<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need some help with my ASA 5510 setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642274#M1023339</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made all the changes but I'm having an issue getting Internet access from my DMZ. Any ideas what I missed? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Mar 2007 00:27:43 GMT</pubDate>
    <dc:creator>a.grussner</dc:creator>
    <dc:date>2007-03-13T00:27:43Z</dc:date>
    <item>
      <title>Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642268#M1023333</link>
      <description>&lt;P&gt;I could really use some help getting this ASA 5510 configuration done. I?m by no means a firewall guru but since I?m the only network engineer at my company I?ve been asked to make the new Firewall/VPN work. I?m trying to setup the network to have a DMZ for our web servers and OWA so everything in the DMZ will have an IP of 192.168.2.0. My Internal network will have an IP of 192.168.0.0 and the people coming in on the VPN will get an IP of 192.168.3.0. Is this the best way to do it or can someone give me some tips on what?s the best way to do it? The servers in the DMZ and Inside network need to be able to communicate between each other for Active Directory and DNS traffic plus my users on the VPN and Internal networks need to be able to Remote Desktop into the servers in the DMZ and Internal network. I?ll paste my config below so any help would be greatly appreciated. Thanks. I guess it's to much data so I'll put the other half in the next post and I'll attach it as a doc to the original post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5510&lt;/P&gt;&lt;P&gt;domain-name test.com&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif External&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 209.x.x.10 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Internal&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring 2 Sun Mar 2:00 1 Sun Nov 2:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test.com&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 209.254.99.65 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 209.254.99.66 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip any 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip any 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit any&lt;/P&gt;&lt;P&gt;access-list test_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list External_access_out extended permit ip 192.168.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu External 1500&lt;/P&gt;&lt;P&gt;mtu Internal 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN 192.168.3.1-192.168.3.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (External) 1 interface&lt;/P&gt;&lt;P&gt;nat (Internal) 0 access-list Internal_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Internal) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,External) 209.254.99.65 192.168.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,External) 209.254.99.66 192.168.2.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group External_access_in in interface External&lt;/P&gt;&lt;P&gt;access-group External_access_out out interface External&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy NOS internal&lt;/P&gt;&lt;P&gt;group-policy NOS attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.15&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt;username rabbit password XXXXXXXX encrypted privilege 0&lt;/P&gt;&lt;P&gt;username rabbit attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy NOS&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 Internal&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ****SEE BELOW FOR THE REST****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642268#M1023333</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2019-03-11T09:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642269#M1023334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;route External 0.0.0.0 0.0.0.0 209.254.99.9 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 20 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 40 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map External_map 65535 ipsec-isakmp dynamic External_dyn_map&lt;/P&gt;&lt;P&gt;crypto map External_map interface External&lt;/P&gt;&lt;P&gt;crypto isakmp enable External&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; no authentication chap&lt;/P&gt;&lt;P&gt; no authentication ms-chap-v1&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;tunnel-group NOS type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group NOS general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt; default-group-policy NOS&lt;/P&gt;&lt;P&gt;tunnel-group NOS ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 2048&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:XXXXXXXXXXXXXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 14:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642269#M1023334</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-12T14:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642270#M1023335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please explain what you are trying to do with External_access_out? It is pretty much blocking all traffic from inside or dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For inside to dmz communication you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For dmz to vpn client you need a nat exemption:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list dmz_nat0_outbound&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For dmz to inside communicaiton you need an acl applied "in interface DMZ"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in permit .....&lt;/P&gt;&lt;P&gt;access-group dmz_in in interface DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 14:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642270#M1023335</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-12T14:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642271#M1023336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also get rid of &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip any 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and if you want your vpn clients to bypass interface access-lists add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that should get you started please rate if it helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 14:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642271#M1023336</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-12T14:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642272#M1023337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I started off using the ASDM so I must have made a change that put the External_access_out statement in there and then I missed it when I switched to configuring it from a command prompt. I'll remove it and make the changes you listed and I'll let you know what happens. Thanks for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 14:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642272#M1023337</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-12T14:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642273#M1023338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would you also recommend I turn Spoofing On for the External interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Mar 2007 15:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642273#M1023338</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-12T15:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642274#M1023339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made all the changes but I'm having an issue getting Internet access from my DMZ. Any ideas what I missed? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2007 00:27:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642274#M1023339</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-13T00:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642275#M1023340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, what are you using as a dns server for your servers on the dmz?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you create an acl in interface dmz? Is dns/http allowed etc.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate these if they helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2007 02:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642275#M1023340</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-13T02:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642276#M1023341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking through my response, noticed your name for inside is Internal...so you would need to make the change from what I originally posted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should be...