<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access from lower security interface to higher in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131261#M892400</link>
    <description>&lt;P&gt;I've got two internal networks, y and z. y is the most secure, and is allowed access to z. Both are allowed full access to the internet and some hosts across a vpn tunnel. I'm trying to add a rule to allow hosts on z to access a single host on y (port 9999).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config bits follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif y&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address y.y.y.y 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.1&lt;/P&gt;&lt;P&gt; vlan zzzz&lt;/P&gt;&lt;P&gt; nameif z&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address z.z.z.z 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list y_outbound_nat0 extended permit ip y.y.y.0 255.255.255.0 z.z.z.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_outbound_nat0 extended permit ip z.z.z.0 255.255.255.0 y.y.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group z_to_y in interface z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (y) 3 interface&lt;/P&gt;&lt;P&gt;global (z) 4 interface&lt;/P&gt;&lt;P&gt;nat (y) 0 access-list y_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (y) 1 y.y.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (z) 0 access-list z_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (z) 1 z.z.z.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config above partially works, in that it allows z to access the host on y, but it also denies access across the vpn and (I think) the internet. I assume this is because the access-list z_to_y has the implicit deny any any at the end. What is the right way to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was considering the following, but wasn't sure if it was the right solution (or if it would work correctly):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit ip y.y.y.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group z_to_y in interface y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I read a thread that advocated against using nat0 rules except for VPN? Indicating to use static statements instead...Just wondering if anyone knows the rationale behind that, since I obviously am using nat0 rules to not nat between internal networks.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:24:52 GMT</pubDate>
    <dc:creator>jason.goodwin</dc:creator>
    <dc:date>2019-03-11T14:24:52Z</dc:date>
    <item>
      <title>Access from lower security interface to higher</title>
      <link>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131261#M892400</link>
      <description>&lt;P&gt;I've got two internal networks, y and z. y is the most secure, and is allowed access to z. Both are allowed full access to the internet and some hosts across a vpn tunnel. I'm trying to add a rule to allow hosts on z to access a single host on y (port 9999).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config bits follow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif y&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address y.y.y.y 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.1&lt;/P&gt;&lt;P&gt; vlan zzzz&lt;/P&gt;&lt;P&gt; nameif z&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address z.z.z.z 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list y_outbound_nat0 extended permit ip y.y.y.0 255.255.255.0 z.z.z.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_outbound_nat0 extended permit ip z.z.z.0 255.255.255.0 y.y.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group z_to_y in interface z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (y) 3 interface&lt;/P&gt;&lt;P&gt;global (z) 4 interface&lt;/P&gt;&lt;P&gt;nat (y) 0 access-list y_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (y) 1 y.y.y.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (z) 0 access-list z_outbound_nat0&lt;/P&gt;&lt;P&gt;nat (z) 1 z.z.z.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config above partially works, in that it allows z to access the host on y, but it also denies access across the vpn and (I think) the internet. I assume this is because the access-list z_to_y has the implicit deny any any at the end. What is the right way to accomplish this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was considering the following, but wasn't sure if it was the right solution (or if it would work correctly):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit ip y.y.y.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group z_to_y in interface y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I read a thread that advocated against using nat0 rules except for VPN? Indicating to use static statements instead...Just wondering if anyone knows the rationale behind that, since I obviously am using nat0 rules to not nat between internal networks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131261#M892400</guid>
      <dc:creator>jason.goodwin</dc:creator>
      <dc:date>2019-03-11T14:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Access from lower security interface to higher</title>
      <link>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131262#M892401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999 &lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit ip y.y.y.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-group z_to_y in interface y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use this then any machines on dmz z can access any machines on y as long as there is a NAT translation for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So add in a deny from all the dmz machines on z to internal network y after the specific permit rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit tcp z.z.z.0 255.255.255.0 host y.y.y.11 eq 9999 &lt;/P&gt;&lt;P&gt;access-list z_to_y extended deny ip z.z.z.0 255.255.255.0 y.y.y.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list z_to_y extended permit ip y.y.y.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-group z_to_y in interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have always used static statements myself for presenting the same addresses to another interface eg.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) y.y.y.0 y.y.y.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously you will need a dynamic nat for going out to the Internet unless of course all your IP's on the dmz and inside are Internet routable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 19:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131262#M892401</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-12-11T19:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Access from lower security interface to higher</title>
      <link>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131263#M892405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, I went ahead and tried what you suggested and it is working fine now. It just seemed excessive to me to have to specify deny statements for each internal network and then add the allow any rule, but I guess that is just how it has to be. I don't make firewall changes very often, so it is always difficult for me to get back in the Cisco mindset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Dec 2008 19:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-lower-security-interface-to-higher/m-p/1131263#M892405</guid>
      <dc:creator>jason.goodwin</dc:creator>
      <dc:date>2008-12-11T19:47:11Z</dc:date>
    </item>
  </channel>
</rss>

