<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks for explanation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950575#M440363</link>
    <description>&lt;P&gt;Thanks for explanation Christopher&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still I would like to&amp;nbsp;know how to decide security level between 0 to 100 of any interface.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jun 2015 08:46:55 GMT</pubDate>
    <dc:creator>harshalp</dc:creator>
    <dc:date>2015-06-08T08:46:55Z</dc:date>
    <item>
      <title>ASA Firewall interface security levels and access-lists</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950570#M440353</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to understand the correlation between ACLs and interface security levels on an ASA.&lt;/P&gt;&lt;P&gt;I am working with an ASA using both!!??&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Assumptions&lt;/STRONG&gt;: Any ACL applied below is on the transmit wire (interface) only in the inbound direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenario 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;high security interface level to low interface security level.&lt;/P&gt;&lt;P&gt;No ACL = passes as I expect&lt;/P&gt;&lt;P&gt;What happens if there is an ACL denying a test packet in the above scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Scenario 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Low security to high&lt;/P&gt;&lt;P&gt;No ACL = Traffic will not pass as I expect&lt;/P&gt;&lt;P&gt;What happens if there is an ACL permitting the above test packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have trawled through documentation on the web-site and cannot find examples including both (ACL usage in conjunction with security-levels).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance for any help offered.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950570#M440353</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2019-03-11T23:24:13Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall interface security levels and access-lists</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950571#M440355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Security levels on interfaces on the ASA are to define how much you trust traffic from that interface.&amp;nbsp; Level 100 is the most trusted and 0 is the least trusted.&amp;nbsp; Some people will use 50 for a DMZ since you trust it more then internet traffic, but less then internal traffic.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how I look at security levels:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A security level of 1 to 99 always two implicit ACL's.&amp;nbsp; One to allow traffic to lower security interfaces and one to deny traffic to higher level security interfaces.&amp;nbsp; Security level 100 has an implicit permit ip any any and level 0 has an implicit deny ip any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In scenario 1, if you apply a deny ACL to a security level of 1-99, it will remove that implicit permit ip any any and deny traffic according to the ACL and all traffic.&amp;nbsp; You would have to create an ACL to allow whatever other traffic you want.&amp;nbsp; If this ACL is applied to a security level of 100, it will essentially deny all traffic since it will remove the implicit permit ip any any ACL.&amp;nbsp; Again, you will have to create another ACL to allow traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In scenario 2, if you apply a permit ACL to a security level 0 interface, it will allow that traffic, but still deny all other traffic.&amp;nbsp; However, if the security level is 1-100, it will all traffic to that destination and remove the implicit ACLs (permit and deny)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jun 2012 16:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950571#M440355</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2012-06-28T16:04:11Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall interface security levels and access-lists</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950572#M440357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;From High to Low &amp;gt; By default permitted&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From Low to High&amp;gt; You need ACL in inbound direction on interface on which traffic lands.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Till 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1) If nat-control is enable you need natting along with ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) If nat-control is disabled you just need ACL.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You do not need nating.You just need ACL for allowing communication between different zones.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 04:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950572#M440357</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-06-29T04:40:09Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall interface security levels and access-lists</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950573#M440359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Therefore, hence; Security level is priority??&lt;/P&gt;&lt;P&gt;A: Unless security 0 (x) = nothing passes unless inbound ACL on interface X says so (permits it)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;B: Security level 2 (X) towards security level 1 (Y). If interface X has a 'deny IP any any' inbound ACL = traffic will still flow??&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;What about established tcp flows? Is return 'established' traffic affected by ACLs and security levels?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 08:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950573#M440359</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2012-06-29T08:00:07Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall interface security levels and access-lists</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950574#M440361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; If you have the security levels in place, the ASA maintains a stateful connection and allows return traffic without additional configuration in most cases.&amp;nbsp; The only other though you might have to worry about is protocls that may source from a different port - FTP for instance.&amp;nbsp; In this case, it would be handeled with inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this posts answers your question or is helpful, please consider rating it and/or marking as answered.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 18:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950574#M440361</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2012-06-29T18:40:39Z</dc:date>
    </item>
    <item>
      <title>Thanks for explanation</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950575#M440363</link>
      <description>&lt;P&gt;Thanks for explanation Christopher&amp;nbsp;&lt;/P&gt;&lt;P&gt;But still I would like to&amp;nbsp;know how to decide security level between 0 to 100 of any interface.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2015 08:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950575#M440363</guid>
      <dc:creator>harshalp</dc:creator>
      <dc:date>2015-06-08T08:46:55Z</dc:date>
    </item>
    <item>
      <title>Well some of it you are going</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950576#M440366</link>
      <description>&lt;P&gt;Well some of it you are going to just have to decide on.&amp;nbsp; In general, the outside interface has a security level of "0", the DMZ interface has a security level of "50" and the inside interface has a security level of "100".&amp;nbsp; The logic here is that interfaces with lower security levels cannot access nodes behind a higher level interface with an ACL permitting it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2015 12:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-interface-security-levels-and-access-lists/m-p/1950576#M440366</guid>
      <dc:creator>Christopher Bell</dc:creator>
      <dc:date>2015-06-15T12:59:04Z</dc:date>
    </item>
  </channel>
</rss>

