<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA DMZ server Access problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3183418#M1066208</link>
    <description>Hi jumora&lt;BR /&gt;Thanks for ur replay. I NAT DMZ server on router. You can find it topology. If i configure NAT on ASA its work fine.</description>
    <pubDate>Wed, 13 Sep 2017 08:17:48 GMT</pubDate>
    <dc:creator>CSCO12361421</dc:creator>
    <dc:date>2017-09-13T08:17:48Z</dc:date>
    <item>
      <title>ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182924#M1066197</link>
      <description>&lt;P&gt;Dear Expert&lt;/P&gt;&lt;P&gt;I hava an issue with cisco ASA. In my ASA have three zone. like Inside, dmz, Outside. All DMZ server ip NATtranslation configure on Router which is connect with ASA outside zone. So when i wnat to ping from inside user pc to DMZ server public ip, i unable to ping. Same as DMZ server (DMZ zone one server want to ping other DMZ server Public ip )&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some log&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;--Inside user ip 192.168.0.10 want to ping DMZ server ip 200.200.200.4 &amp;nbsp;local ip 192.168.10.53---&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA(config)# %ASA-7-609001: Built local-host INSIDE:192.168.0.10&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:200.200.200.4&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.0.10/64447 laddr 192.168.0.10/64447&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.0.10&lt;BR /&gt;%ASA-7-609001: Built local-host DMZ:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.0.10/64447 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.0.10/64959 laddr 192.168.0.10/64959&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.0.10/64447 laddr 192.168.0.10/64447&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.0.10/64447 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.0.10 duration 0:00:02&lt;BR /&gt;%ASA-7-609002: Teardown local-host DMZ:192.168.10.53 duration 0:00:02&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.0.10&lt;BR /&gt;%ASA-7-609001: Built local-host DMZ:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.0.10/64959 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.0.10/64447 laddr 192.168.0.10/64447&lt;BR /&gt;%ASA-4-313004: Denied ICMP type=0, from laddr 192.168.10.53 on interface DMZ to 192.168.0.10: no matching session&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.0.10/64959 laddr 192.168.0.10/64959&lt;BR /&gt;%ASA-4-313004: Denied ICMP type=0, from laddr 192.168.10.53 on interface OUTSIDE to 192.168.0.10: no matching session&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.0.10/64959 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.0.10 duration 0:00:01&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.0.10/64447 laddr 192.168.0.10/64447&lt;BR /&gt;%ASA-7-609002: Teardown local-host DMZ:192.168.10.53 duration 0:00:01&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.0.10/64959 laddr 192.168.0.10/64959&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.10.53 duration 0:00:00&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.0.10/64959 laddr 192.168.0.10/64959&lt;BR /&gt;%ASA-7-609002: Teardown local-host INSIDE:192.168.0.10 duration 0:00:04&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:200.200.200.4 duration 0:00:04&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;---DMZ user ip 192.168.10.54 want to ping DMZ server ip 200.200.200.4 &amp;nbsp;local ip 192.168.10.53---&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA(config)# %ASA-7-609001: Built local-host DMZ:192.168.10.54&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:200.200.200.4&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.10.54/51648 laddr 192.168.10.54/51648&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.10.54&lt;BR /&gt;%ASA-7-609001: Built local-host DMZ:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.54/51648 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.10.54/51648 laddr 192.168.10.54/51648&lt;BR /&gt;%ASA-4-313004: Denied ICMP type=0, from laddr 192.168.10.53 on interface OUTSIDE to 192.168.10.54: no matching session&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.54/51648 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.10.54 duration 0:00:00&lt;BR /&gt;%ASA-7-609002: Teardown local-host DMZ:192.168.10.53 duration 0:00:00&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.10.54/51648 laddr 192.168.10.54/51648&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.10.53 duration 0:00:00&lt;BR /&gt;%ASA-6-302020: Built outbound ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.10.54/52160 laddr 192.168.10.54/52160&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.10.54/51648 laddr 192.168.10.54/51648&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.10.54&lt;BR /&gt;%ASA-7-609001: Built local-host DMZ:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.54/52160 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609001: Built local-host OUTSIDE:192.168.10.53&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.10.54/52160 laddr 192.168.10.54/52160&lt;BR /&gt;%ASA-4-313004: Denied ICMP type=0, from laddr 192.168.10.53 on interface OUTSIDE to 192.168.10.54: no matching session&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.54/52160 gaddr 192.168.10.53/0 laddr 192.168.10.53/0&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.10.54 duration 0:00:00&lt;BR /&gt;%ASA-7-609002: Teardown local-host DMZ:192.168.10.53 duration 0:00:00&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 192.168.10.53/0 gaddr 192.168.10.54/52160 laddr 192.168.10.54/52160&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:192.168.10.53 duration 0:00:00&lt;BR /&gt;%ASA-6-302021: Teardown ICMP connection for faddr 200.200.200.4/0 gaddr 192.168.10.54/52160 laddr 192.168.10.54/52160&lt;BR /&gt;%ASA-7-609002: Teardown local-host DMZ:192.168.10.54 duration 0:00:04&lt;BR /&gt;%ASA-7-609002: Teardown local-host OUTSIDE:200.200.200.4 duration 0:00:04&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182924#M1066197</guid>
      <dc:creator>CSCO12361421</dc:creator>
      <dc:date>2020-02-21T14:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182932#M1066200</link>
