<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Zones in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012748#M401052</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike, I will try that out . Its a production device so I cant do much of debuggings on that , I do have a planned downtime coming in after a few weeks where I will test this thing &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Aug 2012 06:10:56 GMT</pubDate>
    <dc:creator>communication.boy</dc:creator>
    <dc:date>2012-08-17T06:10:56Z</dc:date>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012743#M401044</link>
      <description>&lt;P&gt;I just got to work with a ASA in production having 8.x OS and I saw some strange thing . DMZ is assigned 70 security level while outside is 0 , while doing packet-tracer from DMZ to Outside ip it gives me a drop by ACL message ( tcp / icmp ) while it should pass it as the data is from higher security level to lower . Once I configure an ACL it starts working properly although I feel there is no need for ACL . There are also STATIC Identity NAT statements for IP addresses/servers I am willing to communicate .&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012743#M401044</guid>
      <dc:creator>communication.boy</dc:creator>
      <dc:date>2019-03-11T23:40:05Z</dc:date>
    </item>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012744#M401045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please paste your packet tracer output, also, which 8.x code? We have 8.0, 8.1,8.2 (and the ones where NAT changes) 8.3 and 8.4. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 02:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012744#M401045</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-08-13T02:21:23Z</dc:date>
    </item>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012745#M401046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply . &lt;/P&gt;&lt;P&gt;Its 8.2(1)&amp;nbsp; . Same OS running on another firewall and it seems to function fine . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp; packet-tracer input DMZ_DB&amp;nbsp; tcp 172.30.17.2 80 172.20.6.1 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.20.6.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;input-interface: DMZ_DB&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: Outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 03:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012745#M401046</guid>
      <dc:creator>communication.boy</dc:creator>
      <dc:date>2012-08-13T03:45:45Z</dc:date>
    </item>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012746#M401047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have just noticed that there is no service-policy global_policy global in the config . There is a default policy-map configured but not applied , zones work using interface security level and insection policy and since there is no inspection policy applied this can be the reason why traffic is not moving from higher security level to lower . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am i on the right track ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 03:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012746#M401047</guid>
      <dc:creator>communication.boy</dc:creator>
      <dc:date>2012-08-13T03:56:10Z</dc:date>
    </item>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012747#M401050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mmmmm, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right on how the Security level work, however, inspections are not required (it is recommended) but not required. Can you turn on logging on debugging and see when you try to make a connection? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better yet, sh run access-group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configured logging &lt;/P&gt;&lt;P&gt;logging buffered debugging &lt;/P&gt;&lt;P&gt;logging on &lt;/P&gt;&lt;P&gt;Show log (once you do the connection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2012 04:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012747#M401050</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-08-13T04:07:43Z</dc:date>
    </item>
    <item>
      <title>ASA Zones</title>
      <link>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012748#M401052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mike, I will try that out . Its a production device so I cant do much of debuggings on that , I do have a planned downtime coming in after a few weeks where I will test this thing &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 06:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-zones/m-p/2012748#M401052</guid>
      <dc:creator>communication.boy</dc:creator>
      <dc:date>2012-08-17T06:10:56Z</dc:date>
    </item>
  </channel>
</rss>

