<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL and default traffic flow from higher to lower interface ques in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940807#M436846</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL replaces the security levels, however the ASA also needs NAT for traffic between interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example; source IP needs to be NAT'ed from high to lower security level, so even with ACL the security level still matters for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only until version 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 May 2012 19:38:41 GMT</pubDate>
    <dc:creator>lcambron</dc:creator>
    <dc:date>2012-05-15T19:38:41Z</dc:date>
    <item>
      <title>ACL and default traffic flow from higher to lower interface question</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940804#M436842</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This may be a fairly simple question to answer, but I did some searching and couldn't find a good answer. By default ASA's will allow traffic from a high security interface to a lower secuirt interface. Such as the inside(100) to outside(0) and dmz(50) or dmz to outside(0). If you apply an ACL incoming on that interface is the higher to lower interface behavior still present? I want to do some egrees filtering on my dmz interface, but still want it to be able to access the outside network. I want to block my inside interface from being able to access my DMZ at all. Any good suggestions on how to do this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance! &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940804#M436842</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2019-03-11T23:07:31Z</dc:date>
    </item>
    <item>
      <title>ACL and default traffic flow from higher to lower interface ques</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940805#M436844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL bypasses the high to lower rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to block access from inside to DMZ, you can change security level on DMZ to 100.&lt;/P&gt;&lt;P&gt;Or if you want to use ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int g0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;ip addresses 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int g0/2&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;ip address 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list name deny ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list name permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group name in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 18:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940805#M436844</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-05-15T18:14:58Z</dc:date>
    </item>
    <item>
      <title>ACL and default traffic flow from higher to lower interface ques</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940806#M436845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Felipe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That does help, but I need clafication on one part. Does the Access-list work along side the default behavior to allow traffic from a higher security interface to a lower secuirty interface or does it replaces that behavior? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 19:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940806#M436845</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2012-05-15T19:09:09Z</dc:date>
    </item>
    <item>
      <title>ACL and default traffic flow from higher to lower interface ques</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940807#M436846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL replaces the security levels, however the ASA also needs NAT for traffic between interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example; source IP needs to be NAT'ed from high to lower security level, so even with ACL the security level still matters for NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only until version 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 19:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940807#M436846</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-05-15T19:38:41Z</dc:date>
    </item>
    <item>
      <title>ACL and default traffic flow from higher to lower interface ques</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940808#M436847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanks for the info! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An example of this would be if my inside interface was 192.168.1.0 and my dmz was 192.168.2.0. I would need a statement like this? static (inside,dmz) 192.168.2.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Alan &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 19:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940808#M436847</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2012-05-15T19:56:39Z</dc:date>
    </item>
    <item>
      <title>ACL and default traffic flow from higher to lower interface ques</title>
      <link>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940809#M436848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2012 21:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-and-default-traffic-flow-from-higher-to-lower-interface/m-p/1940809#M436848</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-05-15T21:15:37Z</dc:date>
    </item>
  </channel>
</rss>

