cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
998
Views
4
Helpful
3
Replies

ASA 8.2 security-level default behavior

Hi,

I'm trying to implement some best practices for ASA running on Software Release 8.2 and had a question about the default security-level behavior.

Let's say I have 3 interfaces...

-inside (security-level 100)

-dmz (security-level 50)

-outside (security-level 0)

I have an ACL on the inside interface allowing http access to anywhere. Because of the ACL, the implicit higher to lower security level access is nullified. Correct?

I do NOT have any ACL on the dmz interface applied. So, would the servers in the dmz be allowed outbound access to the Internet due to the default higher to lower security level behavior?

Looking forward to your responses. Thanks!

1 Accepted Solution

Accepted Solutions

Julio Carvajal
VIP Alumni
VIP Alumni

I have an ACL on the inside interface allowing http access to anywhere. Because of the ACL, the implicit higher to lower security level access is nullified. Correct?

That is correct, that is the whole purpose of using an ACL on the inside interface,restrict traffic.

I do NOT have any ACL on the dmz interface applied. So, would the servers in the dmz be allowed outbound access to the Internet due to the default higher to lower security level behavior?

     Yes, they will be able to access any other interface with a lower security level

Regards

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

View solution in original post

3 Replies 3

Julio Carvajal
VIP Alumni
VIP Alumni

I have an ACL on the inside interface allowing http access to anywhere. Because of the ACL, the implicit higher to lower security level access is nullified. Correct?

That is correct, that is the whole purpose of using an ACL on the inside interface,restrict traffic.

I do NOT have any ACL on the dmz interface applied. So, would the servers in the dmz be allowed outbound access to the Internet due to the default higher to lower security level behavior?

     Yes, they will be able to access any other interface with a lower security level

Regards

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Marvin Rhoads
Hall of Fame
Hall of Fame

In addition to Julio's correct answer, your DMZ clients would need a NAT rule to access the Internet (assuming they don't already have public IPs).

Thanks guys. Saved me a lotta labbing and testing!!!

Review Cisco Networking products for a $25 gift card