lt;SPAN style="color: #ff0000;"&gt;WITHOUT using &lt;STRONG&gt;same-security-traffic permit inter-interface )&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I create this access list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list inside1_acl extended permit ip host 192.168.1.1 host 192.168.2.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And apply it to inside1 interface inbound like so,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-group inside1_acl in interface inside1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1)&lt;/STRONG&gt; Should this now work? ( At least for traffic initiated from 192.168.1.1 ) Because as I understood this, it should hit the firewall rule and should allow return traffic (because the statefullness of the firewall) inbound @ inside2 interface and back in to inside1 ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2)&lt;/STRONG&gt; Orrr... If we &lt;STRONG&gt;haven't &lt;/STRONG&gt;turned on &lt;SPAN style="color: #000000;"&gt;&lt;STRONG style="color: #ff0000;"&gt;same-security-traffic permit inter-interface &lt;/STRONG&gt;&lt;/SPAN&gt;Command, by design, there is no way I can allow traffic between two same security level interfaces? . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks guys for taking time to read this.. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 01:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126437#M393560</guid>
      <dc:creator>shamax_1983</dc:creator>
      <dc:date>2019-03-13T01:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126438#M393562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested with my home ASA (though I have witnessed the problem before even without testing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have for example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface set to &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; without any ACL, traffic &lt;STRONG&gt;WONT&lt;/STRONG&gt; go through the firewall&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;(EDIT: No same-security-traffic configurations)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface set to &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; with an ACL permitting traffic from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;, traffic &lt;STRONG&gt;WONT&lt;/STRONG&gt; go through the firewall&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;(EDIT: No same-security-traffic configurations)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface set to &lt;STRONG&gt;"security-level 100"&lt;/STRONG&gt; with an ACL and configured with &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt;, traffic &lt;STRONG&gt;WILL&lt;/STRONG&gt; go through the firewall&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;(Will work even without an ACL attached to the interface behind which the traffic is initiated from)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the commands &lt;STRONG&gt;"same-security-traffic permit inter-interface"&lt;/STRONG&gt; and &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt; are meant to be used to overcome these situations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;"inter-interface"&lt;/STRONG&gt; used to allow traffic between interfaces/networks of equal security. (For example several LAN or perhaps LAN and Server segment?)&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;"intra-interface"&lt;/STRONG&gt; to make it possible for the traffic to head back through the interface the traffic came from. Most common situations might include allowing VPN Clients users accessing the ASA firewall to access Internet through the same interface they connected to (outside) or perhaps ASA is the default gateway for some network but traffic needs to be routed back to LAN for example to some VPN device or another router (where we wouldnt want to route all traffic/networks to)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though generally I dont trust &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; setting do decide which traffic is allowed. I always configure an ACL to an interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security-level did have a play in the below 8.3 software level regarding NAT operation (to my understanding atleast) so you had to take into account the security-levels sometimes even though access rules they didnt mean anything anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull and/or ask more questions if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jan 2013 23:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126438#M393562</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-01T23:17:52Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126439#M393565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What if,&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"inside" &lt;/STRONG&gt; and &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"outside" &lt;/STRONG&gt; interface set to &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"security-level 100" &lt;/STRONG&gt; &lt;STRONG&gt;without an ACL &lt;/STRONG&gt;and configured with &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"same-security-traffic permit inter-interface" &lt;/STRONG&gt;, &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;WILL &lt;/STRONG&gt; go through the firewall ??? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jan 2013 23:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126439#M393565</guid>
      <dc:creator>shamax_1983</dc:creator>
      <dc:date>2013-01-01T23:36:00Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126440#M393566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Both interfaces have security-level 100&lt;/LI&gt;&lt;LI&gt;Have NO ACLs (on the interface where the host initiates the connection)&lt;/LI&gt;&lt;LI&gt;The setting "same-security-traffic permit inter-interface" is configured&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the traffic will go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jan 2013 23:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126440#M393566</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-01T23:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126441#M393569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I edited the original reply to clarify the situation abit more.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jan 2013 23:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126441#M393569</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-01T23:44:50Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126442#M393571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for bugging you.. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That clarifies a lot. Just one further clarification.. ( This is the background issue I had which lead me to this question )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say I have 200 different VLANs/Interfaces to be set in ASA, And 180 of them should be absolutely isolated from every other VLAN (within the same security level) but 20 of them should have limited connectivity to each other. (And all 200 VLANs are in the same security level).&amp;nbsp; What would be the best way to tackle this scenario?, turn on same security traffic and apply&amp;nbsp; "deny acl" to all 180 interfaces and have "permit acl" for the rest 20 VLANs ?? or&amp;nbsp; is there any other simple way ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: Before bumping in to this issues, my initial thought was to disable same-security-traffic permit command, put all interfaces in to same security level and Apply ACL's only on the 20 Interfaces that needs access to other vlans. And by default rest of the 180 VLANs(Interface) will be blocked&amp;nbsp; and will only be allowed to access Internet which is in lower security level.&amp;nbsp; I thought this way, because it involves the lesser number of steps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jan 2013 23:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126442#M393571</guid>
      <dc:creator>shamax_1983</dc:creator>
