<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access problem from Inside to DMZ and outside to DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059820#M134763</link>
    <description>&lt;P&gt;hi ,&lt;/P&gt;
&lt;P&gt;I know this question may have been asked before but I could not find the best solution for my problem.&lt;/P&gt;
&lt;P&gt;I have been assigned a task of maintaining a Cisco ASA 5510 couples days ago. My knowledge is very limited on firewalling kind of rules.&lt;BR /&gt;Recently I need to create DMZ zone for hosting one of my webserver. I have configure and connect another L3 cisco C3750 to that ASA DMZ port and my webserver was ported onto that switch. Original config was ok whereby (inside) can access internet as usual by using pooling static public ip.&lt;/P&gt;
&lt;P&gt;My webserver can access internet (outside) and (inside) including ping, remote desktop but however (inside) cannot access webserver (DMZ) including ping, https or http. And (outside) Internet also cannot access my webserver too. I,ve been doing review a lot of references from the Internet, try and error since then but unfortunately my problem remain unchanged.&lt;/P&gt;
&lt;P&gt;Really appreciate any experts guide me how to solve my problem here. Sorry for my bad english here.&lt;/P&gt;
&lt;P&gt;My ASA Version is 7.2(3) and Hardware is 5510.&amp;nbsp;This platform has a Base license.&lt;/P&gt;
&lt;P&gt;Attached is my configuration to what I think was only related to my subject matter. All my public ip has been masked in the config.&lt;/P&gt;
&lt;P&gt;Inside is 172.31.1.0/24&lt;BR /&gt;webserver private ip is&amp;nbsp;172.31.2.3&lt;BR /&gt;webserver public ip (NAT) is 20.20.20.49&lt;BR /&gt;DMZ Subnet is 172.31.2.0/24&lt;BR /&gt;DMZ Switch is 172.31.2.10&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 09:35:15 GMT</pubDate>
    <dc:creator>El Rondo</dc:creator>
    <dc:date>2019-03-12T09:35:15Z</dc:date>
    <item>
      <title>Access problem from Inside to DMZ and outside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059820#M134763</link>
      <description>&lt;P&gt;hi ,&lt;/P&gt;
&lt;P&gt;I know this question may have been asked before but I could not find the best solution for my problem.&lt;/P&gt;
&lt;P&gt;I have been assigned a task of maintaining a Cisco ASA 5510 couples days ago. My knowledge is very limited on firewalling kind of rules.&lt;BR /&gt;Recently I need to create DMZ zone for hosting one of my webserver. I have configure and connect another L3 cisco C3750 to that ASA DMZ port and my webserver was ported onto that switch. Original config was ok whereby (inside) can access internet as usual by using pooling static public ip.&lt;/P&gt;
&lt;P&gt;My webserver can access internet (outside) and (inside) including ping, remote desktop but however (inside) cannot access webserver (DMZ) including ping, https or http. And (outside) Internet also cannot access my webserver too. I,ve been doing review a lot of references from the Internet, try and error since then but unfortunately my problem remain unchanged.&lt;/P&gt;
&lt;P&gt;Really appreciate any experts guide me how to solve my problem here. Sorry for my bad english here.&lt;/P&gt;
&lt;P&gt;My ASA Version is 7.2(3) and Hardware is 5510.&amp;nbsp;This platform has a Base license.&lt;/P&gt;
&lt;P&gt;Attached is my configuration to what I think was only related to my subject matter. All my public ip has been masked in the config.&lt;/P&gt;
&lt;P&gt;Inside is 172.31.1.0/24&lt;BR /&gt;webserver private ip is&amp;nbsp;172.31.2.3&lt;BR /&gt;webserver public ip (NAT) is 20.20.20.49&lt;BR /&gt;DMZ Subnet is 172.31.2.0/24&lt;BR /&gt;DMZ Switch is 172.31.2.10&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059820#M134763</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2019-03-12T09:35:15Z</dc:date>
    </item>
    <item>
      <title>Try adding these NAT entries:</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059821#M134766</link>
      <description>&lt;P&gt;I think this is what you are missing. Try adding these NAT statements:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;static (Inside,dmz)&amp;nbsp;172.31.1.0 172.31.1.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;static (dmz,inside) 172.31.2.3 172.31.2.3 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (Outside,dmz) 172.31.2.3 20.20.20.49 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If this doesn't fix the issue, then please provide the packet tracer output this should tell you what's wrong.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp&amp;nbsp;172.31.1.10 23456 172.31.2.3 80&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- This packet tracer command is simulating traffic originating from inside and target address is the private address of webserver.&amp;nbsp;I just picked a random address (172.31.1.10) from the inside subnet. If you want to simulate traffic from outside to dmz then replace "inside" to "outside" and just pick any outside address as the source like 4.4.4.4 and replace webserver private ip to its global address 20.20.20.49.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope you find this useful.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2017 19:09:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059821#M134766</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-14T19:09:32Z</dc:date>
    </item>
    <item>
      <title>I have tried with these 3</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059822#M134769</link>
