<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT/ACL issue when creating a DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065708#M134684</link>
    <description>&lt;P&gt;This is a new DMZ on an ASA running 8.2 code.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Vendor X wants to put several servers in the DMZ in the 172.16.0.0/24 subnet. They want that DMZ subnet to have access to the inside subnets of 10.10.10.0/24 and 10.10.20.0/24 on the services specified by the VendorX-Services-TCP/UDP object groups. They also want to be able to get from their location (2.2.2.2) to the DMZ subnet by connecting to 1.1.1.1 but only using the services allowed in the object-group service VendorX-External-Access-TCP/UDP object-groups. &lt;BR /&gt;The DMZ servers should be allowed to get to anywhere on the outside.&lt;/P&gt;
&lt;P&gt;I know at this point that they cannot access the DMZ from their IP (2.2.2.2) and I think it's a NAT issue of some kind but was hoping someone could look at the config I'm putting in and let me know what I'm doing wrong. Additionally, could you double check that I have the DMZ &amp;gt; INSIDE stuff set up correctly?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;name 172.16.0.10 VendorX-Private-IP&lt;BR /&gt;name 1.1.1.1 VendorX-Public-IP&lt;/P&gt;
&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;static (DMZ,outside) VendorX-Public-IP VendorX-Private-IP netmask 255.255.255.255&lt;BR /&gt;static (inside,DMZ) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;BR /&gt;static (inside,DMZ) 172.16.0.0 172.16.0.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network VendorX-Company-IP&lt;BR /&gt;network-object host 2.2.2.2&lt;/P&gt;
&lt;P&gt;object-group network VendorX-Internal&lt;BR /&gt;network-object 10.10.10.0 255.255.255.0&lt;BR /&gt;network-object 10.10.20.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group service VendorX-Services-TCP tcp&lt;BR /&gt;port-object eq 5985&lt;BR /&gt;port-object eq 5986&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 22&lt;BR /&gt;port-object eq 902&lt;BR /&gt;port-object eq 903&lt;BR /&gt;port-object eq 10080&lt;BR /&gt;port-object eq 10443&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 8444&lt;BR /&gt;port-object eq 8445&lt;BR /&gt;port-object eq 6970&lt;BR /&gt;port-object eq 80&lt;BR /&gt;port-object eq 443&lt;/P&gt;
&lt;P&gt;object-group service VendorX-Services-UDP udp&lt;BR /&gt;port-object eq 161&lt;/P&gt;
&lt;P&gt;object-group service VendorX-External-Access-TCP tcp&lt;BR /&gt;port-object eq 10000&lt;BR /&gt;port-object eq 22&lt;/P&gt;
&lt;P&gt;object-group service VendorX-External-Access-UDP udp&lt;BR /&gt;port-object eq 500&lt;BR /&gt;port-object eq 10000&lt;BR /&gt;port-object eq 4500&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list acl_out line 19 extended permit tcp object-group VendorX-Company-IP host VendorX-Public-IP object-group VendorX-External-Access-TCP&lt;BR /&gt;access-list acl_out line 20 extended permit udp object-group VendorX-Company-IP host VendorX-Public-IP object-group VendorX-External-Access-UDP&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list DMZ_outbound extended permit tcp host VendorX-Private-IP object-group VendorX-Internal object-group VendorX-Services-TCP&lt;BR /&gt;access-list DMZ_outbound extended permit udp host VendorX-Private-IP object-group VendorX-Internal object-group VendorX-Services-UDP&lt;/P&gt;
&lt;P&gt;access-group acl_out in interface outside&lt;BR /&gt;access-group DMZ_outbound in interface DMZ&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:35:27 GMT</pubDate>
    <dc:creator>krcollab</dc:creator>
    <dc:date>2019-03-12T09:35:27Z</dc:date>
    <item>
      <title>NAT/ACL issue when creating a DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065708#M134684</link>
      <description>&lt;P&gt;This is a new DMZ on an ASA running 8.2 code.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Vendor X wants to put several servers in the DMZ in the 172.16.0.0/24 subnet. They want that DMZ subnet to have access to the inside subnets of 10.10.10.0/24 and 10.10.20.0/24 on the services specified by the VendorX-Services-TCP/UDP object groups. They also want to be able to get from their location (2.2.2.2) to the DMZ subnet by connecting to 1.1.1.1 but only using the services allowed in the object-group service VendorX-External-Access-TCP/UDP object-groups. &lt;BR /&gt;The DMZ servers should be allowed to get to anywhere on the outside.&lt;/P&gt;
&lt;P&gt;I know at this point that they cannot access the DMZ from their IP (2.2.2.2) and I think it's a NAT issue of some kind but was hoping someone could look at the config I'm putting in and let me know what I'm doing wrong. Additionally, could you double check that I have the DMZ &amp;gt; INSIDE stuff set up correctly?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;name 172.16.0.10 VendorX-Private-IP&lt;BR /&gt;name 1.1.1.1 VendorX-Public-IP&lt;/P&gt;
&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;static (DMZ,outside) VendorX-Public-IP VendorX-Private-IP netmask 255.255.255.255&lt;BR /&gt;static (inside,DMZ) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;BR /&gt;static (inside,DMZ) 172.16.0.0 172.16.0.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network VendorX-Company-IP&lt;BR /&gt;network-object host 2.2.2.2&lt;/P&gt;
