<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access rules versus security level in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975914#M401591</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know if it is industry standard to do an implicit any any IP Permit on the incoming Inside interface? It just seems this is less secure than access rules that are more specific like going from Machine A in DMZ to Machine X in Inside LAN. Does that make sense? Thank you for the reply. It helped clarify things.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jul 2012 19:29:01 GMT</pubDate>
    <dc:creator>Tony Carman</dc:creator>
    <dc:date>2012-07-26T19:29:01Z</dc:date>
    <item>
      <title>Access rules versus security level</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975912#M401586</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Overview/Facts&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall: ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security Level:&lt;/P&gt;&lt;P&gt;Outside - 0&lt;/P&gt;&lt;P&gt;DMZ - 10&lt;/P&gt;&lt;P&gt;Inside - 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Rules in Question (ALL INCOMING):&lt;/P&gt;&lt;P&gt;Outside - implicit any | any | IP | DENY&lt;/P&gt;&lt;P&gt;DMZ - implicit any | any | IP | PERMIT&lt;/P&gt;&lt;P&gt;Inside - implicit any | any | IP | PERMIT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Situation/Confusion&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is my understanding, please correct me if I am wrong, the security level requires that the Inside interface must initiate traffic to the DMZ or Outside interface for traffic to come back in the Inside interface. With that said, I seen the access rule for the Inside interface that is implicit and gives IP permission from any to any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Question&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wouldn't the fact that the Inside interface has an implicit IP any/any permit access rule totally negate the reasoning behind having a DMZ with a security level of 10 and and Inside interface with a security level of 100? I guess what I am trying to say is, is it a good idea to have this rule? Wouldn't it be more security if you set access rules for specific DMZ appliances that will be talking back to the Inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your time.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975912#M401586</guid>
      <dc:creator>Tony Carman</dc:creator>
      <dc:date>2019-03-11T23:35:08Z</dc:date>
    </item>
    <item>
      <title>Access rules versus security level</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975913#M401589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA by default without any access list, you will have a implicit permit ip any to any less secure networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this been said by default you will be able to go from DMZ to outisde with no problem, but no to Inside and from Inside to outside or DMZ wiout problem. Just needing NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the DMZ to access you indeed will net to add access rules to be able to do this, you can be more explicit if you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To add specific ACL to access on inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this will help to answer you question&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 18:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975913#M401589</guid>
      <dc:creator>alejands</dc:creator>
      <dc:date>2012-07-26T18:53:24Z</dc:date>
    </item>
    <item>
      <title>Access rules versus security level</title>
      <link>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975914#M401591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know if it is industry standard to do an implicit any any IP Permit on the incoming Inside interface? It just seems this is less secure than access rules that are more specific like going from Machine A in DMZ to Machine X in Inside LAN. Does that make sense? Thank you for the reply. It helped clarify things.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2012 19:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rules-versus-security-level/m-p/1975914#M401591</guid>
      <dc:creator>Tony Carman</dc:creator>
      <dc:date>2012-07-26T19:29:01Z</dc:date>
    </item>
  </channel>
</rss>

