<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Broken communication between INSIDE and DMZ Zones in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496163#M1084766</link>
    <description>&lt;P&gt;Good afternoon,&amp;nbsp; I've hit a bit of a wall so I'm requesting assistance from the experts.&amp;nbsp; I have a single router with interfaces Gi0/1.1 and Gi0/3 placed in IN-ZONE and DMZ-ZONE respectively.&amp;nbsp; The Zone-Pair with source as IN-ZONE and destination as DMZ-ZONE uses service policy POL-IN-DMZ.&amp;nbsp; This policy uses inspect type class-map called CLS-IN-DMZ and is configured to inspect the matching traffic.&amp;nbsp; The class-map calls an ACL that's basically permit IP any any.&amp;nbsp; &amp;nbsp;So by doing this, I can forward packets from IN Zone to DMZ Zone.&amp;nbsp; This works as I am able to ping a webserver in DMZ from INSIDE.&amp;nbsp;&amp;nbsp;Issue occurs when I try to load a webpage on a computer on my LAN (INSIDE) and try to connect to the same webserver mentioned above.&amp;nbsp;&amp;nbsp;It just spins and spins and gets no where until it times out.&amp;nbsp; When I disable ZBFW from all interfaces,&amp;nbsp; the page loads fine.&lt;/P&gt;&lt;P&gt;I've been scratching my head for a while and was wondering if anyone has any other suggestions?&amp;nbsp; Please advise.&lt;/P&gt;</description>
    <pubDate>Mon, 01 Nov 2021 18:54:53 GMT</pubDate>
    <dc:creator>Ricky Sandhu</dc:creator>
    <dc:date>2021-11-01T18:54:53Z</dc:date>
    <item>
      <title>Broken communication between INSIDE and DMZ Zones</title>
      <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496163#M1084766</link>
      <description>&lt;P&gt;Good afternoon,&amp;nbsp; I've hit a bit of a wall so I'm requesting assistance from the experts.&amp;nbsp; I have a single router with interfaces Gi0/1.1 and Gi0/3 placed in IN-ZONE and DMZ-ZONE respectively.&amp;nbsp; The Zone-Pair with source as IN-ZONE and destination as DMZ-ZONE uses service policy POL-IN-DMZ.&amp;nbsp; This policy uses inspect type class-map called CLS-IN-DMZ and is configured to inspect the matching traffic.&amp;nbsp; The class-map calls an ACL that's basically permit IP any any.&amp;nbsp; &amp;nbsp;So by doing this, I can forward packets from IN Zone to DMZ Zone.&amp;nbsp; This works as I am able to ping a webserver in DMZ from INSIDE.&amp;nbsp;&amp;nbsp;Issue occurs when I try to load a webpage on a computer on my LAN (INSIDE) and try to connect to the same webserver mentioned above.&amp;nbsp;&amp;nbsp;It just spins and spins and gets no where until it times out.&amp;nbsp; When I disable ZBFW from all interfaces,&amp;nbsp; the page loads fine.&lt;/P&gt;&lt;P&gt;I've been scratching my head for a while and was wondering if anyone has any other suggestions?&amp;nbsp; Please advise.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 18:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496163#M1084766</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-11-01T18:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Broken communication between INSIDE and DMZ Zones</title>
      <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496167#M1084767</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149208"&gt;@Ricky Sandhu&lt;/a&gt; can you provide the configuration for review please? you could enable logging on class-default which should provide a clue.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 19:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496167#M1084767</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-11-01T19:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Broken communication between INSIDE and DMZ Zones</title>
      <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496172#M1084768</link>
      <description>&lt;P&gt;I have pasted the relevent configuration below.&amp;nbsp; Logging class-default doesn't show me anything be dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect match-all CLS-IN-DMZ&lt;BR /&gt;match access-group name ACL-IN-DMZ&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect POL-IN-DMZ&lt;BR /&gt;class type inspect CLS-IN-DMZ&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone security IN-ZONE&lt;BR /&gt;description Inside Zone&lt;BR /&gt;zone security DMZ-ZONE&lt;BR /&gt;description DMZ Zone&lt;BR /&gt;!&lt;BR /&gt;zone-pair security ZP-IN-DMZ source IN-ZONE destination DMZ-ZONE&lt;BR /&gt;service-policy type inspect POL-IN-DMZ&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description LAN$FW_INSIDE$&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip flow monitor EXPMonitor input&lt;BR /&gt;ip flow monitor EXPMonitor output&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;no snmp trap link-status&lt;BR /&gt;no mop enabled&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.1&lt;BR /&gt;encapsulation dot1Q 1 native&lt;BR /&gt;ip address 172.18.6.1 255.255.255.0 secondary&lt;BR /&gt;ip address 172.18.6.2 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;no ip virtual-reassembly in&lt;BR /&gt;zone-member security IN-ZONE&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;description $FW_DMZ$&lt;BR /&gt;ip address 10.10.7.1 255.255.255.0&lt;BR /&gt;ip flow egress&lt;BR /&gt;ip nat inside&lt;BR /&gt;no ip virtual-reassembly in&lt;BR /&gt;zone-member security DMZ-ZONE&lt;BR /&gt;ip tcp adjust-mss 1360&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;no snmp trap link-status&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;desc $FW_WAN$&lt;BR /&gt;zone-member security OUT-ZONE&lt;BR /&gt;&amp;lt;CONFIGURATION REMOVED&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-IN-DMZ&lt;BR /&gt;permit ip any any&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 19:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496172#M1084768</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-11-01T19:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: Broken communication between INSIDE and DMZ Zones</title>
      <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496175#M1084769</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149208"&gt;@Ricky Sandhu&lt;/a&gt; can you provide some outputs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show class-map type inspect&lt;BR /&gt;show policy-map type inspect&lt;BR /&gt;show zone-pair security&lt;BR /&gt;debug policy-firewall detail&lt;BR /&gt;debug policy-firewall events&lt;/P&gt;
&lt;P&gt;show logging&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 19:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496175#M1084769</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-11-01T19:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Broken communication between INSIDE and DMZ Zones</title>
      <link>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496276#M1084773</link>
      <description>&lt;P&gt;Hi Rob,&amp;nbsp; I wanted to wait until after-hours to run the detailed debug commands.&amp;nbsp; I have been playing around and discovered that both my LAN port on the router (GE0/1.1) and DMZ port (GE0/3) are configured with ip nat inside.&amp;nbsp; When I ping a device in the DMZ, the packet simply gets routed (with it's real address as the source) rather than being subject to NAT (pat) behind GE0/3.&amp;nbsp; The device in the DMZ sees the packet coming from the real IP address of the client machine.&amp;nbsp; This DMZ device also has a leg directly in the LAN (don't ask), and it sends the reply over it's direct link.&amp;nbsp; You can see how this will cause an issue.&amp;nbsp; HOWEVER, what doesn't explain is why it works when disabling the firewall on the router.&amp;nbsp; It also works if I configure policy-maps in both direction to simply pass the traffic and not inspect it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA you can configure source nat between two interfaces where packets sourced from one interface can use the IP address of the destination interface (overloading).&amp;nbsp; Is there a way to do that in IOS if both my ports are configured with ip nat inside?&amp;nbsp; Technically what I am trying to do is that packets coming from the LAN dynamically PAT behind GE0/3 even though GE0/3 is configured with ip nat inside.&amp;nbsp; Hope it makes sense.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 02:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/broken-communication-between-inside-and-dmz-zones/m-p/4496276#M1084773</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-11-02T02:56:43Z</dc:date>
    </item>
  </channel>
</rss>

