3.8 Ensure 'security-level' is set to '0' for Internet-facing interface

Information

Sets the security level of the Internet facing interface to 0

Rationale:

Where security zones are not configured, the Internet facing interface is the most untrusted interface and must have the lowest security-level that is 0. Therefore, any traffic initiated from this interface to the other interfaces of the security appliance must be checked by a specific access-control list rule in order to be permitted.

NOTE: This check requires manual review. Please review the results to ensure 'security-level' is set to '0' for Internet-facing interface.

Solution

* Step 1: Acquire the physical name of the Internet facing interface <interface_physical_name>
* Step 2: Run the following command assigned the security-level 0

HOSTNAME(CONFIG)#INTERFACE _<interface_physical_name>_
HOSTNAME(CONFIG-IF)#security-level 0

See Also

https://benchmarks.cisecurity.org/tools2/cisco/CIS_Cisco_Firewall_Benchmark_v4.0.0.pdf