      <description>&lt;P&gt;Can you attach the running-configuration on your device?&lt;BR /&gt;You might be missing firewall policies or misconfigured NAT statements&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'd advise to check the policies again.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Also, by default, ASA does NOT allow ping i.e., ICMP traffic to passthrough, even if you have firewall policies that allow it. You need to check and enable ICMP inspection in your service policy default rule. Additionally, the 'traceroute' commands has additional considerations as well&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To allow traceroute you need to&amp;nbsp;create a 'global' service policy set to use 'use class-default' and enable&amp;nbsp;decrement ttl. Once that's done enable an inbound policy that allows ICMP ID 11&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 11:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182932#M1066200</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2017-09-12T11:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182964#M1066202</link>
      <description>&lt;P&gt;So if you have a NAT statement that goes from dmz to outside and you want to reach out to it on the inside you can configure the next&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (dmz,outside) source static Dmz_IP Outside_ip_dmz&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source dynamic any interface&amp;nbsp;destination static&amp;nbsp;&lt;SPAN&gt;Outside_ip_dmz&amp;nbsp;&amp;nbsp;Dmz_IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside,dmz) source dynamic any&amp;nbsp;interface&amp;nbsp;destination static Dmz_IP&amp;nbsp; Dmz_IP&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 12:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182964#M1066202</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-12T12:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182983#M1066204</link>
      <description>&lt;P&gt;Did you check your Service Profile inspection settings?&lt;BR /&gt;&lt;BR /&gt;Also, considering your LAN and DMZ are controlled by you/IT admins. I'd advise not to NAT that. Just do normal routing. NAT is often executed&amp;nbsp;on traffic going to and fro the internet&lt;BR /&gt;&lt;BR /&gt;Additionally, please check your routing, please verify if you have routes going to your internal users/servers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 12:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182983#M1066204</guid>
      <dc:creator>LJ Gabrillo</dc:creator>
      <dc:date>2017-09-12T12:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182991#M1066207</link>
      <description>&lt;P&gt;In most cases that I have seen is that you don't have local DNS server or entries for the servers that you host and also need to reach thus you end up using NAT since you see no sense on adding local records.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT is just a solution to save money or efforts in configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 12:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3182991#M1066207</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-12T12:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3183418#M1066208</link>
      <description>Hi jumora&lt;BR /&gt;Thanks for ur replay. I NAT DMZ server on router. You can find it topology. If i configure NAT on ASA its work fine.</description>
      <pubDate>Wed, 13 Sep 2017 08:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3183418#M1066208</guid>
      <dc:creator>CSCO12361421</dc:creator>
      <dc:date>2017-09-13T08:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3183425#M1066209</link>
      <description>&lt;P&gt;Thanks For Reolay..&lt;/P&gt;&lt;P&gt;-------ASA Configuration ----------&lt;/P&gt;&lt;P&gt;ASA(config)# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.0.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network DNS-53-Global&lt;BR /&gt;network-object host 200.200.200.4&lt;BR /&gt;object-group network DNS-53-Local&lt;BR /&gt;network-object host 192.168.10.53&lt;BR /&gt;access-list 100 extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group 100 global&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.10.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:547ba03f7d17fc22af36495f7104d72a&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;------Router Configuration &amp;nbsp;(R1)------------&lt;/P&gt;&lt;P&gt;R1#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 1400 bytes&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;!&lt;BR /&gt;hostname R1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;no ip icmp rate-limit unreachable&lt;BR /&gt;ip cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 5&lt;BR /&gt;ip ssh version 1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;duplex auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description ### Connect To ASA Eth1 ###&lt;BR /&gt;ip address 10.10.0.2 255.255.255.252&lt;BR /&gt;ip nat inside&lt;BR /&gt;media-type gbic&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt;description ### Connect To Internet ###&lt;BR /&gt;ip address 200.200.200.1 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source static 192.168.10.53 200.200.200.4 extendable&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 200.200.200.2&lt;BR /&gt;ip route 192.168.0.0 255.255.255.0 10.10.0.1&lt;BR /&gt;ip route 192.168.10.0 255.255.255.0 10.10.0.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;stopbits 1&lt;BR /&gt;line aux 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;privilege level 15&lt;BR /&gt;logging synchronous&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2017 08:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3183425#M1066209</guid>
      <dc:creator>CSCO12361421</dc:creator>
      <dc:date>2017-09-13T08:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA DMZ server Access problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3184052#M1066210</link>
      <description>&lt;P&gt;great so is everything resolved.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2017 12:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-dmz-server-access-problem/m-p/3184052#M1066210</guid>
      <dc:creator>jumora1</dc:creator>
      <dc:date>2017-09-14T12:03:00Z</dc:date>
    </item>
  </channel>
</rss>

