Cisco Asa Lab
Cisco Asa Lab
Network Topology:
DMZ:
It known as demilitarized zone and is used to improve the security of an organization network
by segregating devices such as servers on the opposite of a firewall.
WHY DMZ:
Now suppose the above topology and if we have had the server 7 in our inside zone, now since
server 7 needs to be accessed publicly. So this server 7 could be email server or a web server
now since the public is inside the company private network so that means the company is
letting in people from an untrusted network to company’s internal network this causes could
cause a security concern, so we made a DMZ and in which we kept the server 7 and kept it on
the opposite side of a firewall.
So this DMZ is the zone where the firewall protection is forbidden. Hence server 7 has been
kept in a DMZ based on the requirement.
This is the highest security level and it is assigned to the most Trusted Interface/Zone. Usually,
we assign Highest Security Level to the LAN / Corporate Interface. Traffic from High-Security
Level to Low-Security Level is allowed by default. By default, inside security zone has a security
level of 100. But it is always 0 in different security zones names, i.e., outside, DMZ.
Cisco ASA: Security Level 0:
This is the Lowest Security Level and it is assigned to the most untrusted Interface/Zone.
Usually, we assigned Lowest Security to the ISP or Internet Interface. Traffic from Low-Security
Level to High-Security Level is denied by default.
Accordingly, we need to configure Access Control Lists (ACLs) to allow this traffic from Outside
to Inside or DMZ.
Configuration:
Cisco Asa:
R1 Running Config:
R2 Running Configuration:
Results:
Now this inside network can ping the internet as from a high security level to a low security
level to a low level. For the inside network it’s 100.
Similarly the DMZ server can also ping the internet as it has security level of 70 going from a
higher level to a lower one.
Low security level to High security level:
Now below the ISP router cannot ping the inside network’s since traffic is coming from a lower
security level which is 0 for the outside interface.