<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with screened DMZ subnet on ASA connected to layer 3 switch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762191#M1097185</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; if you've applied the ACL "inside_access_in" inbound on the inside interface, then the source/destination are incorrect. For the ACL inbound on the inside interface, the source should be the 192.168.190.0/24 (inside network) and the destination should be 172.20.33.0/24 (screened network).&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jan 2023 15:43:02 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2023-01-25T15:43:02Z</dc:date>
    <item>
      <title>Help with screened DMZ subnet on ASA connected to layer 3 switch</title>
      <link>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762159#M1097183</link>
      <description>&lt;P&gt;Good Morning,&lt;/P&gt;&lt;P&gt;Could someone please help me figure this out?&lt;/P&gt;&lt;P&gt;I want hosts on 192.168.190.0 /24 (VLAN 10) to be able to have tcp communication with our screened subnet (VLAN 50) 172.20.33.0 /24 on certain ports, and blocking the rest with an ACL on the ASA.&lt;/P&gt;&lt;P&gt;We have a Cisco 9300 series switch carrying hosts from both subnets/VLANs, connected to an ASA 5516-X.&lt;/P&gt;&lt;P&gt;The 192.168.190.0 hosts have 192.168.190.21 as their gateway (Switch VLAN 10 IP)&lt;BR /&gt;The 172.20.33.0 hosts have 172.20.33.21 as their gateway (ASA screened interface)&lt;/P&gt;&lt;P&gt;On the switch there are 3 relevant VLANs:&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;BR /&gt;description DATA&lt;BR /&gt;ip address 192.168.190.21 255.255.255.0&lt;BR /&gt;ip pim sparse-dense-mode&lt;BR /&gt;!&lt;BR /&gt;interface Vlan50&lt;BR /&gt;description Screened_subnet&lt;BR /&gt;ip address 172.20.33.22 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan100&lt;BR /&gt;ip address 192.168.254.201 255.255.255.248&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;VLANs 10 and 50 are configured on their respective hosts access ports.&lt;BR /&gt;VLAN 100 is configured as our link to our ASA.&lt;/P&gt;&lt;P&gt;We have this static route in place, pointing to the ASA inside interface:&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 192.168.254.202&lt;/P&gt;&lt;P&gt;With just the above route, VLAN 10 hosts are unable to connect to VLAN 50 hosts.&lt;/P&gt;&lt;P&gt;If i add the following, it is able to connect (tcp/23 for test)&lt;/P&gt;&lt;P&gt;ip route 172.20.33.100 255.255.255.255 192.168.254.202&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;However, when i implement an ACL on the inside interface to deny tcp/23 from the 172 to the 192, it is still permitted.&lt;/P&gt;&lt;P&gt;Can someone look through my config and see if you can spot the issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the ASA:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.254.202 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;nameif screened&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.20.33.21 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 66.19.228.241 1&lt;BR /&gt;route inside 10.0.6.0 255.255.255.0 192.168.254.201 1&lt;BR /&gt;route inside 10.0.7.0 255.255.255.0 192.168.254.201 1&lt;BR /&gt;route inside 172.20.33.0 255.255.255.0 192.168.254.201 1&lt;BR /&gt;route real_PC 192.168.20.0 255.255.255.0 192.168.20.141 1&lt;BR /&gt;route inside 192.168.33.0 255.255.255.0 192.168.33.21 1&lt;BR /&gt;route inside 192.168.190.0 255.255.255.0 192.168.254.201 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (screened,inside) after-auto source dynamic any interface&lt;BR /&gt;nat (inside,screened) after-auto source dynamic any interface&lt;BR /&gt;nat (any,any) after-auto source static Internal_RFC1918 Internal_RFC1918 destination static Internal_RFC1918 Internal_RFC1918 no-proxy-arp&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list inside_access_in extended deny tcp 172.20.33.0 255.255.255.0 192.168.190.0 255.255.255.0 eq telnet&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help,&lt;/P&gt;&lt;P&gt;Jesse&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 15:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762159#M1097183</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2023-01-25T15:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: Help with screened DMZ subnet on ASA connected to layer 3 switch</title>
      <link>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762170#M1097184</link>
      <description>&lt;P&gt;This probably belongs here:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/bd-p/discussions-network-security" target="_blank"&gt;https://community.cisco.com/t5/network-security/bd-p/discussions-network-security&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 15:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762170#M1097184</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-01-25T15:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Help with screened DMZ subnet on ASA connected to layer 3 switch</title>
      <link>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762191#M1097185</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1104473"&gt;@Jesserony&lt;/a&gt; if you've applied the ACL "inside_access_in" inbound on the inside interface, then the source/destination are incorrect. For the ACL inbound on the inside interface, the source should be the 192.168.190.0/24 (inside network) and the destination should be 172.20.33.0/24 (screened network).&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 15:43:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762191#M1097185</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-01-25T15:43:02Z</dc:date>
    </item>
    <item>
      <title>Re: Help with screened DMZ subnet on ASA connected to layer 3 switch</title>
      <link>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762437#M1097200</link>
      <description>&lt;P&gt;Thanks Rob, i am good to go now!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 21:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-screened-dmz-subnet-on-asa-connected-to-layer-3-switch/m-p/4762437#M1097200</guid>
      <dc:creator>Jesserony</dc:creator>
      <dc:date>2023-01-25T21:31:40Z</dc:date>
    </item>
  </channel>
</rss>

