<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The ACL doesn´t work with the same security level in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383288#M749515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you have ACLs both in and out, you will have to go through and verify that it's allowed through both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Feb 2010 14:14:46 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2010-02-15T14:14:46Z</dc:date>
    <item>
      <title>The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383282#M749448</link>
      <description>&lt;P&gt;I have an ASA, with the same security level in all inter&lt;SPAN style="background-color: #f8fafd;"&gt;faces. I define an ACL in the interface &lt;EM&gt;A&lt;/EM&gt;. When I origin a new connection from interface&lt;EM&gt; B&lt;/EM&gt; to web server (in side of interface &lt;EM&gt;A&lt;/EM&gt;) &lt;EM&gt;, &lt;/EM&gt;If I try to deny this access in the ACL apply at the interface A, the ACL is not working well I don´t see any matchs but if I configure a capture I see the flow correctly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Do you have any idea or what could be happens?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;If you want more details, please let me know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks for your help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Emilio&amp;nbsp; Borbolla&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383282#M749448</guid>
      <dc:creator>emilio.borbolla</dc:creator>
      <dc:date>2019-03-11T17:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383283#M749464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Sorry, I forget to comment that, I am using&amp;nbsp; "same-security-traffic permit inter-interface" command.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 19:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383283#M749464</guid>
      <dc:creator>emilio.borbolla</dc:creator>
      <dc:date>2010-02-12T19:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383284#M749475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the relevant part of the ACL and the access-group configuration lines?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 20:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383284#M749475</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-02-12T20:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383285#M749488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The coneccion begins from IP 200.4.145.97 in R5 interface to IP 200.33.150.202, at the begin I undertand the syc pass, but the aswer should be dropp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif R5&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 204.124.107.254 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif Reduno&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.105.191.81 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;access-list 110 line 1 extended permit ip 204.124.106.128 255.255.255.128 host 201.147.131.21&lt;BR /&gt;access-list 110 line 2 extended permit ip 204.124.106.128 255.255.255.128 204.124.107.0 255.255.255.0 &lt;BR /&gt;access-list 110 line 3 extended permit ip 204.124.106.128 255.255.255.128 204.124.104.240 255.255.255.248 &lt;BR /&gt;access-list 110 line 4 extended permit ip 204.124.106.128 255.255.255.128 200.4.145.0 255.255.255.0 &lt;BR /&gt;access-list 110 line 5 extended permit tcp host 200.4.155.230 204.124.104.240 255.255.255.248 &lt;BR /&gt;access-list 110 line 6 extended permit tcp host 200.4.155.230 200.4.145.0 255.255.255.128 &lt;BR /&gt;access-list 110 line 7 extended permit tcp host 200.33.150.202 204.124.104.240 255.255.255.248 &lt;BR /&gt;access-list 110 line 8 extended deny tcp host 200.33.150.202 200.4.145.0 255.255.255.128 &lt;BR /&gt;!&lt;BR /&gt;access-group 110 in interface Reduno&lt;BR /&gt;!&lt;BR /&gt;access-list ebg line 1 extended permit ip host 200.33.150.202 200.4.145.0 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;FWPIX525-NOC# sh capture&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;FWPIX525-NOC# sh capture captura&lt;BR /&gt;643 packets captured&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 16:38:21.925611 200.33.150.202.80 &amp;gt; 200.4.145.97.1063: S 3203090713:3203090713(0) ack 2654701753 win 16384 &lt;MSS 1380=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 16:38:21.954052 200.33.150.202.80 &amp;gt; 200.4.145.97.1063: P 3203090714:3203091080(366) ack 2654702155 win 65133&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 16:38:21.990488 200.33.150.202.80 &amp;gt; 200.4.145.97.1063: P 3203091080:3203091546(466) ack 2654702565 win 64723&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 16:38:22.017821 200.33.150.202.80 &amp;gt; 200.4.145.97.1063: . 3203091546:3203092806(1260) ack 2654702976 win 64312&lt;BR /&gt;.....&lt;BR /&gt;....&lt;BR /&gt;....&lt;/MSS&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 20:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383285#M749488</guid>
      <dc:creator>emilio.borbolla</dc:creator>
