<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 and ACL between two subinterfaces with the same securit in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001207#M440696</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3659784#3659784"&gt;https://supportforums.cisco.com/message/3659784#3659784&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jun 2012 03:06:20 GMT</pubDate>
    <dc:creator>Tagir Temirgaliyev</dc:creator>
    <dc:date>2012-06-19T03:06:20Z</dc:date>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001206#M440695</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5520 running 8.0(3) with two Subinterfaces configured like this:&lt;/P&gt;&lt;P&gt;=================================&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.72&lt;/P&gt;&lt;P&gt; description VLAN 72&lt;/P&gt;&lt;P&gt; vlan 72&lt;/P&gt;&lt;P&gt; nameif DMZ72&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.72.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.90&lt;/P&gt;&lt;P&gt; description VLAN 90&lt;/P&gt;&lt;P&gt; vlan 90&lt;/P&gt;&lt;P&gt; nameif DMZ90&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.90.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;=================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(notice that they have the same security-level)&lt;/P&gt;&lt;P&gt;I need to control the traffic between them with ACLs so I in ASDM unchecked "enable traffic between two or more interfaces with same security level" and "enable traffic between two or more hosts connected to the same interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I cannot ping from one Vlan to the other, as expected,,, but I tried many different ACLs and I cannot ping or telnet to the other side from either one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really would like some advise on what ACLs to configure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001206#M440695</guid>
      <dc:creator>DotTest37</dc:creator>
      <dc:date>2019-03-11T23:20:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001207#M440696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3659784#3659784"&gt;https://supportforums.cisco.com/message/3659784#3659784&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 03:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001207#M440696</guid>
      <dc:creator>Tagir Temirgaliyev</dc:creator>
      <dc:date>2012-06-19T03:06:20Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001208#M440697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I checked that post already, but it looks like they had a diffferent problem (he had the 'enable traffic between int with same security lavel" ENABLED,,, I actually have it the other way around.&lt;/P&gt;&lt;P&gt;If I have it ENABLED, then all traffic is allowed, even withouth ACL,, by default,, and thats what I need to avoid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 03:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001208#M440697</guid>
      <dc:creator>DotTest37</dc:creator>
      <dc:date>2012-06-19T03:19:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001209#M440698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to enable the same-security on the ASA, although you can restrict the traffic between the two, with an access-list like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.72&lt;/P&gt;&lt;P&gt; description VLAN 72&lt;/P&gt;&lt;P&gt; vlan 72&lt;/P&gt;&lt;P&gt; nameif DMZ72&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.72.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.90&lt;/P&gt;&lt;P&gt; description VLAN 90&lt;/P&gt;&lt;P&gt; vlan 90&lt;/P&gt;&lt;P&gt; nameif DMZ90&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.90.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acces-list dmz90_access_in deny ip 192.168.80.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list dmz90_access_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz90_access_in in interface DMZ90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how you restrict traffic, if you dont want any specific subnet in dmz90 to go out or to a specific destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover if you want to restrict traffic between the two DMZ's then why do you want to keep same security level for them, make one as 49 and the more secured one as 50, then you would need only an acl to allow and deny traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 06:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001209#M440698</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-06-19T06:56:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001210#M440699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have multiple Dev Teams, and we are trying to host small silos for their apps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Silo 1 = App 1 = Vlan1&lt;/P&gt;&lt;P&gt;Silo 2 = App 2 = Vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Devs that access one Silo, should not access the other one (SSH, Telnet, etc)&lt;/P&gt;&lt;P&gt;But those two Silos needs to interact using HTTPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I make the interfaces different security levels, traffic wont be allow on one directions, but it will on the other one, right?&lt;/P&gt;&lt;P&gt;If I do same-security on the ASA, I would have to add specific rules everytime I add a new Silo (I wanted to avoid that to make it easiers, but it might look that this is what I need to do)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion is great for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 13:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001210#M440699</guid>
      <dc:creator>DotTest37</dc:creator>
      <dc:date>2012-06-19T13:18:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001211#M440700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is true, if everytime you add a user you would need to allow that in the ACL, there's no other way for it. But if you keep them on the diff levels, then you would need to apply acl on the lower interface to allow the traffic, the higher security interface can access anything on the lower one without an ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 13:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001211#M440700</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-06-19T13:50:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001212#M440701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, probably the right answer would be:&lt;/P&gt;&lt;P&gt;1- Make the VLANs subinterfaces with the same Sec Level&lt;/P&gt;&lt;P&gt;2- Allow the same-security&lt;/P&gt;&lt;P&gt;3- Right at the moment of creating the subnets and before putting them in production, create ACLs that explicitly block all traffic between them, and create additional ACLs for the allows traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that sounds like a clean process?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 16:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001212#M440701</guid>
      <dc:creator>DotTest37</dc:creator>
      <dc:date>2012-06-19T16:21:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001213#M440702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sven,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is what you would need to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 18:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001213#M440702</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-06-19T18:59:26Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001214#M440703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun Rao&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying the sequence I got from this thread.&lt;/P&gt;&lt;P&gt;Now I have an issue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont kknow how to make the vlans to go out to the internet.&lt;/P&gt;&lt;P&gt;The rule I explicitly add to block traffic any to any on each vlan, is also preventing them from going out to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know what to do here.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sven&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Jun 2012 16:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001214#M440703</guid>
      <dc:creator>DotTest37</dc:creator>
      <dc:date>2012-06-20T16:42:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 and ACL between two subinterfaces with the same securit</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001215#M440704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at one of my replies above you would notice in the example above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acces-list dmz90_access_in deny ip 192.168.80.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list dmz90_access_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz90_access_in in interface DMZ90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to configure a permit any any statement at&amp;nbsp; the bottom&amp;nbsp; so that all other hosts are alllowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2012 01:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-and-acl-between-two-subinterfaces-with-the-same/m-p/2001215#M440704</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-06-21T01:21:35Z</dc:date>
    </item>
  </channel>
</rss>