      <dc:date>2013-01-01T23:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126443#M393574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ouch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;200 Vlans? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I havent dealth with any FWSM / PIX / ASA that would have that much interfaces/Vlans on a single firewall. We do have devices running in multiple context mode which do have a large amount of interfaces/Vlans but naturally only a handfull per Security Context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem that your options would be the following (the ones I can think of now atleast at 2am &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure ACLs for each interface to control the traffic&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;object-groups could be used to make the configurations easier&lt;/LI&gt;&lt;LI&gt;access-list configurations could perhaps be initially generated with some script (?) to get them prepared fast and then easily copy/pasted / configured to the device. ACL and interface naming policy could be made easier for the scripting with only changing the Vlan ID number in the ACL/interface name I suppose. Though this would eliminate any descriptive naming on the purpose of the Vlan question.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure a setup where Security-level allows 180 Vlans to only connect to Internet and ACL define the traffic for the other 20 Vlans&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;180 Vlans would have identical "security-level" value of perhaps 50&lt;/LI&gt;&lt;LI&gt;20 Vlans would have varying "security-level" value perhaps down in order from 100&lt;/LI&gt;&lt;LI&gt;Therefore 180 couldnt connect to eachother or higher security-level interfaces of the 20 Vlans. On the other hand the "outside" interface being "security-level 0" would mean that 180 Vlans could access Internet and no ACLs would be needed for the 180 Vlans&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would go with the harder option that is to configure ACLs for all interfaces I guess you could consider the following things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure an "object-group network BLOCKED-NETWORKS-180"&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;description Vlan range 1 - 180&lt;/LI&gt;&lt;LI&gt;define all of the networks/subnets related to the local 180 Vlans here&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Configure an "object-group network BLOCKED-NETWORKS-20"&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;description Vlan range 181 - 200&lt;/LI&gt;&lt;LI&gt;define all of the networks/subnets related to the local 20 Vlans here&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Configure ACL for each of the 180 Vlans in a very basic format&amp;nbsp; &lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-180-IN remark Deny traffic between Vlans&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-180-IN deny ip any object-group BLOCKED-NETWORKS-180&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-180-IN deny ip any object-group BLOCKED-NETWORKS-20&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-180-IN remark Allow all other traffic&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-180-IN permit ip &lt;NETWORK&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Provided you want to also limit the Vlans 20 from connecting to Vlans 180 you could configure ACLs in the following way&amp;nbsp; &lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN remark Deny traffic to Vlans 180&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN deny ip any object-group BLOCKED-NETWORKS-180&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN remark Lines allowing traffic between Vlans 20&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN permit tcp x.x.x.x y.y.y.y a.a.a.a b.b.b.b eq xyz&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;etc, etc, etc&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN remark Deny all other traffic between Vlans 20&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN deny ip any object-group BLOCKED-NETWORKS-20&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN remark Allow all other traffic&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;access-list VLAN-20-IN permit ip x.x.x.x y.y.y.y any&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I guess as you have yourself noticed, it might be easier just to never configure the "same-security-traffic permit inter-interface" setting and let the security-levels handle most of the work for the 180 Vlans and configure the 20 Vlans with different security-levels and handle all of those interfaces access rules with their own specific ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully there are no errors there (both in command format and my thoughts/logic). Getting abit late here &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully the above was of some help. Rate the answer(s) if you have found the information to be helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 00:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126443#M393574</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T00:49:25Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126444#M393577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for that Jouni.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually 200 VLANs is a hypothetical scenario. We are looking at starting some Could based services. We already have about 30 customers(subnets) and it's growing really fast and I thought it's a good idea to find a easy and proper way to provision future customers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you mentioned security contexts is also some thing I should be looking at. ( Thanks for the tip ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for taking time to explain this. Awesome explanation.. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 01:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126444#M393577</guid>
      <dc:creator>shamax_1983</dc:creator>
      <dc:date>2013-01-02T01:03:16Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126445#M393578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a question that applies but doesnt seem to be answered on this forum.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What if I wanted to create an ACL to block lets say Telnet to a host to router that are on the same subnet, same vlan, inside, on an asa5505.&amp;nbsp; I have disabled same security becaues they are inside with 100 level security.&amp;nbsp; Is this possible? Or am I running a fools errand? &lt;SPAN __jive_emoticon_name="cry" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 198.x.x.x 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone DST 0&lt;/P&gt;&lt;P&gt;dns domain-lookup Outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 167.x.x.x&lt;/P&gt;&lt;P&gt; name-server 167.x.x.x&lt;/P&gt;&lt;P&gt;access-list Block_Telnet extended deny tcp host 192.168.1.4 host 192.168.1.2 eq telnet&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-643.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 1 198.x.x.x netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 172.30.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; network 192.168.1.0&lt;/P&gt;&lt;P&gt; version 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 198.46.122.193 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 115.124.125.0 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 167.x.x.x8 167.x.x.x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.4-192.168.1.25 Inside&lt;/P&gt;&lt;P&gt;dhcpd enable Inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username jrodriguez password ifOxNUbshE8ud5Rm encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home reporting anonymous prompt 2&lt;/P&gt;&lt;P&gt;Cryptochecksum:c1c56941a09c4f7aa99883455c3812d1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 15:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126445#M393578</guid>
      <dc:creator>darthbishop79</dc:creator>
      <dc:date>2013-04-25T15:46:50Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126446#M393581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PC and the Router are connected to same network they naturally dont use the ASA at all to communicate with eachother. They will communicate directly since they can see eachother.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine you could limit the Telnet connections on the actual router. If were talking about a Cisco router this should be pretty easy to do with an ACL attached to the "vty 0 4" configurations. If its some other type of router then naturally I dont know if it has that kind of setting but I would imagine it should have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 15:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126446#M393581</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T15:52:18Z</dc:date>
    </item>
    <item>
      <title>Question regarding same security level ACLs</title>
      <link>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126447#M393582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we are talking about an ASA5505,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this configuration command for the ASA5505 Switch Ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/s8.html#wp1567386"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/command/reference/s8.html#wp1567386&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If lets you isolate hosts on the same Vlan to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 15:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-regarding-same-security-level-acls/m-p/2126447#M393582</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T15:55:53Z</dc:date>
    </item>
  </channel>
</rss>