      <dc:date>2010-02-12T20:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383286#M749501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please post the ACL assigned to R5? The access-group config line would help too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 20:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383286#M749501</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-02-12T20:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383287#M749508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Clark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t remmember about the out ACL that I have in the Reduno interface, maybe my ACL should apply there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group master in interface R5&lt;BR /&gt;access-group 110 in interface Reduno&lt;BR /&gt;access-group 105 out interface Reduno&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list master extended permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;FWPIX525-NOC# sh run access-list 105&lt;BR /&gt;access-list 105 extended permit ip 204.124.104.240 255.255.255.240 any&lt;BR /&gt;access-list 105 extended permit ip 200.4.145.0 255.255.255.128 any&lt;BR /&gt;access-list 105 extended permit ip 204.124.107.224 255.255.255.240 any&lt;BR /&gt;access-list 105 extended permit ip host 201.147.131.21 any&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 204.124.106.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 204.124.106.0 255.255.255.0 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.4.155.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.4.155.0 255.255.255.0 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.4.157.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.4.157.0 255.255.255.0 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.33.137.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.33.137.0 255.255.255.0 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.33.150.0 255.255.255.0 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.131 200.33.150.0 255.255.255.0 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.178 eq ftp&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.178 eq ftp-data&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.178 eq telnet&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.178 gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.178 eq smtp&lt;BR /&gt;access-list 105 extended permit udp host 204.124.107.133 any eq domain&lt;BR /&gt;access-list 105 extended permit udp host 204.124.107.133 any gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 any gt 1024&lt;BR /&gt;access-list 105 extended permit udp host 204.124.107.131 any eq domain&lt;BR /&gt;access-list 105 extended permit udp host 204.124.107.131 any gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.151 host 192.100.183.104 eq www&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.151 host 192.100.183.104 gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.104 eq www&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.133 host 192.100.183.104 gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.146 host 192.100.183.104 eq www&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.146 host 192.100.183.104 gt 1024&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.158 any eq smtp&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.134 any&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.35 any&lt;BR /&gt;access-list 105 extended permit ip host 192.100.183.254 host 192.100.183.253&lt;BR /&gt;access-list 105 extended permit ip 204.124.107.208 255.255.255.240 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip 204.124.107.88 255.255.255.248 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.139 host 192.100.183.183&lt;/P&gt;&lt;P&gt;access-list 105 extended permit ip host 204.124.107.141 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.70 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.148 host 192.100.183.183&lt;BR /&gt;access-list 105 extended permit ip 172.28.1.0 255.255.255.0 host 192.100.183.183&lt;/P&gt;&lt;P&gt;access-list 105 extended permit ip 204.124.107.208 255.255.255.240 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip 204.124.107.88 255.255.255.248 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.139 host 192.100.183.161&lt;/P&gt;&lt;P&gt;access-list 105 extended permit ip host 204.124.107.141 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.70 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip host 204.124.107.148 host 192.100.183.161&lt;BR /&gt;access-list 105 extended permit ip 172.28.1.0 255.255.255.0 host 192.100.183.161&lt;/P&gt;&lt;P&gt;access-list 105 extended permit tcp host 204.124.107.2 host 192.100.183.98&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.3 host 192.100.183.98&lt;BR /&gt;access-list 105 extended permit tcp host 204.124.107.116 host 192.100.183.178 eq smtp&lt;BR /&gt;access-list 105 extended deny ip 189.254.64.0 255.255.255.0 any&lt;BR /&gt;access-list 105 extended deny ip any 192.100.183.176 255.255.255.240&lt;BR /&gt;access-list 105 extended deny ip any 192.100.183.96 255.255.255.240&lt;BR /&gt;access-list 105 extended deny ip any 192.100.183.32 255.255.255.240&lt;BR /&gt;access-list 105 extended deny ip any host 200.4.157.56&lt;BR /&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 172.30.38.0 255.255.255.0&lt;BR /&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 10.254.3.0 255.255.255.0&lt;BR /&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 host 212.179.43.225&lt;/P&gt;&lt;P&gt;access-list 105 extended permit ip 152.148.1.0 255.255.255.0 host 212.179.43.228&lt;/P&gt;&lt;P&gt;access-list 105 extended permit ip 204.124.107.0 255.255.255.0 any&lt;BR /&gt;access-list 105 extended permit ip 172.28.1.0 255.255.255.0 any&lt;BR /&gt;access-list 105 extended permit ip 172.16.1.0 255.255.255.0 any&lt;BR /&gt;access-list 105 extended permit ip host 10.105.191.81 host 10.105.191.86&lt;BR /&gt;FWPIX525-NOC#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 22:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383287#M749508</guid>
      <dc:creator>emilio.borbolla</dc:creator>
      <dc:date>2010-02-12T22:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: The ACL doesn´t work with the same security level</title>
      <link>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383288#M749515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you have ACLs both in and out, you will have to go through and verify that it's allowed through both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Feb 2010 14:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-acl-doesn-t-work-with-the-same-security-level/m-p/1383288#M749515</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-02-15T14:14:46Z</dc:date>
    </item>
  </channel>
</rss>

