<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Questions / Best Practices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716873#M557166</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you want to allow internet traffic from the DMZ and deny traffic to the inside you should add the deny statement from DMZ subnet to inside subnert at the beggining on the DMZ ACLs and then add the permit from DMZ to ANY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Apr 2011 21:58:36 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-04-25T21:58:36Z</dc:date>
    <item>
      <title>ASA Questions / Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716872#M557161</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm working on setting up a new ASA 5550, and have run into a question that I hope is easily answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have 4 interfaces, SL100 Inside, SL80 DMZ1, SL50 DMZ2, and SL0 Outside.&amp;nbsp; I was under the impression that each interface, depending on security level would pass traffic from higher levels to lower, but not allow traffic being generated from SL80 to SL100. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to accomplish is that any hosts on my SL100 Inside interface can access the "internet" which is connected to my outside interface of the ASA, which was very simple, just a permit internal subnets eq www / https / etc... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, my DMZ subnets need to access a few servers on my internal interface, and need outbound access to the world as well.&amp;nbsp; Thinking that all traffic from my lower SL interfaces on the ASA would be denied, I entered a permit IP / DMZ subnet ------&amp;gt; any.&amp;nbsp; This worked great for giving my DMZ hosts access to the internet, but it also permit traffic from the DMZ to hosts on my Inside interface as well.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My initial thoughts are to permit www / https to the DMZ subnets to any, and to use deny statements at my Inside interface ACL's from the DMZ IP's that I don't want these systems touching, but I'm just looking some opinions on the "right" way to accomplish this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks -&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;J&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716872#M557161</guid>
      <dc:creator>Jkloza_2</dc:creator>
      <dc:date>2019-03-11T20:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Questions / Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716873#M557166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you want to allow internet traffic from the DMZ and deny traffic to the inside you should add the deny statement from DMZ subnet to inside subnert at the beggining on the DMZ ACLs and then add the permit from DMZ to ANY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Apr 2011 21:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716873#M557166</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-04-25T21:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Questions / Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716874#M557171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to add to what Paul has said, if we have a rule to allow just Internet access, it is usually preceeded with an explicit deny to RFC1918 addresses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object-group network RFC1918&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; network-object 10.0.0.0 255.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; network-object 172.16.0.0 255.240.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; network-object 192.168.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list dmz_acl deny ip any object-group RFC1918&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list dmz_acl permit tcp object-group DMZ-Net any object-group WEB-PORTS&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would add any other permits, such as to your inside network, above these lines.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Apr 2011 15:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-questions-best-practices/m-p/1716874#M557171</guid>
      <dc:creator>john.dowson</dc:creator>
      <dc:date>2011-04-26T15:18:21Z</dc:date>
    </item>
  </channel>
</rss>

