<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM config issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186231#M835209</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Coming from the PIX I didn't give the inside to outside acl any thought. I had gone over my config time and time and compare to the documentation. When tested and it didn't work I was at a loss as to what to try. Then after starting this post I saw the issue. I found reference in the documentation about it but it didn't really stand out. It would have saved me hours of testing and backing out. Its working now and I can move ahead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Jun 2009 13:33:53 GMT</pubDate>
    <dc:creator>cef2lion2</dc:creator>
    <dc:date>2009-06-01T13:33:53Z</dc:date>
    <item>
      <title>FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186224#M835199</link>
      <description>&lt;P&gt;I'm trying toget a FWSM working on a 6513 chassis running IOS. The FWSM is running 4.0(5). I'm using the MSFC behind the FWSM model. I created a SVI and presented it to the firewall as the inside interface. I created a VLAN on the 6513 and presented it to the FWSM as the outside interface. I defined it IP address in the FWSM interface. I created a default route on the FWSM pointing to the Internet address on the outside of the FWSM outside interface. I have route statements to the inside for all internal subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can telnet to the FWSM inside address from the 6513 LAN. No inside users can access the network/Internet on the outside of the FWSM. We are not using NAT. All internal devices can access other internal devices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside interface is security level of 100. The outside interface is security level of 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FWSM is replacing an external PIX525 currently in use. During off hours I disconnect the PIX and give the PIX inside and outside addresses to the FWSM. I can't see what I might be missing? While I telnet into the FWSM I can ping the IP just outside the outside interface. I know the FWSM can see outside but the users can't. I have an interface on the 6513 in the VLAN of the outside interface and that is where I connect external to our network. I cleared arp while testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed our PIX has an implicit rule for the inside interface. It permits all traffic to a less secure network such as our outside interface. That implicit rule on the inside interface is missing in the FWSM. I think the PIX added that rule by default and it looks like the FWSM doesn't. Maybe that is where my issue is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186224#M835199</guid>
      <dc:creator>cef2lion2</dc:creator>
      <dc:date>2019-03-11T15:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186225#M835200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added a rule to allow inside users to access the outside interface and things started working. I was tripped up by the PIX doing that for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 May 2009 17:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186225#M835200</guid>
      <dc:creator>cef2lion2</dc:creator>
      <dc:date>2009-05-31T17:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186226#M835201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default the PIX/ASA platform will allow traffic from the higher security to lower security interface with out an acl applied on the higher security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is diff. in case of the FWSM. Irrespective of the security level on the individual interface, you need to allow the flow via access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 10:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186226#M835201</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-06-01T10:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186227#M835202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Given so. Is the security level on an interface of the FWSM of any more value then a label for the Interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 12:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186227#M835202</guid>
      <dc:creator>cef2lion2</dc:creator>
      <dc:date>2009-06-01T12:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186228#M835203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two pieces of the puzzle. Interface ACLs and NAT. If you are using no nat-control, then using the security level does not make a real difference. However if you have nat-control, then the security levels can give you same benefits like a PIX/ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 12:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186228#M835203</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2009-06-01T12:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186229#M835205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It sure does in case of same-security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the interfaces are created on the firewall they are assigned a PIF&lt;/P&gt;&lt;P&gt;value. You can determine an interfaces PIF with the command "show np 3&lt;/P&gt;&lt;P&gt;pif vlan vlan#"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the value, that the firewall uses to decide which interface is the "inside" where the xlate was built.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An xlate will be built for the interface with the lower PIF value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 13:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186229#M835205</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-06-01T13:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186230#M835207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FWSM platform.&lt;/P&gt;&lt;P&gt;With nat-control&lt;/P&gt;&lt;P&gt;with inside 100 level security&lt;/P&gt;&lt;P&gt;with outside 0 level security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You must allow inside to outside flow via an acl applied on the inside interface. Otherwise traffic will not flow from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 13:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186230#M835207</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-06-01T13:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM config issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186231#M835209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Coming from the PIX I didn't give the inside to outside acl any thought. I had gone over my config time and time and compare to the documentation. When tested and it didn't work I was at a loss as to what to try. Then after starting this post I saw the issue. I found reference in the documentation about it but it didn't really stand out. It would have saved me hours of testing and backing out. Its working now and I can move ahead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2009 13:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-config-issue/m-p/1186231#M835209</guid>
      <dc:creator>cef2lion2</dc:creator>
      <dc:date>2009-06-01T13:33:53Z</dc:date>
    </item>
  </channel>
</rss>

