Cisco Support Community
Step-by-Step Configuration and Troubleshooting Best Practices for the NGFW, NGIPS and AMP Technologies A Visual Guide to the Cisco Firepower Threat Defense (FTD)
Community Member

FW Best Practices

This question is about best practices regarding firewalling personal identifiable information such as health records (please see attached image). This scenario assumes the use of Cisco ASA 5500 firewalls.

If the majority of cyber attacks happen from within an organization is it more important to give the "internal" interface a higher security level (higher level of trust) than the DMZ interface that connects to customer information or should the internal interface have a lower security level? I have included a visual depiction of this scenario in my attached document. I would like to know what others are doing to firewall critical information. Would an organization be remiss in not assigning the data servers the highest level of security while assuming that the internal network should be the most secure? Any insight into this question would be appreciated. Thanks!


Hi Mike, Security-level will

Hi Mike,


Security-level will not play a crucial role, when you have other filtering mechanisms in place..... if you have ACL allowed for certain access in the respective interfaces.... asa will allow by looking at the acl,nat, inspection..... So security-level is not a big challenge.... more over inside interface requires more sec-level than anything...... that is for protecting the outside hackers to get in to internal system.....


But that makes nothing when you have other security configurations in place to filter for permit/deny access.....




CreatePlease to create content