<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: same security level on ASA with no nat-control in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648541#M566121</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have made all interfaces into one security level (this includes public and internal). However ACL is also in place for all interfaces. Hope this doesn't throw any security concerns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 21 Feb 2011 08:58:23 GMT</pubDate>
    <dc:creator>bsrulez02</dc:creator>
    <dc:date>2011-02-21T08:58:23Z</dc:date>
    <item>
      <title>same security level on ASA with no nat-control</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648539#M566117</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our customer had a scenario where interfaces with different security level and with no nat-control statement was configured.&amp;nbsp; Interfaces between which he enabled static nat started dropping other traffic with error that no translation found. (This is the background for below discussion)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Due to this customer is asking us to deploy his new firewall with all interfaces in same security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;New firewall configuration summary:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Few interface on firewall is configured with same security level&lt;BR /&gt;2. "same security level command" has been enabled on the firewall&lt;BR /&gt;3. On all interface ACL is configured to inspect traffic coming in.&lt;BR /&gt;4. no nat-control (default) is configured in firewall&lt;/P&gt;&lt;P&gt;5. Interface connected to public network is in different security level (customer is asking to put all interface in same security level)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What all security issues will be involved if we use all interface in same security level, inspite of ACL to control traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there really any nat issue which Cisco has identified when we use interfaces in same security level and with no nat-control satement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Related Product:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5520 with version 7.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648539#M566117</guid>
      <dc:creator>bsrulez02</dc:creator>
      <dc:date>2019-03-11T19:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: same security level on ASA with no nat-control</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648540#M566120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same security level actually has nothing to do with NAT. To disable NAT, you use the command "no nat-control", and once you disable NAT, you can pass traffic from low to high or high to low security level without requiring any NAT. However, once you have a NAT statement on that interface, you pretty much disable the "no nat-control", ie: you will have to explicitly configure either static NAT or dynamic NAT between interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By having the same security level, you can freely pass traffic between interfaces with the same security level without the need to have access-list applied to the interface. If you however have an access-list applied to the interface, then you still require to explicitly allow traffic that you would like to allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the reason why people have same security level interfaces are if those interfaces connect to the internal network and they want traffic to move freely between the interfaces without requiring any access-list, and in combination with "no nat-control" they also do not need any translation configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 10:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648540#M566120</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-18T10:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: same security level on ASA with no nat-control</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648541#M566121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have made all interfaces into one security level (this includes public and internal). However ACL is also in place for all interfaces. Hope this doesn't throw any security concerns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Feb 2011 08:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648541#M566121</guid>
      <dc:creator>bsrulez02</dc:creator>
      <dc:date>2011-02-21T08:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: same security level on ASA with no nat-control</title>
      <link>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648542#M566122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If ACL is placed then there is no problem.&lt;/P&gt;&lt;P&gt;The reason why people use the same security level is to allow those interfaces to flow freely without the requirement of ACL, however, you can configure that with no problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Feb 2011 09:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/same-security-level-on-asa-with-no-nat-control/m-p/1648542#M566122</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-21T09:19:49Z</dc:date>
    </item>
  </channel>
</rss>