&lt;P&gt;object-group network VendorX-Internal&lt;BR /&gt;network-object 10.10.10.0 255.255.255.0&lt;BR /&gt;network-object 10.10.20.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group service VendorX-Services-TCP tcp&lt;BR /&gt;port-object eq 5985&lt;BR /&gt;port-object eq 5986&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 22&lt;BR /&gt;port-object eq 902&lt;BR /&gt;port-object eq 903&lt;BR /&gt;port-object eq 10080&lt;BR /&gt;port-object eq 10443&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;port-object eq 8080&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 8444&lt;BR /&gt;port-object eq 8445&lt;BR /&gt;port-object eq 6970&lt;BR /&gt;port-object eq 80&lt;BR /&gt;port-object eq 443&lt;/P&gt;
&lt;P&gt;object-group service VendorX-Services-UDP udp&lt;BR /&gt;port-object eq 161&lt;/P&gt;
&lt;P&gt;object-group service VendorX-External-Access-TCP tcp&lt;BR /&gt;port-object eq 10000&lt;BR /&gt;port-object eq 22&lt;/P&gt;
&lt;P&gt;object-group service VendorX-External-Access-UDP udp&lt;BR /&gt;port-object eq 500&lt;BR /&gt;port-object eq 10000&lt;BR /&gt;port-object eq 4500&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list acl_out line 19 extended permit tcp object-group VendorX-Company-IP host VendorX-Public-IP object-group VendorX-External-Access-TCP&lt;BR /&gt;access-list acl_out line 20 extended permit udp object-group VendorX-Company-IP host VendorX-Public-IP object-group VendorX-External-Access-UDP&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;access-list DMZ_outbound extended permit tcp host VendorX-Private-IP object-group VendorX-Internal object-group VendorX-Services-TCP&lt;BR /&gt;access-list DMZ_outbound extended permit udp host VendorX-Private-IP object-group VendorX-Internal object-group VendorX-Services-UDP&lt;/P&gt;
&lt;P&gt;access-group acl_out in interface outside&lt;BR /&gt;access-group DMZ_outbound in interface DMZ&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065708#M134684</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2019-03-12T09:35:27Z</dc:date>
    </item>
    <item>
      <title>bump</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065709#M134685</link>
      <description>&lt;P&gt;bump&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 13:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065709#M134685</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2017-06-16T13:08:00Z</dc:date>
    </item>
    <item>
      <title>"The DMZ servers should be</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065710#M134686</link>
      <description>&lt;P&gt;"The DMZ servers should be allowed to get to anywhere on the outside"&lt;/P&gt;
&lt;P&gt;I don't see an ACL for that.&lt;/P&gt;
&lt;P&gt;I would also suggest running the packet-tracer command to better troubleshoot and isolate the issues.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065710#M134686</guid>
      <dc:creator>dperezoquendo</dc:creator>
      <dc:date>2017-06-19T15:22:07Z</dc:date>
    </item>
    <item>
      <title>Wow.  Not sure how I missed</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065711#M134687</link>
      <description>&lt;P&gt;Wow.&amp;nbsp; Not sure how I missed that.&amp;nbsp; I've added an object group and modified the ACL (see below) but I'm still having the issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've run a new packet tracer and pasted the output below that.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;_________________&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Config Added:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group network RFC1918&lt;BR /&gt;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;network-object 172.16.0.0 255.240.0.0&lt;/P&gt;
&lt;P&gt;access-list DMZ_outbound line 3 extended deny tcp host VendorX-Private-IP object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line 4 extended deny udp host VendorX-Private-IP object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line 5 extended permit tcp host VendorX-Private-IP any&lt;BR /&gt;access-list DMZ_outbound line 6 extended permit udp host VendorX-Private-IP any&lt;/P&gt;
&lt;P&gt;------------------------------&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;# packet-tracer input outside tcp VendorX-Company-IP 35000 24.249.99.50 22 detailed&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,outside) DMZ-Server-Pub-IP DMZ-Server-Priv-IP netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip DMZ host DMZ-Server-Priv-IP outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to DMZ-Server-Pub-IP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 13799&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate DMZ-Server-Pub-IP/0 to DMZ-Server-Priv-IP/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp object-group VendorX-Company-IP host DMZ-Server-Pub-IP eq ssh &lt;BR /&gt;object-group network VendorX-Company-IP&lt;BR /&gt;&amp;nbsp;network-object host VendorX-Company-IP&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac1405e0, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10, user_data=0xa89f5340, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=VendorX-Company-IP, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=DMZ-Server-Pub-IP, mask=255.255.255.255, port=22, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xab7b3998, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=39385078, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xac230e40, priority=12, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2680707, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xb2a05360, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=25, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 15:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065711#M134687</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2017-06-19T15:44:10Z</dc:date>
