<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA &amp;amp; DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547762#M1125074</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;well it worked because you changed the object DMZ-net host address to 20.20.20.1, therefore the NAT rule did not match the ping traffic and was routed.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Apr 2026 16:24:29 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2026-04-23T16:24:29Z</dc:date>
    <item>
      <title>ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547429#M1125049</link>
      <description>&lt;P&gt;Hello everyone, this is my first experience with ASA in GNS3. My PC3 from outside cannot communicate with the DMZ. What should I change? Thanks in advance&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;ASA Version 9.8(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.16.1.2 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 50&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 20.20.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 20.20.20.20&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (DMZ,outside) static 172.16.1.1&lt;/P&gt;&lt;P&gt;access-group DMZ in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ out interface outside&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 20.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 172.16.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;version 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.1 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; no tcp-inspection&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547429#M1125049</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-22T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547463#M1125050</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;you've create a static NAT for the DMZ host "DMZ-net" using an IP address of 172.16.1.1 which is the same IP address as the next hop for your default gateway. You would need to change the NAT IP address so it does not conflict with the default gateway.&lt;/P&gt;
&lt;PRE&gt;object network DMZ-net&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static &lt;U&gt;&lt;STRONG&gt;172.16.1.1&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 &lt;U&gt;&lt;STRONG&gt;172.16.1.1&lt;/STRONG&gt; &lt;/U&gt;1&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 17:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547463#M1125050</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-22T17:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547465#M1125051</link>
      <description>&lt;P&gt;&amp;nbsp;see you're NAT-ing the 20.20.20.20 to 172.16.1.1, and the default route is also pointing to 172.16.1.1.&lt;/P&gt;
&lt;P&gt;Either one of those is incorrect. If the router has 172.16.1.1, then you can't also use that for the static nat.&lt;BR /&gt;If the router has another ip address, then the default route is incorrect and doesn't point to the router.&lt;/P&gt;
&lt;P&gt;How are you testing the reachability from PC3?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 17:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547465#M1125051</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2026-04-22T17:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547471#M1125052</link>
      <description>&lt;P&gt;Hello all together!&lt;/P&gt;&lt;P&gt;I changed so:&amp;nbsp;ASA(config-network-object)# nat (DMZ,outside) static 172.16.1.0&lt;/P&gt;&lt;P&gt;The ICMP from PC2 (DMZ) to PC3 (Outside) is psitive but from outside to DMZ is not possible.&lt;/P&gt;&lt;P&gt;Which IP-Address ist the best for Static?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 18:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547471#M1125052</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-22T18:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547474#M1125053</link>
      <description>&lt;P&gt;From GNS3 I get this message:&lt;/P&gt;&lt;P&gt;Warning: ASAv platform license state is Unlicensed.&lt;BR /&gt;Install ASAv platform license for full functionality.&lt;/P&gt;&lt;P&gt;How can I fix it?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 18:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547474#M1125053</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-22T18:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547475#M1125054</link>
      <description>&lt;P&gt;I changed static ip to 20.20.20.1 and I put a new PC4 into DMZ whit ip 20.20.20.21.&lt;/P&gt;&lt;P&gt;It works, but I don’t know wahy not whit 20.20.20.20 ??&lt;/P&gt;&lt;P&gt;PC3&amp;gt; ping 20.20.20.21&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=1 ttl=63 time=30.760 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=2 ttl=63 time=31.479 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=3 ttl=63 time=31.429 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=4 ttl=63 time=31.297 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=5 ttl=63 time=31.623 ms&lt;/P&gt;&lt;P&gt;PC2&amp;gt; ping 10.10.10.10&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=1 ttl=63 time=32.438 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=2 ttl=63 time=32.463 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=3 ttl=63 time=32.989 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=4 ttl=63 time=33.069 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=5 ttl=63 time=32.990 ms&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 18:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547475#M1125054</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-22T18:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547479#M1125055</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;I expect 20.20.20.21 responds because you don't have NAT object for it, therefore it's routed?&lt;/P&gt;
&lt;P&gt;Provide R1 configuration and the updated ASA configuration rather than have us guess.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can ignore the license warning in the lab, throughput is just throttled, else buying a license would stop the license warning!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 19:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547479#M1125055</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-22T19:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547482#M1125056</link>
      <description>&lt;P&gt;Thank you Rob!!!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 19:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547482#M1125056</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-22T19:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547668#M1125062</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;here what you would!&lt;/P&gt;&lt;P&gt;*********&lt;/P&gt;&lt;P&gt;ASA Version 9.8(3)&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.16.1.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 50&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 20.20.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 20.20.20.20&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (DMZ,outside) static 20.20.20.1&lt;/P&gt;&lt;P&gt;access-group DMZ in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ out interface outside&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 20.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 172.16.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;version 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.1 1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547668#M1125062</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T13:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547718#M1125063</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I put Access-group DMZ in / out interface DMZ and change IP of PC2 to 20.20.20.22.&lt;/P&gt;&lt;P&gt;Connection between OUTSIDE and DMZ ist well.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 14:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547718#M1125063</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T14:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547725#M1125064</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;20.20.20.22 is being routed (same as 20.20.20.21) as there is no specific NAT rule. Your NAT rule for object "DMZ-net" is incorrect which is why&amp;nbsp;20.20.20.1 did not work.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:03:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547725#M1125064</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-23T15:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547731#M1125068</link>