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Internal,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Mar 2007 19:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642276#M1023341</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-13T19:03:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642277#M1023342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assumed that's what you mean't so when I made the change I used Internal. I'm using a DNS server that sits on my Internal network with an IP of 192.168.0.15. Do I need something added so my servers in the DMZ can access that DNS server on my Internal network? I've only made the changes you recommended so do I need to add anything else? Thanks again for all your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 15:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642277#M1023342</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-14T15:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642278#M1023343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need to allow udp 53 from dmz to inside dns server. Please post output of show run access-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 15:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642278#M1023343</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-14T15:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642279#M1023344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What would the correct syntax be for the udp 53 command line?&lt;/P&gt;&lt;P&gt;Here's the access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 209.254.66.65 eq www&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 209.254.66.66 eq ftp&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit any&lt;/P&gt;&lt;P&gt;access-list Test_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list winter_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip any 192.168.3.0 255.255.255.192&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip any 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;asa5510#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 15:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642279#M1023344</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-14T15:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642280#M1023345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have this "access-group dmz_in in interface DMZ" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, then you need to do this, you are already allowing dmz to inside with what you have in your dmz_in acl. But remember, there is an explicit deny at the end of the acl. So it is allowing communication to inside but is denying everything else (internet). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The purpose of a dmz is to segment from your inside network. If you allow all traffic to the inside, you are kind of defeating the purpose of a dmz at all. It should be like this..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit udp 192.168.2.0 255.255.255.0 host 192.168.0.15 eq domain&lt;/P&gt;&lt;P&gt;access-list dmz_in extended deny ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to allow more than just dns, you would do so before the "access-list dmz_in extended deny ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0" line.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 15:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642280#M1023345</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-14T15:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642281#M1023346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I have this access-group dmz_in in interface DMZ in the config. I need to add the other statements. I also have an Exchange 2003 front-end OWA server that will be in the DMZ and need to communicate with the back-end Exchange 2003 server on the Internal network. What will need to be added for those 2 servers to communicate? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 16:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642281#M1023346</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-14T16:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642282#M1023347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have a look here...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://download.microsoft.com/download/d/e/1/de1578d8-d082-49e8-964a-fbe4505158f8/E2k3FrontBack.doc" target="_blank"&gt;http://download.microsoft.com/download/d/e/1/de1578d8-d082-49e8-964a-fbe4505158f8/E2k3FrontBack.doc&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will probably involve opening rpc ports. You could also just allow all traffic between the servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip host &lt;FRONT-END_IP&gt; host &lt;BACK-END_IP&gt;&lt;/BACK-END_IP&gt;&lt;/FRONT-END_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate these if they have helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2007 18:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642282#M1023347</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-14T18:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642283#M1023348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hows it now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 00:49:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642283#M1023348</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T00:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642284#M1023349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's working much better now. I'm going to try and schedule some time over the weekend to put it in place for some testing. I opened up communication between the 2 email servers by IP address instead dealing with all the ports between them. What do I need to do so it'll communicate with my Active Directory for user authentication? Thanks for all the help so far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 14:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642284#M1023349</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-16T14:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642285#M1023350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Active Directory Communication&lt;/P&gt;&lt;P&gt;To communicate with Active Directory, the Exchange front-end server requires LDAP ports to be open. Both TCP and UDP are required: Windows 2000 on the front-end server will send a 389/UDP LDAP request to a domain controller to check if it is available for use; the LDAP traffic after that uses TCP. Windows 2000 Kerberos authentication is also used; therefore, the Kerberos ports must also be open. Both TCP and UDP are required for Kerberos as well: Windows uses UDP/88 by default, but when the data is larger than the maximum packet size for UDP, it uses TCP. Table 3 lists the ports required for communicating with Active Directory."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taken from the following article...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/technet/prodtechnol/exchange/2000/maintain/e2kfront.mspx" target="_blank"&gt;http://www.microsoft.com/technet/prodtechnol/exchange/2000/maintain/e2kfront.mspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 14:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642285#M1023350</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T14:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642286#M1023351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then I should be OK for the Exchange server sitting in my DMZ since I opened up all communication between that server and my back-end server on the Internal network. What I need to know is how I can setup my VPN users to authenticate to Active Directory when they login on the VPN instead of having to create accounts on the 5510.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 14:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642286#M1023351</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-03-16T14:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: Need some help with my ASA 5510 setup</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642287#M1023352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the asa you will define a aaa-server and assign that to the vpn group. You can then set up IAS (Internet Authentication Service) on your domain controller. Here you will define a radius client (asa) and a remote access policy. You must then register the service with active directory. You will then be able to authenticate your vpn clients with your ad.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2007 15:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-my-asa-5510-setup/m-p/642287#M1023352</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-16T15:16:43Z</dc:date>
    </item>
  </channel>
</rss>

