<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DMZ Setup unable to connect to server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4473938#M1083965</link>
    <description>&lt;P&gt;Hi everybody.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´ve configured this lab and an access-list on the firewall but I can´t access the server from outside. &lt;SPAN&gt;I'm trying to&amp;nbsp;&lt;/SPAN&gt;figure&amp;nbsp;this&amp;nbsp;out&amp;nbsp;but I can't&amp;nbsp;seem&amp;nbsp;to get it.&lt;/P&gt;&lt;P&gt;I´ve attached the lab in zip file if someone wants to give it a try.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;hostname Firewall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;domain-name security.com&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 209.165.200.226 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 70&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network dmz-server&lt;/P&gt;&lt;P&gt;host 192.168.2.3&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.165.200.225 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-DMZ extended permit icmp any host 192.168.2.3&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-DMZ extended permit tcp any host 192.168.2.3 eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-DMZ in interface outside&lt;/P&gt;&lt;P&gt;object network dmz-server&lt;/P&gt;&lt;P&gt;nat (dmz,outside) static 209.165.200.227&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username bruno password z0GmywQDNOZt29FK encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 172.16.3.3 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 209.165.201.2 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Deafult gw&amp;nbsp;192.168.2.1&lt;/P&gt;&lt;P&gt;ip add&amp;nbsp;192.168.2.3&amp;nbsp;&amp;nbsp;255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 25 Sep 2021 17:48:58 GMT</pubDate>
    <dc:creator>bruno.machado.Mac</dc:creator>
    <dc:date>2021-09-25T17:48:58Z</dc:date>
    <item>
      <title>DMZ Setup unable to connect to server</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4473938#M1083965</link>
      <description>&lt;P&gt;Hi everybody.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´ve configured this lab and an access-list on the firewall but I can´t access the server from outside. &lt;SPAN&gt;I'm trying to&amp;nbsp;&lt;/SPAN&gt;figure&amp;nbsp;this&amp;nbsp;out&amp;nbsp;but I can't&amp;nbsp;seem&amp;nbsp;to get it.&lt;/P&gt;&lt;P&gt;I´ve attached the lab in zip file if someone wants to give it a try.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;hostname Firewall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;domain-name security.com&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 209.165.200.226 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 70&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network dmz-server&lt;/P&gt;&lt;P&gt;host 192.168.2.3&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.165.200.225 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-DMZ extended permit icmp any host 192.168.2.3&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-DMZ extended permit tcp any host 192.168.2.3 eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-DMZ in interface outside&lt;/P&gt;&lt;P&gt;object network dmz-server&lt;/P&gt;&lt;P&gt;nat (dmz,outside) static 209.165.200.227&lt;/P&gt;&lt;P&gt;object network inside-network&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username bruno password z0GmywQDNOZt29FK encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 172.16.3.3 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 209.165.201.2 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Deafult gw&amp;nbsp;192.168.2.1&lt;/P&gt;&lt;P&gt;ip add&amp;nbsp;192.168.2.3&amp;nbsp;&amp;nbsp;255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Sep 2021 17:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4473938#M1083965</guid>
      <dc:creator>bruno.machado.Mac</dc:creator>
      <dc:date>2021-09-25T17:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Setup unable to connect to server</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4473940#M1083966</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1248693"&gt;@bruno.machado.Mac&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you ping any IP address on the internet from the firewall itself?&lt;/P&gt;
&lt;P&gt;Run a packet capture inbound on the outside interface to confirm the inbound packet even reaches the firewall.&lt;/P&gt;
&lt;P&gt;Run packet-tracer to simulate traffic to the DMZ server and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Sep 2021 18:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4473940#M1083966</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-25T18:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Setup unable to connect to server</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4474129#M1083980</link>
      <description>&lt;P&gt;Hi Rob.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from firewall to anywhere&amp;nbsp; and from anywhere to the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Firewall#ping 172.16.3.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 172.16.3.3, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 2/13/23 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Firewall#ping 192.168.2.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.2.3, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 0/3/11 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Firewall#ping 192.168.1.