      <description>&lt;P&gt;Hi Rob!&lt;/P&gt;&lt;P&gt;It will be thanksful, when you look at my Config and show me which IP is the correct for DMZ static:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.16.1.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 50&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 20.20.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 20.20.20.20&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network DMZ-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (DMZ,outside) static 20.20.20.1&lt;/P&gt;&lt;P&gt;access-group DMZ in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ out interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;access-group DMZ out interface DMZ&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 20.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 172.16.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network 192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;version 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.1 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547731#M1125068</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T15:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547732#M1125069</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;you cannot NAT the DMZ host behind the ASA's DMZ interface, you have to NAT it behind the ASA's outside interface or an IP address in the same network as the outside interface or another network that is routed to the outside interface of the ASA.&lt;/P&gt;
&lt;P&gt;Because you are now using a /30 you cannot use another IP address in the same network as the outside interface, change it to a /24 then use a spare IP address. Change the PC back to the IP&amp;nbsp;20.20.20.20 so it will be translated.&lt;/P&gt;
&lt;P&gt;Example:-&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.16.1.2 &lt;U&gt;&lt;STRONG&gt;255.255.255.0&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;!&lt;BR /&gt;object network DMZ-net&lt;BR /&gt; host &lt;U&gt;&lt;STRONG&gt;20.20.20.20&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static &lt;U&gt;&lt;STRONG&gt;172.16.1.20&lt;/STRONG&gt;&lt;/U&gt;&lt;/PRE&gt;
&lt;P&gt;Ensure the subnet mask of the R1 F0/0 interface is a /24 - 172.16.1.1&lt;STRONG&gt;/255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547732#M1125069</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-23T15:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547751#M1125070</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/20046"&gt;@rob&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I did it, but there is no connection from 10.10.10.10 to 20.20.20.20!&lt;/P&gt;&lt;P&gt;Other connection are well!&lt;/P&gt;&lt;P&gt;PC3&amp;gt; ping 20.20.20.20&lt;/P&gt;&lt;P&gt;20.20.20.20 icmp_seq=1 timeout&lt;/P&gt;&lt;P&gt;20.20.20.20 icmp_seq=2 timeout&lt;/P&gt;&lt;P&gt;20.20.20.20 icmp_seq=3 timeout&lt;/P&gt;&lt;P&gt;20.20.20.20 icmp_seq=4 timeout&lt;/P&gt;&lt;P&gt;20.20.20.20 icmp_seq=5 timeout&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC3&amp;gt; ping 20.20.20.21&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=1 ttl=63 time=30.866 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=2 ttl=63 time=30.840 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=3 ttl=63 time=31.555 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=4 ttl=63 time=31.113 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.21 icmp_seq=5 ttl=63 time=31.898 ms&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 15:58:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547751#M1125070</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T15:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547754#M1125071</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;but if you are NATTING then you'd need to ping the NAT IP address (assuming the traffic is permitted in the firewall rule). If you want to ping the real IP address (20.20.20.20) then delete the NAT object.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 16:03:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547754#M1125071</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-23T16:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547758#M1125072</link>
      <description>&lt;P&gt;Dear Rob!&lt;/P&gt;&lt;P&gt;I changed it so and everything go well!&lt;/P&gt;&lt;P&gt;ASA(config)# object network DMZ-net&lt;/P&gt;&lt;P&gt;ASA(config-network-object)# host 20.20.20.1&lt;/P&gt;&lt;P&gt;ASA(config-network-object)# nat (DMZ,outside) static 172.16.1.20&lt;/P&gt;&lt;P&gt;PC3&amp;gt; ping 20.20.20.20&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.20 icmp_seq=1 ttl=63 time=30.551 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.20 icmp_seq=2 ttl=63 time=31.396 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.20 icmp_seq=3 ttl=63 time=31.411 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.20 icmp_seq=4 ttl=63 time=30.852 ms&lt;/P&gt;&lt;P&gt;84 bytes from 20.20.20.20 icmp_seq=5 ttl=63 time=31.120 ms&lt;/P&gt;&lt;P&gt;PC2&amp;gt; ping 10.10.10.10&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=1 ttl=63 time=33.517 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=2 ttl=63 time=33.297 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=3 ttl=63 time=32.445 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=4 ttl=63 time=32.800 ms&lt;/P&gt;&lt;P&gt;84 bytes from 10.10.10.10 icmp_seq=5 ttl=63 time=32.826 ms&lt;/P&gt;&lt;P&gt;Thank you for good support&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 16:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547758#M1125072</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T16:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547762#M1125074</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;well it worked because you changed the object DMZ-net host address to 20.20.20.1, therefore the NAT rule did not match the ping traffic and was routed.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 16:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547762#M1125074</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-23T16:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547783#M1125075</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/20046"&gt;@rob&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Is my Wey the correct Solution or not?&lt;/P&gt;&lt;P&gt;When not, is the DMZ whidout NAT the correct answer?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 17:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547783#M1125075</guid>
      <dc:creator>qumarce-habibzadeh</dc:creator>
      <dc:date>2026-04-23T17:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547785#M1125076</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1910492"&gt;@qumarce-habibzadeh&lt;/a&gt;&amp;nbsp;if the DMZ servers have publically routeable IP addresses then NAT is not required.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 17:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-amp-dmz/m-p/5547785#M1125076</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2026-04-23T17:15:31Z</dc:date>
    </item>
  </channel>
</rss>

