<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA / Same-security interface filtering with ACLs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551553#M607882</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico is completely right, I doubt it for a second but nothing better than a lab recreation. The first ACL check is the one that corresponds to the same security traffic, I just thought it would bypass any access-group on the interface but it didnt. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;pixfirewall(config)# packet-tracer input inside icmp 200.20.20.2 8 0 10.10.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group test in interface inside&lt;BR /&gt;access-list test extended deny icmp host 200.20.20.2 host 10.10.10.2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So yes, please go ahead and double check the ACL and also try to do this packet tracer command and check your results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 31 Oct 2010 16:01:52 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2010-10-31T16:01:52Z</dc:date>
    <item>
      <title>ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551547#M607876</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5505 which is trunked to a 2960 switch, which is then trunked to another 2960.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 4 vlans trunked to the switches on a physical interface and 4 more networks (including my "outside" and "dmz" interfaces) bound to 4 other physical interfaces on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to avoid having to configure so many NAT rules for inter-vlan communication, I enabled "same-security permit inter-interface". Now all traffic is flowing freely between the networks regardless of the implicit denies I have in place by default on each of my interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read on these forums that simply placing an allow or deny for any protocol on an ACL for the interface will cause unmatched packets to be dropped, but it's not working for me. For example, I have an interface named voip, and an interface named "infrastructure". For test purposes I have a windows node on each network that I can currently ping and telnet to on port 445. I put inbound restrictions on pind and tcp port 445, and I can still get to those hosts from others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to filter traffic (as with direct access vlans). Can anyone give me a hint on how to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551547#M607876</guid>
      <dc:creator>remitprosupport</dc:creator>
      <dc:date>2019-03-11T19:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551548#M607877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you mentioned it should work.&lt;/P&gt;&lt;P&gt;Can you verify that the ACL is applied to the interface correctly (and in the right direction)?&lt;/P&gt;&lt;P&gt;Also by doing ''sh access-list'' you should see hitcounts in those entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the packet tracer utility (from GUI or CLI) you can emulate a packet from one computer on one interface to another computer on another interface and the ASA will report if the traffic is being permitted/denied by the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Oct 2010 22:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551548#M607877</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-10-29T22:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551549#M607878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Frederico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. To test whether I'm doing this correctly, I created a service group on my firewall with all of the TCP/UDP ports necessary for Active Directory authentication (as I would need when this is in prod...). Then I created a rule allowing traffic using this service group from a vlan interface network named "soa" (192.168.150.0/24) to another named "infrastructure" (192.168.100.0/24).The only other rule in place is the implicit deny there by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then used the packet tracer, specifying "soa" as the source interface, a source address on the "soa" network, and the destination address on "infrastructure". The destination port is TCP 139, which is in the service group I created. This passes through the firewall just fine. I then use packet tracer to fire off another test, using the same interface, source and destination IP, and this time TCP port 22, which is _not_ in the service group, and it also passes. If I'm understanding this correctly, shouldn't the test for port 22 have been blocked? I'm also baffled by the output of packet tracer for these tests. When I click on the link that shows which rule allowed the traffic, it points to the implicit deny rule in place on the source (soa) interface. Why would an implicit deny _allow_ traffic through the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm providing my firewall config below. Please let me know if there's any more information you need from me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks in advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ASA Version 8.2(3)&lt;BR /&gt;!&lt;BR /&gt;hostname officefw1&lt;BR /&gt;enable password XXXX encrypted&lt;BR /&gt;passwd XXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 50&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport trunk allowed vlan 100,125,150,200&lt;BR /&gt; switchport trunk native vlan 1&lt;BR /&gt; switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 250&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 251&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; shutdown&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan50&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 10&lt;BR /&gt; ip address 192.158.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt; nameif infrastructure&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan125&lt;BR /&gt; nameif voip&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.125.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan150&lt;BR /&gt; nameif soa&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.150.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt; nameif itdev&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.200.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan250&lt;BR /&gt; nameif systems&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.250.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan251&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.251.