<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Any Less Secure Network Rule. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506643#M611007</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im a little confused about the logic of this rule on the ASA 5510, basically i have the following interfaces set to the following security levels:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside: 100&lt;/P&gt;&lt;P&gt;DMZ: 4&lt;/P&gt;&lt;P&gt;Outside: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ has a rule by default which allows any traffic to a less secure network, but when i add a rule on that interface so that the dmz can push limited traffic to the inside network for our exchange server it disapears.&amp;nbsp; Does this mean that now that rule has gone if i want that interface to have internet access via the outside interface i have to add a rule in?&amp;nbsp; or will it still allow traffic to lower interfaces?&amp;nbsp; if not is there anyway to add the rule back in and have additional rules on an interface to a higher security interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:43:17 GMT</pubDate>
    <dc:creator>David Shearing</dc:creator>
    <dc:date>2019-03-11T18:43:17Z</dc:date>
    <item>
      <title>Any Less Secure Network Rule.</title>
      <link>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506643#M611007</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im a little confused about the logic of this rule on the ASA 5510, basically i have the following interfaces set to the following security levels:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside: 100&lt;/P&gt;&lt;P&gt;DMZ: 4&lt;/P&gt;&lt;P&gt;Outside: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ has a rule by default which allows any traffic to a less secure network, but when i add a rule on that interface so that the dmz can push limited traffic to the inside network for our exchange server it disapears.&amp;nbsp; Does this mean that now that rule has gone if i want that interface to have internet access via the outside interface i have to add a rule in?&amp;nbsp; or will it still allow traffic to lower interfaces?&amp;nbsp; if not is there anyway to add the rule back in and have additional rules on an interface to a higher security interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:43:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506643#M611007</guid>
      <dc:creator>David Shearing</dc:creator>
      <dc:date>2019-03-11T18:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Any Less Secure Network Rule.</title>
      <link>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506644#M611009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As access-list is analysed top to bottom, here is what you would need to configure to achieve your requirement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;DMZ-ACL-NAME&gt; permit tcp &lt;DMZ-SUBNET&gt; &lt;MASK&gt; host &lt;EXCHANGE-SERVER&gt; eq &lt;PORT-FOR-EXCHANGE&gt;&lt;/PORT-FOR-EXCHANGE&gt;&lt;/EXCHANGE-SERVER&gt;&lt;/MASK&gt;&lt;/DMZ-SUBNET&gt;&lt;/DMZ-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;DMZ-ACL-NAME&gt; deny ip &lt;DMZ-SUBNET&gt; &lt;MASK&gt; &lt;INSIDE-SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/INSIDE-SUBNET&gt;&lt;/MASK&gt;&lt;/DMZ-SUBNET&gt;&lt;/DMZ-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;DMZ-ACL-NAME&gt; permit ip &lt;DMZ-SUBNET&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/DMZ-SUBNET&gt;&lt;/DMZ-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically you would need to configure traffic that you would like to allow from dmz towards inside first, then ACL to deny traffic from dmz towards inside, and lastly to allow traffic from dmz to internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Sep 2010 07:13:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506644#M611009</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-09-22T07:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Any Less Secure Network Rule.</title>
      <link>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506645#M611011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That more than answers the question.&amp;nbsp; Thanks very much for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Sep 2010 10:24:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/any-less-secure-network-rule/m-p/1506645#M611011</guid>
      <dc:creator>David Shearing</dc:creator>
      <dc:date>2010-09-22T10:24:48Z</dc:date>
    </item>
  </channel>
</rss>