      <description>&lt;P&gt;I have tried with these 3 lines but with no success.&lt;/P&gt;
&lt;P&gt;static (Inside,dmz)&amp;nbsp;172.31.1.0 172.31.1.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;static (dmz,inside) 172.31.2.3 172.31.2.3 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (Outside,dmz) 172.31.2.3 20.20.20.49 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I attached with 2 packet tracer result one from inside int and another from outside int. from the packet tracer result shows that everything seems ok with allowed sign. But really weird&amp;nbsp;when inside host can access remote desktop to the webserver except ping and http. I have bypass icmp and port 80 into the webserver and eventually simulated the webserver into the same inside subnet and found ping as well as http was working well.&amp;nbsp;It show that webserver icmp and port 80 is working fine but not working when I port into DMZ switch.&amp;nbsp;Another thing I found that inside host can ping the DMZ switch 172.31.2.10 itself.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same goes to outside where internet still unable to access port 80 or ping of the webserver.&lt;/P&gt;
&lt;P&gt;Thanks in advance for anyone who trying to assist me resolve this problem. I,ve been digging this issue since few days and my head getting explode&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2017 03:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059822#M134769</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-15T03:44:00Z</dc:date>
    </item>
    <item>
      <title>I am curious if you have</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059823#M134771</link>
      <description>&lt;P&gt;I am curious if you have attempted to access the webserver on port 80 from a host inside the DMZ?&lt;/P&gt;
&lt;P&gt;You can also run this command on DMZ sswitch to make sure that port 80 is accessible:&lt;/P&gt;
&lt;P&gt;telnet 172.31.2.3 80&lt;/P&gt;
&lt;P&gt;- If above tests are successful. Could there be an acl on the DMZ switch that's blocking port 80 to webserver? Also when you initiate the connection from inside to DMZ web server, did you check the firewall logs?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2017 10:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059823#M134771</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-15T10:24:04Z</dc:date>
    </item>
    <item>
      <title>No. I access the webserver</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059824#M134772</link>
      <description>&lt;P&gt;No. I access the webserver from a host inside my internal network 172.31.1.0/24 subnet. my host IP is 172.31.1.3.&lt;/P&gt;
&lt;P&gt;Also I have run the telnet command in the DMZ switch&amp;nbsp;as you suggested and&amp;nbsp; found that port 80 is open. I believe my DMZ switch&amp;nbsp;was configured default setting with no ACL on it. How come that happen?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there any method that I can see the firewall logs during my run test?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 01:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059824#M134772</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-16T01:42:22Z</dc:date>
    </item>
    <item>
      <title>You can try the following at</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059825#M134773</link>
      <description>&lt;P&gt;You can try the following at the firewall:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;sh log | inc 172.31.2.3&lt;/P&gt;
&lt;P&gt;or using source address when you run the test&lt;/P&gt;
&lt;P&gt;sh log | inc 172.31.1.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 02:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059825#M134773</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-16T02:12:57Z</dc:date>
    </item>
    <item>
      <title>But again that doesn't make</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059826#M134774</link>
      <description>&lt;P&gt;But again that doesn't make any sense that inside hosts are able to RDP into the webserver and traffic over port 80 fails.&lt;/P&gt;
&lt;P&gt;Can you run the same packet tracer command for inside hosts and just change the port from 80 to 3389 (RDP) and share the output?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 02:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059826#M134774</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-16T02:32:05Z</dc:date>
    </item>
    <item>
      <title>herewith the result of RDP</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059827#M134775</link>
      <description>&lt;P&gt;herewith the result of RDP&lt;/P&gt;
&lt;P&gt;my internal host attached with cisco catalyst C4507 core switch. however I try to ping the DMZ switch from the core but fails. I think something went wrong with the routing from the core switch to the DMZ switch.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 02:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059827#M134775</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-16T02:50:26Z</dc:date>
    </item>
    <item>
      <title>But didn't you say that hosts</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059828#M134776</link>
      <description>&lt;P&gt;But didn't you say that hosts on the inside network are able to ping and rdp into the webserver. So it can't be a routing issue.&lt;/P&gt;
&lt;P&gt;Is my understanding incorrect?&lt;/P&gt;
