<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Back to back dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441921#M1082613</link>
    <description>&lt;P&gt;Hello I have two asa firewall switches connected in between a server dmz. One of the switches is configured to allow the dmz to access the internet. But I'm having trouble on the second switch because I want the inside host to be able to talk to the dmz but not have internet access. What is the acl command to do that?&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jul 2021 16:26:50 GMT</pubDate>
    <dc:creator>EmekaNwokeji1398</dc:creator>
    <dc:date>2021-07-30T16:26:50Z</dc:date>
    <item>
      <title>Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441921#M1082613</link>
      <description>&lt;P&gt;Hello I have two asa firewall switches connected in between a server dmz. One of the switches is configured to allow the dmz to access the internet. But I'm having trouble on the second switch because I want the inside host to be able to talk to the dmz but not have internet access. What is the acl command to do that?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441921#M1082613</guid>
      <dc:creator>EmekaNwokeji1398</dc:creator>
      <dc:date>2021-07-30T16:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441932#M1082615</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1157428"&gt;@EmekaNwokeji1398&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hard to tell without seeing your network topology or configuration, but you just need to be specific in your destination IP/network on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network INSIDE-NET&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network DMZ-SERVER&lt;BR /&gt;&amp;nbsp;host 192.168.10.5&lt;BR /&gt;!&lt;BR /&gt;access-list ACL extended permit ip object INSIDE-NET object DMZ-SERVER&lt;/PRE&gt;
&lt;P&gt;The example above will permit traffic from the INSIDE network to the DMZ server IP address. Amend accordingly to fit your environment. &lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441932#M1082615</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-07-30T16:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441936#M1082616</link>
      <description>&lt;P&gt;Will that allow the inside network to talk to the internet because I want to deny it.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441936#M1082616</guid>
      <dc:creator>EmekaNwokeji1398</dc:creator>
      <dc:date>2021-07-30T16:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441938#M1082617</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1157428"&gt;@EmekaNwokeji1398&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No, that will only allow the inside network to communicate with the DMZ server. By default any traffic not specifically permitted will be denied, therefore no internet access.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441938#M1082617</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-07-30T16:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441939#M1082618</link>
      <description>&lt;P&gt;Many reasons :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. is the same IP Address range, if not you need NAT here to get internet&lt;/P&gt;
&lt;P&gt;2. you need Access rule to allow new subnet to access internet.&lt;/P&gt;
&lt;P&gt;3. routing required depends on network&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is only assumptions and suggestions. Provide more details like small network diagram and IP address information (show run from ASA)&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441939#M1082618</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-07-30T16:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441941#M1082620</link>
      <description>&lt;P&gt;I'm sorry if I didn't put the topology and configurations The reason is because I'm working on classified projects and I'm not trying to get in trouble.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 16:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441941#M1082620</guid>
      <dc:creator>EmekaNwokeji1398</dc:creator>
      <dc:date>2021-07-30T16:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441983#M1082622</link>
      <description>&lt;P&gt;Will the dmz be able to communicate to the inside network because the default security of the dmz is less than the security of inside?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 17:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441983#M1082622</guid>
      <dc:creator>EmekaNwokeji1398</dc:creator>
      <dc:date>2021-07-30T17:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441985#M1082623</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1157428"&gt;@EmekaNwokeji1398&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have an ACL from inside to dmz (like suggested above) and traffic is initiated from the inside network to the dmz, the dmz network will be able to automatically respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the traffic is initiated from the dmz to the inside network, then you will need another ACL to permit the traffic to the inside network.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 17:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4441985#M1082623</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-07-30T17:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4442005#M1082624</link>
      <description>&lt;P&gt;Okay. What would happen if I had the outside firewall for dmz to outside set the ACL extended permit ip any any will that affect the inside?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 18:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4442005#M1082624</guid>
      <dc:creator>EmekaNwokeji1398</dc:creator>
      <dc:date>2021-07-30T18:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Back to back dmz</title>
      <link>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4442008#M1082625</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1157428"&gt;@EmekaNwokeji1398&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If that rule is configured inbound on the DMZ interface, then yes the DMZ can communicate with the inside network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you intention is to not permit internet access from the inside, configure specific ACLs and ensure you permit exactly what you need. You could also make sure you have no nat rules from inside to outside, if there are no nat rules the inside network cannot hope to communicate with the internet.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 18:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/back-to-back-dmz/m-p/4442008#M1082625</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-07-30T18:15:59Z</dc:date>
    </item>
  </channel>
</rss>

