Solved

Can I set the same security level on two interface in PIX, ASA and FWSM?

Posted on 2009-04-07
3
449 Views
Last Modified: 2012-05-06
Can I set the same security level on two interfaces in PIX, ASA and FWSM?

If two DMZs had same security level, what default rule should be? allow or deny any any in two directions ?

Thanks very much!
0
Comment
Question by:howruaz9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
3 Comments
 
LVL 40

Accepted Solution

by:
mrjoltcola earned 500 total points
ID: 24093368
Low to high is allowed by default, and high to low is disallowed by default.
Same to same is also disallowed by default, unless you have issued:

same-security-traffice permit inter-interface


This is from the ASA docs, I don't know about the older PIX, but Cisco docs do recommend not relying on this and using explicit ACLs. Hope that helps.
0
 
LVL 40

Assisted Solution

by:mrjoltcola
mrjoltcola earned 500 total points
ID: 24093372
Sorry, I reversed the correct logic in the first sentence.

Correction: High to low is allowed by default, and low to high is disallowed by default.

0
 
LVL 40

Assisted Solution

by:mrjoltcola
mrjoltcola earned 500 total points
ID: 24093383
>>Can I set the same security level on two interfaces in PIX, ASA and FWSM?

To clearly answer the first question, the Yes, you can.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question