&lt;P&gt;Also, did you try checking the logs while attempting to access webserver over port 80 from an inside host?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 03:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059828#M134776</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-16T03:05:12Z</dc:date>
    </item>
    <item>
      <title>Sorry for my bad explanation</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059829#M134777</link>
      <description>&lt;P&gt;Sorry for my bad explanation on this. inside networks are unable to ping the webserver but able to rdp to the webserver.&lt;/P&gt;
&lt;P&gt;here is what I have after run the logs from the firewall&lt;/P&gt;
&lt;P&gt;BktPanchorASA# sh log | inc 172.31.2.3&lt;BR /&gt;BktPanchorASA# sh log | inc 172.31.1.3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logging to Inside 172.31.1.36&lt;BR /&gt;BktPanchorASA# sh log | inc 172.31.1.3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logging to Inside 172.31.1.36&lt;BR /&gt;BktPanchorASA# ping 172.31.2.3&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to WEBSVR, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;BktPanchorASA# ping 172.31.1.3&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.31.1.3, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;BktPanchorASA# sh log | inc 172.31.2.3&lt;BR /&gt;BktPanchorASA# sh log | inc 172.31.1.3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logging to Inside 172.31.1.36&lt;BR /&gt;&amp;nbsp;dynamic UDP translation from Inside:172.31.1.3/57432 to Outside:210.187.71.46/52947 duration 0:00:30&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;** 172.31.1.3 is my dns server.&lt;/P&gt;
&lt;P&gt;-telnet port 80 of websvr passed&lt;/P&gt;
&lt;P&gt;-rdp to webserver passed&lt;/P&gt;
&lt;P&gt;-ping webserver failed&lt;/P&gt;
&lt;P&gt;-ping DMZ switch passed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;** 172.31.1.7 is just a normal host.&lt;/P&gt;
&lt;P&gt;- telnet port 80&amp;nbsp;websvr failed&lt;/P&gt;
&lt;P&gt;- rdp to webserver passed&lt;/P&gt;
&lt;P&gt;- ping webserver&amp;nbsp;failed&lt;/P&gt;
&lt;P&gt;- ping DMZ switch passed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope provided you some clear explanation on my run test.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 03:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059829#M134777</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-16T03:26:40Z</dc:date>
    </item>
    <item>
      <title>another finding my cisco core</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059830#M134778</link>
      <description>&lt;P&gt;another finding my cisco core switch cannot ping the DMZ switch too. its really weird whereby internal host can rdp to websvr but other protocol failed&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 03:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059830#M134778</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-16T03:50:27Z</dc:date>
    </item>
    <item>
      <title>ASA configuration looks fine</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059831#M134779</link>
      <description>&lt;P&gt;ASA configuration looks fine and it should allow http traffic destined for DMZ server sourced from inside network. At this point we haven't found any logs that proves that ASA is blocking this traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please create this access list on the dmz&amp;nbsp;switch for debugging:&lt;/P&gt;
&lt;P&gt;ip access-list extended 100 (I am using access list number 100 just as an example if you already have an existing access list with this number then please choose some other number and then use that number for debugging)&lt;/P&gt;
&lt;P&gt;permit tcp host 172.31.1.3 host 172.31.2.3 eq 80&lt;/P&gt;
&lt;P&gt;permit tcp host 172.31.2.3 host 172.31.1.3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;permit tcp host 172.31.1.3 host 172.31.2.3 eq 3389&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- to debug this access list, go to privileged mode and&amp;nbsp;enter this command:&lt;/P&gt;
&lt;P&gt;debug ip packet 100&lt;/P&gt;
&lt;P&gt;- then initiate traffic from inside host 172.31.1.3 to 172.31.2.3 over port 80. If the traffic is reaching the DMZ switch then you should see hit counters on this access list, then at least we will know that traffic is going through the firewall. At the DMZ switch you can enter "show log" to see debug results and also look at the access list for any hit counters. Initiate traffic to both port 80 and 3389 (rdp) and then compare the results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 16:22:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059831#M134779</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-16T16:22:47Z</dc:date>
    </item>
    <item>
      <title>I run test the access list as</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059832#M134780</link>
      <description>&lt;P&gt;I run test the access list as u suggested and result shows no hit counter at the DMZ switch. I don't think firewall have any issue with it since many forums also mention the same rules.&lt;/P&gt;
&lt;P&gt;I now simulating the issue with replacing the DMZ switch with another one. Not sure what would happen but I think something blocking the packet from the DMZ switch to my core switch through firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 08:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059832#M134780</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-19T08:32:03Z</dc:date>
    </item>
    <item>
      <title>Please run tracert from your</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059833#M134781</link>