    </item>
    <item>
      <title>Hmm,</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065712#M134688</link>
      <description>&lt;P&gt;Hmm,&lt;/P&gt;
&lt;P&gt;It might be the 2 rules you added:&lt;/P&gt;
&lt;P&gt;access-list DMZ_outbound line 3 extended deny tcp host VendorX-Private-IP object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line 4 extended deny udp host VendorX-Private-IP object-group RFC1918&lt;/P&gt;
&lt;P&gt;You are untranslating public to private ip&amp;nbsp;but then your denying via other RFC1918s. I don't think you'll be even to talk DMZ to Internal with those 2 ACLs in there.&lt;/P&gt;
&lt;P&gt;Try doing a packet-tracer from DMZ to inside as well.&lt;/P&gt;
&lt;P&gt;I am also unfamiliar with pre-8.3 NAT statements so bare with me please :).&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065712#M134688</guid>
      <dc:creator>dperezoquendo</dc:creator>
      <dc:date>2017-06-19T16:09:51Z</dc:date>
    </item>
    <item>
      <title>The first two lines in the</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065713#M134689</link>
      <description>&lt;P&gt;The first two lines in the ACL (before the new ones I put in) granted TCP and UDP access to the inside IPs/ports that I wanted for DMZ &amp;gt; Inside access.&amp;nbsp; I figure that would take care of things before I then denied access to any other RFC1918 IPs.&amp;nbsp; Since the traffic I'm having issues with is traffic from Outside &amp;gt; DMZ, I thought the return traffic would go from the Private DMZ IP &amp;gt; Vendor Company's Public IP so it should hit lines 5 and 6.&amp;nbsp; Are you saying that I might need to have it allow the DMZ public IPs to get out rather than the DMZ private IPs?&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;No worries on the 8.2 thing.&amp;nbsp; I'm the same way.&amp;nbsp; I appreciate the help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 16:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065713#M134689</guid>
      <dc:creator>krcollab</dc:creator>
      <dc:date>2017-06-19T16:18:11Z</dc:date>
    </item>
    <item>
      <title>No. I'm saying all you really</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065714#M134690</link>
      <description>&lt;P&gt;No. I'm saying all you really need is an ACL allowing your DMZ to talk to Inside and Outside networks as per your customer's requirement. Lines 5 and 6 should be fine.&lt;/P&gt;
&lt;P&gt;So really you can delete the line 3 and line 4 of the DMZ_outbound. Unless I'm reading it incorrectly, but these 2 lines appear to deny your&amp;nbsp;vendor private IP&amp;nbsp;from entering the ASA via the DMZ.&amp;nbsp;Your DMZ and Internal&amp;nbsp;subnet falls under the RFC1918 object-group. That server has to be able to&amp;nbsp;reach the ASA for NAT to hit.&lt;/P&gt;
&lt;P&gt;For example, try doing a packet-trace from DMZ to outside, and lets see results.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 17:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065714#M134690</guid>
      <dc:creator>dperezoquendo</dc:creator>
      <dc:date>2017-06-19T17:37:57Z</dc:date>
    </item>
    <item>
      <title>After re-reading, you may be</title>
      <link>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065715#M134691</link>
      <description>&lt;P&gt;After re-reading, you may be right. Though I still think they should be removed because it looks to me it would block connectivity to inside network. If you want these to remain, then I recommend swapping the order and slightly modifying as such:&lt;/P&gt;
&lt;P&gt;access-list DMZ_outbound line&amp;nbsp;3 extended permit tcp host VendorX-Private-IP any&lt;BR /&gt;access-list DMZ_outbound line&amp;nbsp;4 extended permit udp host VendorX-Private-IP any&lt;/P&gt;
&lt;P&gt;access-list DMZ_outbound line&amp;nbsp;5 extended deny tcp any object-group RFC1918&lt;BR /&gt;access-list DMZ_outbound line&amp;nbsp;6 extended deny udp any object-group RFC1918&lt;/P&gt;
&lt;P&gt;I also recommend doing another packet-tracer from DMZ to Outside to see where that fails.&lt;/P&gt;
&lt;P&gt;Is this a new DMZ? If so, we may need to look at the routing to ensure the server is reachable... if you haven't done that already.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 15:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-acl-issue-when-creating-a-dmz/m-p/3065715#M134691</guid>
      <dc:creator>dperezoquendo</dc:creator>
      <dc:date>2017-06-20T15:31:29Z</dc:date>
    </item>
  </channel>
</rss>

