<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510 DMZ Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776537#M1004242</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;The solution is to subnet (split in half) your 27 bits subnet. Then, if you want your DMZ physical machines with public IPs, use tha NAT0 feature so they don't get natted.  You can't have IPs belonging to the same subnets in diferent interfaces (= network overlapping). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;ISP global subnet - 196.65.65.0/27&lt;/P&gt;&lt;P&gt;Outside subnet - 196.65.65.0/28&lt;/P&gt;&lt;P&gt;DMZ subnet - 196.65.65.16/28&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip adress outside 196.65.65.14 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address dmz 196.65.65.30 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (dmz) 0 196.65.65.16 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (inside) 0 acl_nonat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list acl_nonat permit ip 10.10.10.0 255.255.255.0 196.65.65.16 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 May 2007 14:53:14 GMT</pubDate>
    <dc:creator>jean.l.pierre</dc:creator>
    <dc:date>2007-05-25T14:53:14Z</dc:date>
    <item>
      <title>ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776532#M1004217</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've just purchased an ASA5510 w/IPS to replace my current firewall box. My ISP has given me a block of 30 IPs xx.xx.xx.yy/27. I've created 2 interfaces for LAN IP: 192.168.xx.yy and WAN: xx.xx.xx.yy (using one of the IPs from my block). PAT is used between the LAN and WAN interfaces and routing has been setup. The LAN can access the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to now configure a DMZ interface that uses my public IP block without NATing... is this possible? When I try to add the DMZ interface with one of the IPs in my IP block i get the message "The IP Address xx.xx.xx.yy/27 cannot overlap with the subnet of the interface WAN." any ideas? ultimately, i would like to use the public IPs in the DMZ and have both the WAN and LAN to be able to access the servers in the DMZ. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've read some guides on DMZ but they all use private addresses in the DMZ to NAT to the public IPs. I don't want to go down this route if possible b/c there would be a number of changes required on our servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776532#M1004217</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2019-03-11T10:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776533#M1004222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The easiest thing to do would be to get a /30 for your outside interface, then use your whole /27 for your dmz.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2007 15:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776533#M1004222</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-23T15:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776534#M1004228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi acomiskey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So there is no other way to setup the both interfaces with the same block? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ISP's response time and customer service are not the greatest. so if possible i would ilke to configure teh box with what i have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2007 16:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776534#M1004228</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2007-05-23T16:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776535#M1004231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does transparent mode work for you in this situation? Transparent mode will allow you to maintain the public IP's on the servers connected to the inside interface. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2007 18:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776535#M1004231</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-23T18:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776536#M1004235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would PAT work with transparent mode? I still need addresses to be translated for my internal workstations (300+) as I only have 30 or so real IPs. I have about 10 servers which are accessible by the public and I would like to put these in the DMZ. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 13:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776536#M1004235</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2007-05-25T13:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776537#M1004242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;The solution is to subnet (split in half) your 27 bits subnet. Then, if you want your DMZ physical machines with public IPs, use tha NAT0 feature so they don't get natted.  You can't have IPs belonging to the same subnets in diferent interfaces (= network overlapping). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;ISP global subnet - 196.65.65.0/27&lt;/P&gt;&lt;P&gt;Outside subnet - 196.65.65.0/28&lt;/P&gt;&lt;P&gt;DMZ subnet - 196.65.65.16/28&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip address inside 10.10.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip adress outside 196.65.65.14 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address dmz 196.65.65.30 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (dmz) 0 196.65.65.16 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (inside) 0 acl_nonat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list acl_nonat permit ip 10.10.10.0 255.255.255.0 196.65.65.16 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 14:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776537#M1004242</guid>
      <dc:creator>jean.l.pierre</dc:creator>
      <dc:date>2007-05-25T14:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776538#M1004244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi JP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. I've applied your suggestion to my environment, I'm having a problem with traffic DMZ&amp;gt;WAN and WAN&amp;gt;DMZ. Here's my config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inside: 10.10.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip outside: 196.65.65.14 255.255.255.240&lt;/P&gt;&lt;P&gt;ip dmz: 196.65.65.30 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 196.65.65.16 255.255.255.240 any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 198.65.65.16 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 198.65.65.1 (the ISP's Gateway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the machines on the inside can access the internet and dmz... the machines in the dmz cannot access internet and the internet cannot ping the machines in the dmz... i've tried to add another default route for the dmz interface but it wont allow me, saying the route for that ip (0.0.0.0/0) exists already...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also one more question for the machines in the dmz.. before when i had the original subnet the ip settings were 196.65.65.18 255.255.255.224, gateway 196.65.65.1 (isp gateway)... now that i've split up the subnet i've changed the ip on the machine to ip: 196.65.65.18 255.255.255.240, should the gateway 196.65.65.1 (isp gateway) or 196.65.65.30 (asa dmz interface)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2007 15:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776538#M1004244</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2007-05-28T15:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776539#M1004246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I think both WAN-&amp;gt;DMZ and DMZ-&amp;gt;WAN are related issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL outside_access_in mentions network 198.65.65.16/28 but it should be 196.65.65.16/28?! Was it just a typing error or a misconfiguration? Also the ISP gateway should be 196.65.65.1 and not 198.65.65.1/28?!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The gateway for your DMZ machine (196.65.65.18/28) should be the directly connected interface/IP subnet gateway, meaning 196.65.65.30/28.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2007 21:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776539#M1004246</guid>
      <dc:creator>jean.l.pierre</dc:creator>
      <dc:date>2007-05-28T21:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776540#M1004247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi JP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. Yes, the 196 and 198 were typos in this post... i was looking at the management screen and mistyped on the computer i was posting on... my appologies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside ip: 10.10.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;outside ip: 196.65.65.14 255.255.255.240&lt;/P&gt;&lt;P&gt;dmz ip: 196.65.65.30 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 196.65.65.18 eq 3389 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 196.65.65.16 255.255.255.240 echo &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp any 10.10.10.254 255.255.255.0 echo-reply &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any 10.10.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.10.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 196.65.65.18 196.65.65.18 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 196.65.65.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* 196.65.65.1 is ISP gateway...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added in a static (dmz,outside) NAT for 196.65.65.18 to 196.65.65.18 for my machine in the DMZ and that seemed to work... i can get traffic from DMZ-&amp;gt;WAN and WAN-&amp;gt;DMZ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks alot for your help and suggestions... greatly appriciated. i am somewhat function now...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;one last question... from the inside i cant seem to recieve echo-replies (eg: from &lt;A class="jive-link-custom" href="http://www.google.ca)," target="_blank"&gt;www.google.ca),&lt;/A&gt; but from the machine in the DMZ i can... any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 13:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776540#M1004247</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2007-05-29T13:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776541#M1004248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You aren't allowing echo-reply in your outside acl like you are in your dmz acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 196.65.65.16 255.255.255.240 echo &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp any 10.10.10.254 255.255.255.0 echo-reply &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 13:25:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776541#M1004248</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-29T13:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776542#M1004251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi acomiskey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! now it is working!  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but how come i have to specify the outside ip rather than the inside subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 10.10.10.0 255.255.255.0 echo-reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;above doesnt work... but the following works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any interface outside echo-reply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 13:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776542#M1004251</guid>
      <dc:creator>EvolutionVI</dc:creator>
      <dc:date>2007-05-29T13:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776543#M1004253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you the address associated with where the acl is applied. If it's applied to the outside interface then you use the outside address as this is where the replies are destined. The acl is checked before the translation takes place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2007 13:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-dmz-configuration/m-p/776543#M1004253</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-29T13:45:45Z</dc:date>
    </item>
  </channel>
</rss>

