<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow SQL traffic from dmz host to internal SQL server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618542#M1036253</link>
    <description>&lt;P&gt;I have a webserver(192.168.10.2) on a DMZ network off of a ASA 5510 7.1(2).  It needs to communicate with a MSSQL server(10.10.4.48) on the internal network.  What ports, if any, other than tcp 1433 do I need to allow this to happen?  I have tried tcp1433 both ways and the webserver is still not able to access the SQL database on the internal network &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:01:39 GMT</pubDate>
    <dc:creator>djames</dc:creator>
    <dc:date>2019-03-11T09:01:39Z</dc:date>
    <item>
      <title>Allow SQL traffic from dmz host to internal SQL server</title>
      <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618542#M1036253</link>
      <description>&lt;P&gt;I have a webserver(192.168.10.2) on a DMZ network off of a ASA 5510 7.1(2).  It needs to communicate with a MSSQL server(10.10.4.48) on the internal network.  What ports, if any, other than tcp 1433 do I need to allow this to happen?  I have tried tcp1433 both ways and the webserver is still not able to access the SQL database on the internal network &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618542#M1036253</guid>
      <dc:creator>djames</dc:creator>
      <dc:date>2019-03-11T09:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow SQL traffic from dmz host to internal SQL server</title>
      <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618543#M1036256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any communication at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may be missing a static (inside,DMZ) statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 15:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618543#M1036256</guid>
      <dc:creator>t-heeter</dc:creator>
      <dc:date>2006-11-28T15:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Allow SQL traffic from dmz host to internal SQL server</title>
      <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618544#M1036261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for PIX low security to high security traffic , it must meet two requirement:&lt;/P&gt;&lt;P&gt;1. acl permitted static command configured&lt;/P&gt;&lt;P&gt;2. static command configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems you have already permited communication with ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need following static command its so called identity NAT&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.10.4.48 10.10.4.48 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;M.&lt;/P&gt;&lt;P&gt;Hope that helps rate if it does&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 15:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618544#M1036261</guid>
      <dc:creator>m.sir</dc:creator>
      <dc:date>2006-11-28T15:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Allow SQL traffic from dmz host to internal SQL server</title>
      <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618545#M1036263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I already have the static map configured.  My internal subnetmask is a /23 and my dmz is a /24.  My static map is:&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 10.10.4.0 10.10.4.0 netmask 255.255.254.0.&lt;/P&gt;&lt;P&gt;I have an ACL access-list INSIDE extended permit tcp host 192.168.10.2 host 10.10.4.48 eq 1433.  Is there something I am missing.  For testing purposes I would like to be able to 'ping' 10.10.4.48 from 192.168.10.2 as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 15:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618545#M1036263</guid>
      <dc:creator>djames</dc:creator>
      <dc:date>2006-11-28T15:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Allow SQL traffic from dmz host to internal SQL server</title>
      <link>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618546#M1036265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is access-list INSIDE applied to DMZ interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group INSIDE in interface DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 18:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-sql-traffic-from-dmz-host-to-internal-sql-server/m-p/618546#M1036265</guid>
      <dc:creator>t-heeter</dc:creator>
      <dc:date>2006-11-28T18:31:50Z</dc:date>
    </item>
  </channel>
</rss>

