<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to setup DMZ switch and ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817844#M1099663</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I am attempting to setup a DMZ client, switch and ASA. Currently the DMZ switch can ping the DMZ gateway of 172.16.1.1 but the client cannot. What am I missing?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1681919826904.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182404i0570F230DBD0AF78/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1681919826904.png" alt="NetworkMonkey101_0-1681919826904.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;DMZ&lt;/P&gt;&lt;P&gt;#show run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 3696 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 15:52:40 UTC Wed Apr 19 2023&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname DMZ&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description DMZ &amp;gt; ASA&lt;BR /&gt;switchport access vlan 500&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Vlan500&lt;BR /&gt;ip address 172.16.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 172.16.1.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner incoming ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner login ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# show run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9A3B848QTNH&lt;BR /&gt;: Hardware: ASAv, 2048 MB RAM, CPU Pentium II 3500 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.16(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description OUTSIDE&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;no management-only&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.255.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 99999&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any INSIDE&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;router eigrp 1&lt;BR /&gt;network 10.1.1.0 255.255.255.0&lt;BR /&gt;network 172.16.1.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;http 0.0.0.0 0.0.0.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA2&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;!!!!&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect snmp&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:b3d33d8e3c9e429cefa8b91c4c686667&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;DMZ CLIENT&lt;/P&gt;&lt;P&gt;PC3&amp;gt; show ip&lt;/P&gt;&lt;P&gt;NAME : PC3[1]&lt;BR /&gt;IP/MASK : 172.16.1.100/24&lt;BR /&gt;GATEWAY : 172.16.1.1&lt;BR /&gt;DNS :&lt;BR /&gt;MAC : 00:50:79:66:68:01&lt;BR /&gt;LPORT : 20149&lt;BR /&gt;RHOST:PORT : 127.0.0.1:20150&lt;BR /&gt;MTU : 1500&lt;/P&gt;&lt;P&gt;PC3&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Apr 2023 16:01:44 GMT</pubDate>
    <dc:creator>NetworkMonkey101</dc:creator>
    <dc:date>2023-04-19T16:01:44Z</dc:date>
    <item>
      <title>How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817844#M1099663</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I am attempting to setup a DMZ client, switch and ASA. Currently the DMZ switch can ping the DMZ gateway of 172.16.1.1 but the client cannot. What am I missing?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1681919826904.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/182404i0570F230DBD0AF78/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1681919826904.png" alt="NetworkMonkey101_0-1681919826904.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;DMZ&lt;/P&gt;&lt;P&gt;#show run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 3696 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 15:52:40 UTC Wed Apr 19 2023&lt;BR /&gt;!&lt;BR /&gt;version 15.2&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;service compress-config&lt;BR /&gt;!&lt;BR /&gt;hostname DMZ&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description DMZ &amp;gt; ASA&lt;BR /&gt;switchport access vlan 500&lt;BR /&gt;switchport mode access&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;switchport access vlan 30&lt;BR /&gt;media-type rj45&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Vlan500&lt;BR /&gt;ip address 172.16.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 172.16.1.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner incoming ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;banner login ^C&lt;BR /&gt;**************************************************************************&lt;BR /&gt;* IOSv is strictly limited to use for evaluation, demonstration and IOS *&lt;BR /&gt;* education. IOSv is provided as-is and is not supported by Cisco's *&lt;BR /&gt;* Technical Advisory Center. Any use or disclosure, in whole or in part, *&lt;BR /&gt;* of the IOSv Software or Documentation to any third party for any *&lt;BR /&gt;* purposes is expressly prohibited except as otherwise authorized by *&lt;BR /&gt;* Cisco in writing. *&lt;BR /&gt;**************************************************************************^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;exec-timeout 0 0&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;login&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# show run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: 9A3B848QTNH&lt;BR /&gt;: Hardware: ASAv, 2048 MB RAM, CPU Pentium II 3500 MHz, 1 CPU (2 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.16(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description OUTSIDE&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description DMZ&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;no management-only&lt;BR /&gt;nameif MGMT&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.255.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup OUTSIDE&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;domain-name TEST.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffer-size 99999&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu INSIDE 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu MGMT 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any INSIDE&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;router eigrp 1&lt;BR /&gt;network 10.1.1.0 255.255.255.0&lt;BR /&gt;network 172.16.1.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 MGMT&lt;BR /&gt;http 0.0.0.0 0.0.0.0 INSIDE&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA2&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;!!!!&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect snmp&lt;BR /&gt;inspect icmp&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;profile License&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination transport-method http&lt;BR /&gt;Cryptochecksum:b3d33d8e3c9e429cefa8b91c4c686667&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;DMZ CLIENT&lt;/P&gt;&lt;P&gt;PC3&amp;gt; show ip&lt;/P&gt;&lt;P&gt;NAME : PC3[1]&lt;BR /&gt;IP/MASK : 172.16.1.100/24&lt;BR /&gt;GATEWAY : 172.16.1.1&lt;BR /&gt;DNS :&lt;BR /&gt;MAC : 00:50:79:66:68:01&lt;BR /&gt;LPORT : 20149&lt;BR /&gt;RHOST:PORT : 127.0.0.1:20150&lt;BR /&gt;MTU : 1500&lt;/P&gt;&lt;P&gt;PC3&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817844#M1099663</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-19T16:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817849#M1099664</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1495947"&gt;@NetworkMonkey101&lt;/a&gt; the interface PC3 is connected to is not in the correct VLAN, it's in VLAN 30 but should be in VLAN 500.&lt;/P&gt;
&lt;P&gt;Change to:&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan &lt;STRONG&gt;500&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817849#M1099664</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-19T16:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817858#M1099666</link>
      <description>&lt;P&gt;Thanks I have change this, and now able to ping the DMZ GW from the DMZ client.&lt;/P&gt;&lt;P&gt;Also is this the correct way to setup my VLANs, the core has a VLAN 500 but in a different network which I had intended to use as a Management network but now I am using VLAN 500 in my DMZ with a different subnet.&lt;/P&gt;&lt;P&gt;DMZ switch&lt;/P&gt;&lt;P&gt;Vlan500 172.16.1.2 YES manual up up&lt;/P&gt;&lt;P&gt;Access switch&lt;/P&gt;&lt;P&gt;Vlan500 10.1.1.3 YES NVRAM up up&lt;BR /&gt;&lt;BR /&gt;Core switch&lt;/P&gt;&lt;P&gt;Vlan500 10.1.1.2 YES NVRAM up up&lt;/P&gt;&lt;P&gt;Doesn't seem right to be using VLAN 500 in the DMZ with 172.16.1.X...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817858#M1099666</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-19T16:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817861#M1099667</link>
      <description>&lt;P&gt;since there is L3 device (FW) between SW you can use same VLAN.&lt;BR /&gt;there is no problem BUT you must sure you config FW with router port not as subinterface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817861#M1099667</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-19T16:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817863#M1099668</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1495947"&gt;@NetworkMonkey101&lt;/a&gt; well it's a different VLAN 500 on the DMZ, the DMZ switch won't know about the other VLAN 500 the other side of the firewall. Just change it to something different if you wish.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817863#M1099668</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-19T16:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817871#M1099669</link>
      <description>&lt;P&gt;Thank you both for your help, onto the next part of the topology &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817871#M1099669</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2023-04-19T16:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to setup DMZ switch and ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817886#M1099670</link>
      <description>&lt;P&gt;You are welcome&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2023 17:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-setup-dmz-switch-and-asa/m-p/4817886#M1099670</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-19T17:07:15Z</dc:date>
    </item>
  </channel>
</rss>

