[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Can I set the same security level on two interface in PIX, ASA and FWSM?

Posted on 2009-04-07
3
Medium Priority
?
456 Views
Last Modified: 2012-05-06
Can I set the same security level on two interfaces in PIX, ASA and FWSM?

If two DMZs had same security level, what default rule should be? allow or deny any any in two directions ?

Thanks very much!
0
Comment
Question by:howruaz9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
3 Comments
 
LVL 40

Accepted Solution

by:
mrjoltcola earned 2000 total points
ID: 24093368
Low to high is allowed by default, and high to low is disallowed by default.
Same to same is also disallowed by default, unless you have issued:

same-security-traffice permit inter-interface


This is from the ASA docs, I don't know about the older PIX, but Cisco docs do recommend not relying on this and using explicit ACLs. Hope that helps.
0
 
LVL 40

Assisted Solution

by:mrjoltcola
mrjoltcola earned 2000 total points
ID: 24093372
Sorry, I reversed the correct logic in the first sentence.

Correction: High to low is allowed by default, and low to high is disallowed by default.

0
 
LVL 40

Assisted Solution

by:mrjoltcola
mrjoltcola earned 2000 total points
ID: 24093383
>>Can I set the same security level on two interfaces in PIX, ASA and FWSM?

To clearly answer the first question, the Yes, you can.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question