01-16-2008 05:56 AM - edited 03-11-2019 04:49 AM
ive experienced this with both asa and pix...does anybody know why acl needed for high security to low security??...even though i have no high security to low security for other connections?
01-16-2008 10:28 AM
ACLs protect your trusted network. Why would you not want ACL's?
01-16-2008 10:45 AM
you have it backward. By default, hosts behind
high security interface can access hosts behind
low level security interface. You do NOT need
ACL to protect hosts sitting behind high level
security interface from low level security level interface. That is implicitly implied.
You need ACL on the high level security
interface in order to protect/prevent
hosts from getting to hosts on other interfaces. That way, if hosts on the
high level security interface are infected
with viruses, they won't propragate to other
networks on other interfaces.
CCIE Security
01-16-2008 10:49 AM
yeah, i know i dont need a ACL to protect hosts sitting behind high level security interface from low level security level interface....but, in my case, that is not an issue...a higher security lvl was unable to iniate a sqlnet connection to a lower security level with an acl...
01-16-2008 10:53 AM
Does nothing between the subnets work? Is NAT working or are you routing?
01-16-2008 11:03 AM
do you have inspection turned on for sqlnet?
01-16-2008 02:17 PM
fixup protocol for sqlnet...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide