<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3694832#M951531</link>
    <description>Sorry i missed your PM.  I'll check and answer it.</description>
    <pubDate>Sat, 25 Aug 2018 00:48:48 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-08-25T00:48:48Z</dc:date>
    <item>
      <title>Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413313#M951526</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am wondering if there is a possibility to allow inter-interface traffic with acls without allowing all traffic on the same security level. So first disallow everything and then allow traffic with normal acls. Is it not possible by design?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;VLAN211_INSIDE(Sec.Lvl.:100) --&amp;gt; VLAN212_INSIDE (Sec.Lvl.:100)&lt;/P&gt;
&lt;P&gt;Traffic is not allowed automatically on the same security level. This option is turned off.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:58:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413313#M951526</guid>
      <dc:creator>thomas-cco</dc:creator>
      <dc:date>2020-02-21T15:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413729#M951527</link>
      <description>Hi Thomas&lt;BR /&gt;&lt;BR /&gt;If you apply the command same-security permit inter-interface and you assign acls on each interfaces, the traffic will be filtered.&lt;BR /&gt;</description>
      <pubDate>Wed, 11 Jul 2018 03:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413729#M951527</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-07-11T03:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413809#M951528</link>
      <description>&lt;P&gt;Hello Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you, I already know about this option, we use it in several of our smaller Cisco ASA clusters but it seems not to be a practical solution on our shared customer hosting firewall because imagine we have 200 customers and 50 global rules (for communication over the OUTSIDE interface) and when I now insert a deny rule on the end of every interface's incoming policy and activate the inter-interface feature then I'm disabling the 50 global rules and it would require me to duplicate the 50 rules 200 times resulting in 1000 policy rules instead of 50 policy rules&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when I then want to do a modification in one of the "global" rules then I cannot do one change but I need to do 200 changes, right?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the ideal solution for us would be when there would exists an address element definition for "ANY INSIDE", in this case I could say in my final deny rule on every inside interface: deny any inside traffic but not deny traffic passing the outside interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if there is no better already implemented solution from Cisco then I will maintain an address element group with all inside networks to achieve the required behaviour&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jul 2018 07:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3413809#M951528</guid>
      <dc:creator>thomas-cco</dc:creator>
      <dc:date>2018-07-12T07:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3414446#M951529</link>
      <description>I don't see your reply, i get just a big S sign. Can you re-post your question please?</description>
      <pubDate>Thu, 12 Jul 2018 03:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3414446#M951529</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-07-12T03:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3694362#M951530</link>
      <description>&lt;P&gt;Do you have any idea or suggestion? I also send you a PM in July.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Aug 2018 09:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3694362#M951530</guid>
      <dc:creator>thomas-cco</dc:creator>
      <dc:date>2018-08-24T09:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Traffic Between two or more interfaces which are configured with same security level</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3694832#M951531</link>
      <description>Sorry i missed your PM.  I'll check and answer it.</description>
      <pubDate>Sat, 25 Aug 2018 00:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-between-two-or-more-interfaces-which-are/m-p/3694832#M951531</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-08-25T00:48:48Z</dc:date>
    </item>
  </channel>
</rss>

