<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ access from VPN client in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690252#M1029574</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought my static (inside,DMZ) 192.168.9.0 192.168.9.0 netmask 255.255.255.0 was doing the same thing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Jan 2007 20:27:02 GMT</pubDate>
    <dc:creator>boshardy1</dc:creator>
    <dc:date>2007-01-08T20:27:02Z</dc:date>
    <item>
      <title>DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690245#M1029561</link>
      <description>&lt;P&gt;I am trying to get allow access from a Cisco VPN client into our DMZ (consultant needs to be able to remote in).  I thought I had the config right but its still not working.  Here is the pertinent config from my pix: The vpn segment is 192.168.9.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip host 172.28.2.196 host 172.17.0.17 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip host 172.28.2.196 host 172.17.0.16 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp host 172.28.2.196 Ethernet 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp host 172.28.2.196 192.168.9.0&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in deny ip any 172.17.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in permit ip host 172.28.2.196 192.168.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.9.0 192.168.9.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) Ethernet Ethernet netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0 0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp 12.XX.44.237 ftp 172.28.2.195 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp 12.XX.44.237 www 172.28.2.196 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp 12.XX.44.237 https 172.28.2.196 https netmask 255.255.255.255 &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690245#M1029561</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2019-03-11T09:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690246#M1029563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want the VPN users to connect to DMZ you need to allow access on the inside interface, i.e.:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.9.0 255.255.255.0 host 172.28.2.196&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything else seems to be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jan 2007 19:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690246#M1029563</guid>
      <dc:creator>5220</dc:creator>
      <dc:date>2007-01-07T19:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690247#M1029565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..  I think you are a bit confused here &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the only thing you need to make sure is that the interesting traffic for IPsec also allows access to the DMZ segment. Traffic to and from the DMZ towards the VPN segment needs to bypass NAT so that they can see each other with its real IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you post your config  ..  without passwords  ..  You should be able to get help right away ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 04:16:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690247#M1029565</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-01-08T04:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690248#M1029566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 14:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690248#M1029566</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2007-01-08T14:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690249#M1029568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fernando is right.  I looked at the config and there is no acl present that will bypass nat from vpn-pool to dmz-network.  It should be in this acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.9.100 255.255.255.252 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group Vision_VPN_Servers_Allowed 192.168.9.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host 12.34.44.227 host GE_FTPServer &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host 12.34.44.227 object-group Schneider_FTP_Servers &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Ethernet 255.255.0.0 192.168.9.0 255.255.255.0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 19:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690249#M1029568</guid>
      <dc:creator>froggy3132000</dc:creator>
      <dc:date>2007-01-08T19:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690250#M1029570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought my static (inside,DMZ) 192.168.9.0 192.168.9.0 netmask 255.255.255.0 was doing the same thing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 19:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690250#M1029570</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2007-01-08T19:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690251#M1029572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is not defined what should not be encrypted.  Your acl for your encryption domain must specify the interesting networks being accessed.  In your case your dmz network.  That static is will never process if your encryption domain is not specified correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 20:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690251#M1029572</guid>
      <dc:creator>froggy3132000</dc:creator>
      <dc:date>2007-01-08T20:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690252#M1029574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought my static (inside,DMZ) 192.168.9.0 192.168.9.0 netmask 255.255.255.0 was doing the same thing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 20:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690252#M1029574</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2007-01-08T20:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690253#M1029578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip &lt;DMZ-NETWORK&gt; 192.168.9.0 255.255.255.128&lt;/DMZ-NETWORK&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is not defining what should be encrypted or not. Your acl for your encryption domain must specify the interesting networks being accessed. In your case your dmz network. That static will never process if your encryption domain is not specified correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 21:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690253#M1029578</guid>
      <dc:creator>froggy3132000</dc:creator>
      <dc:date>2007-01-08T21:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ access from VPN client</title>
      <link>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690254#M1029579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi ..  The VPN tunnel terminates at the outside interface and so that is the interface that the packets are to be routed to when coming back fromn the DMZ  ...  The IPsec interestesting traffic is OK as it includes all  traffic to 192.168.9.0/24   and so I suggest adding a nat 0  &lt;/P&gt;&lt;P&gt;as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test extended permit ip any 192.168.9.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also are you able to access any internal device at all ..?&lt;/P&gt;&lt;P&gt;Are you able to successfully establish the tunnel ..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 23:30:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-access-from-vpn-client/m-p/690254#M1029579</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2007-01-08T23:30:35Z</dc:date>
    </item>
  </channel>
</rss>