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 0/0/4 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PC Management to Firewall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ping 209.165.200.226&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pinging 209.165.200.226 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reply from 209.165.200.226: bytes=32 time=20ms TTL=252&lt;/P&gt;&lt;P&gt;Reply from 209.165.200.226: bytes=32 time=22ms TTL=252&lt;/P&gt;&lt;P&gt;Reply from 209.165.200.226: bytes=32 time=17ms TTL=252&lt;/P&gt;&lt;P&gt;Reply from 209.165.200.226: bytes=32 time=10ms TTL=252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ping statistics for 209.165.200.226:&lt;/P&gt;&lt;P&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;Minimum = 10ms, Maximum = 22ms, Average = 17ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DMZ-Server to own gateway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ping 192.168.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pinging 192.168.2.1 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.1: bytes=32 time=5ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.2.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ping statistics for 192.168.2.1:&lt;/P&gt;&lt;P&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;Minimum = 0ms, Maximum = 5ms, Average = 1ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PC-B to own gateway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ping 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pinging 192.168.1.1 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reply from 192.168.1.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.1.1: bytes=32 time=3ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.1.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;Reply from 192.168.1.1: bytes=32 time&amp;lt;1ms TTL=255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ping statistics for 192.168.1.1:&lt;/P&gt;&lt;P&gt;Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;Minimum = 0ms, Maximum = 3ms, Average = 0ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I simulate traffic from PC-Management it stops on&amp;nbsp;ISP02 with the message "The routing table does not have a route to the destination IP address. The device drops the packet."...but it should be nated by the nat rule...or am I missing some configuration?&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;10.0.0.0/8 is variably subnetted, 3 subnets, 2 masks&lt;/P&gt;&lt;P&gt;D 10.1.1.0/30 [90/2681856] via 10.2.2.2, 02:54:16, Serial0/0/1&lt;/P&gt;&lt;P&gt;C 10.2.2.0/30 is directly connected, Serial0/0/1&lt;/P&gt;&lt;P&gt;L 10.2.2.1/32 is directly connected, Serial0/0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks&lt;/P&gt;&lt;P&gt;C 172.16.3.0/24 is directly connected, GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;L 172.16.3.1/32 is directly connected, GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;209.165.200.0/29 is subnetted, 1 subnets&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;D 209.165.200.224/29 [90/2707456] via 10.2.2.2, 01:33:04, Serial0/0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SSH into Firewall also works&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ssh -l bruno 209.165.200.226&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Firewall&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA CONFIG&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;enable password z0GmywQDNOZt29FK encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 209.165.200.226 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 70&lt;/P&gt;&lt;P&gt;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network dmz-server&lt;/P&gt;&lt;P&gt;host 192.168.2.3&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 209.165.200.225 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network dmz-server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz,outside) static 209.165.200.227&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username bruno password z0GmywQDNOZt29FK encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.3.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.10-192.168.1.30 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;</description>
      <pubDate>Sun, 26 Sep 2021 15:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4474129#M1083980</guid>
      <dc:creator>bruno.machado.Mac</dc:creator>
      <dc:date>2021-09-26T15:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Setup unable to connect to server</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4474133#M1083981</link>
      <description>&lt;P&gt;"But when I simulate traffic from PC-Management it stops on ISP02 with the message "The routing table does not have a route to the destination IP address. The device drops the packet."...but it should be nated by the nat rule...or am I missing some configuration?"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;....but you ran a ping from PC-Management and it succeeded, how are you simulating this traffic? How about running a packet capture on the ASA inbound to determine whether the traffic even reaches the ASA. If it doesn't that indicates an issue with a device in front of the ASA, which might make sense if traffic stops on ISP02 - so therefore check ISP02.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Sep 2021 15:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4474133#M1083981</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-09-26T15:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Setup unable to connect to server</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4475660#M1084047</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I figured it out. Very simple in fact.&lt;/P&gt;&lt;P&gt;The ASA 5505 in base license doesn´t allow for more than 3 Vlan´s, so&amp;nbsp;&lt;SPAN&gt;Vlan3 interface cannot forward traffic to the inside Vlan (Vlan1) interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Firewall(config-if)# no forward interface vlan 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Sometimes the answer is in front of our eyes and we don t see it &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 14:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-unable-to-connect-to-server/m-p/4475660#M1084047</guid>
      <dc:creator>bruno.machado.Mac</dc:creator>
      <dc:date>2021-09-28T14:33:38Z</dc:date>
    </item>
  </channel>
</rss>