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan999&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa823-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup management&lt;BR /&gt;dns domain-lookup systems&lt;BR /&gt;dns domain-lookup infrastructure&lt;BR /&gt;dns domain-lookup voip&lt;BR /&gt;dns domain-lookup soa&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 68.105.28.12&lt;BR /&gt; name-server 68.105.29.11&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group service WindowsShares&lt;BR /&gt; description Ports necessary to access Windows network shares.&lt;BR /&gt; service-object tcp range 135 netbios-ssn&lt;BR /&gt; service-object tcp eq 445&lt;BR /&gt; service-object udp range 135 139&lt;BR /&gt; service-object udp eq 445&lt;BR /&gt;object-group service ActiveDirectoryAuth&lt;BR /&gt; description Ports necessary for Active Directory authentication.&lt;BR /&gt; service-object tcp eq 1025&lt;BR /&gt; service-object tcp eq 1026&lt;BR /&gt; service-object tcp eq 135&lt;BR /&gt; service-object tcp eq 445&lt;BR /&gt; service-object tcp eq domain&lt;BR /&gt; service-object tcp eq ldap&lt;BR /&gt; service-object tcp eq netbios-ssn&lt;BR /&gt; service-object udp eq 88&lt;BR /&gt; service-object udp eq domain&lt;BR /&gt; service-object udp eq netbios-dgm&lt;BR /&gt; service-object udp eq netbios-ns&lt;BR /&gt;object-group service NetworkPrinting&lt;BR /&gt; description Ports necessary for network printing.&lt;BR /&gt; service-object tcp eq 9100&lt;BR /&gt;object-group network SOA_DHCP_Pool_Members&lt;BR /&gt; network-object host 192.168.150.10&lt;BR /&gt; network-object host 192.168.150.11&lt;BR /&gt; network-object host 192.168.150.12&lt;BR /&gt; network-object host 192.168.150.13&lt;BR /&gt; network-object host 192.168.150.14&lt;BR /&gt; network-object host 192.168.150.15&lt;BR /&gt; network-object host 192.168.150.16&lt;BR /&gt; network-object host 192.168.150.17&lt;BR /&gt; network-object host 192.168.150.18&lt;BR /&gt; network-object host 192.168.150.19&lt;BR /&gt; network-object host 192.168.150.20&lt;BR /&gt; network-object host 192.168.150.21&lt;BR /&gt; network-object host 192.168.150.22&lt;BR /&gt; network-object host 192.168.150.23&lt;BR /&gt; network-object host 192.168.150.24&lt;BR /&gt; network-object host 192.168.150.25&lt;BR /&gt; network-object host 192.168.150.26&lt;BR /&gt; network-object host 192.168.150.27&lt;BR /&gt; network-object host 192.168.150.28&lt;BR /&gt; network-object host 192.168.150.29&lt;BR /&gt; network-object host 192.168.150.30&lt;BR /&gt;access-list infrastructure_access_in remark Allow SOA network to auth to AD domain.&lt;BR /&gt;access-list infrastructure_access_in extended permit object-group ActiveDirectoryAuth 192.168.150.0 255.255.255.0 192.168.100.0 255.255.255.0 log notifications&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu systems 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu infrastructure 1500&lt;BR /&gt;mtu voip 1500&lt;BR /&gt;mtu soa 1500&lt;BR /&gt;mtu itdev 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-634-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group infrastructure_access_in in interface infrastructure&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.251.0 255.255.255.0 management&lt;BR /&gt;http 192.168.250.0 255.255.255.0 systems&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet 192.168.250.0 255.255.255.0 systems&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.250.0 255.255.255.0 systems&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.125.10-192.168.125.30 voip&lt;BR /&gt;dhcpd dns 68.15.28.11 68.105.29.12 interface voip&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.150.10-192.168.150.30 soa&lt;BR /&gt;dhcpd dns 68.105.28.12 68.105.29.11 interface soa&lt;BR /&gt;dhcpd enable soa&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 198.123.30.132 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:3960e4c529ccd86bddffb17268b7b370&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 05:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551549#M607878</guid>
      <dc:creator>remitprosupport</dc:creator>
      <dc:date>2010-10-31T05:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551550#M607879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same security traffic will override any ACL that you have apply on the interfaces with the same security. If you take a look at the ASDM says "Permit traffic to flow between same security interfaces". No ACL can override this rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 05:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551550#M607879</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T05:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551551#M607880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also to back me up over here, you can find the information here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;"•&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;You can allow traffic to flow freely between all same security interfaces without access lists" &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s1_72.html#wp1289167"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s1_72.html#wp1289167&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the same security traffic is checked prior an ACL, if this command is present, all the traffic will be allowed. If you want to do filtering, I would suggest you to take out the command and put the ACL's in all of the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 05:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551551#M607880</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T05:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551552#M607881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that is incorrect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA will not allow communication between different interfaces with the same security level by default (this comes from the old days with PIXes).&lt;/P&gt;&lt;P&gt;The ASA now can allow communication between interfaces with the same security level by adding the command ''same-security-traffic permit inter-interface''&lt;/P&gt;&lt;P&gt;And you are correct, the above command allows communication without ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what if I want to filter communication between interfaces with the same security level?&lt;/P&gt;&lt;P&gt;I need the command above and also ACLs restricting the traffic to flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you want to filter communication between interfaces with the same security interface you need:&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;and also filter the traffic with ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 15:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551552#M607881</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-10-31T15:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551553#M607882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico is completely right, I doubt it for a second but nothing better than a lab recreation. The first ACL check is the one that corresponds to the same security traffic, I just thought it would bypass any access-group on the interface but it didnt. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;pixfirewall(config)# packet-tracer input inside icmp 200.20.20.2 8 0 10.10.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;access-group test in interface inside&lt;BR /&gt;access-list test extended deny icmp host 200.20.20.2 host 10.10.10.2&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So yes, please go ahead and double check the ACL and also try to do this packet tracer command and check your results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 16:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551553#M607882</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-31T16:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551554#M607883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico and Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After more experimentation I finally found a combination of commands that works. With same-security permit inter-interface enabled, initially I was able to access any vlan from any other vlan. When I tried adding ACL's nothing was still being blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally found out that I was applying my ACL's to the wrong interface. I was applying them to the destination interface, when I needed to add them to the source interface. Once I added the ACL to the correct interface, I was able to connect to the hosts matched in the allow rules but denied by the explicit rule when it didn't.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, on any interface where I only need to authorize inbound traffic, I added another deny all for all IP traffic that that disabled any outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks guys for all your input!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 Oct 2010 16:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551554#M607883</guid>
      <dc:creator>remitprosupport</dc:creator>
      <dc:date>2010-10-31T16:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551555#M607884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One more thing I thought I'd share with the community, or at least users who are having trouble getting hosts on different networks to communicate through an ASA 5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I had my ACL's worked out, communication between hosts on different interfaces worked fine. Then I added dynamic NAT entries on my ASA to allow hosts on three of the interfaces to get to the internet. I had to of course add rules to allow outbound DNS, HTTP, HTTPS, etc, by everything was working fine. Until I needed to communicate to a host on another interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As it turns out, even with nat-control disabled, if you enable ANY NAT on the firewall, you're then required to NAT _all_ traffic. To see if the dynamic NATs were at fault, I removed it from one interface and sure enough I could communicate to another interface. So to remedy the issue, I had to create pairs of static identity NATs for each pair if interfaces that needed to talk. The trick was not using the identity nat settings under the "dynamic" nat function under ASDM. Instead, I used the "static" nat function, specifying the source and source interface as, for example, my "soa" network, and the destination of the "soa" network, but using the destination interface, such as "infrastructure". I then had to do the same, in reverse, for the other interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, I don't have access to the firewalls at this time, but as soon as I do I'll post the correct config snippets.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Nov 2010 14:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/1551555#M607884</guid>
      <dc:creator>remitprosupport</dc:creator>
      <dc:date>2010-11-08T14:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3389679#M607885</link>
      <description>"....The trick was not using the identity nat settings under the "dynamic" nat function under ASDM. Instead, I used the "static" nat function, specifying the source and source interface as, for example, my "soa" network, and the destination of the "soa" network, but using the destination interface, such as "infrastructure". I then had to do the same, in reverse, for the other interface....."&lt;BR /&gt;Does anyone have the correct configuration for  this command using 8.4 and higher plaftform.  I've used it before on the older 8.3 platform and it worked. Now I have 9.1 platform and can't seem to get it to working.</description>
      <pubDate>Sat, 26 May 2018 19:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3389679#M607885</guid>
      <dc:creator>ronald.wilson1</dc:creator>
      <dc:date>2018-05-26T19:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3391165#M607886</link>
      <description>Just post your old config and we can make it to the after 8.3 NAT config &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;</description>
      <pubDate>Wed, 30 May 2018 11:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3391165#M607886</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-30T11:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3392165#M607887</link>
      <description>&lt;P&gt;Hi Florin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a snippet of the command I used.&amp;nbsp; I'm away from the office today and if you need more just let me know.&amp;nbsp; I'll return tomorrow and grab the config and post it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside3,inside1) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside1,inside3) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 May 2018 19:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3392165#M607887</guid>
      <dc:creator>ronald.wilson1</dc:creator>
      <dc:date>2018-05-31T19:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA / Same-security interface filtering with ACLs</title>
      <link>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3394140#M607888</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;
&lt;P&gt;object network &lt;SPAN&gt;192.168.30.0_obj&lt;/SPAN&gt;&lt;BR /&gt;network 192.168.30.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside1,inside3) source static &lt;SPAN&gt;192.168.30.0_obj&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN&gt;192.168.30.0_obj&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jun 2018 09:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-same-security-interface-filtering-with-acls/m-p/3394140#M607888</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-05T09:16:58Z</dc:date>
    </item>
  </channel>
</rss>