      <description>&lt;P&gt;Please&amp;nbsp;run tracert from your machine to webserver and provide results.&lt;/P&gt;
&lt;P&gt;tracert 172.31.2.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you also provide a drawing your network?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2017 10:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059833#M134781</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-19T10:49:16Z</dc:date>
    </item>
    <item>
      <title>my tracert only pass over</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059834#M134782</link>
      <description>&lt;P&gt;my tracert only pass over core switch and the rest are request time out.&lt;/P&gt;
&lt;P&gt;here with my network drawing.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 01:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059834#M134782</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-20T01:54:32Z</dc:date>
    </item>
    <item>
      <title>herewith attached a piece my</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059835#M134783</link>
      <description>&lt;P&gt;herewith attached&amp;nbsp;a piece my DMZ switch config. I not configuring any ip address to the port connected to ASA. just config for L2 and no any VLAN has been assigned. Is that ok ?&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description # connect to WEBSVR&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/23&lt;BR /&gt;&amp;nbsp;description # trunk to ASA&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport nonegotiate&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 172.31.2.10 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 172.31.2.1&lt;BR /&gt;no ip classless&lt;BR /&gt;ip http server&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 07:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059835#M134783</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-20T07:35:54Z</dc:date>
    </item>
    <item>
      <title>Technically it should work</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059836#M134784</link>
      <description>&lt;P&gt;Technically it should work the way you have it configured. But it may not be the best design, you are using default vlan 1 for server access port and usually that should be avoided.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 14:35:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059836#M134784</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-20T14:35:26Z</dc:date>
    </item>
    <item>
      <title>my ASA configured with no nat</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059837#M134785</link>
      <description>&lt;P&gt;my ASA configured with no nat control. is there something that I should care about?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 03:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059837#M134785</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-06-21T03:55:31Z</dc:date>
    </item>
    <item>
      <title>"no nat control" should not</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059838#M134786</link>
      <description>&lt;P&gt;"no nat control" should not affect anything since you have nat commands present in your configuration and that supersedes disabling nat control. If NAT was completely disabled your inside users wouldn't have able to access internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please read this thread for better understanding:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/11018091/disabling-nat-control-live-firewall&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/11936941/lets-briefly-talk-about-what-nat-control&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 09:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059838#M134786</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2017-06-21T09:25:01Z</dc:date>
    </item>
    <item>
      <title>Hi coffee,</title>
      <link>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059839#M134787</link>
      <description>&lt;P&gt;Hi coffee,&lt;/P&gt;
&lt;P&gt;thanks a lot for your helps. really appreciate for the assiatance. finally I found the root cause of my problems. there were&amp;nbsp;4 workarounds I had done to overcome my case.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. below static net will just do the tricks to allow traffic from inside to dmz.&lt;/P&gt;
&lt;P&gt;static (Inside,dmz)&amp;nbsp;172.31.1.0 172.31.1.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;2. below is to allow outside to access our web server in DMZ.&lt;/P&gt;
&lt;P&gt;static (DMZ,Outside) WEBSVR-P WEBSVR netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;3. enable svi on my L3 C3750 to enable my DMZ-SW route traffic to my&amp;nbsp;ASA 5510 and vice versa.&lt;/P&gt;
&lt;P&gt;vlan 2&lt;BR /&gt;&amp;nbsp;name DMZ&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/1&lt;BR /&gt;&amp;nbsp;description # connect to WEBSVR&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;interface FastEthernet1/0/24&lt;BR /&gt;&amp;nbsp;description #connect to ASA&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;ip address 172.31.2.10 255.255.255.0&lt;BR /&gt;&amp;nbsp;no ip proxy-arp&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;/P&gt;
&lt;P&gt;ip default-gateway 172.31.2.1&lt;BR /&gt;ip classless&lt;BR /&gt;ip http server&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;4. And this last one really explode my head since I had done many testing to eliminate any irrelevant that cause why inside cannot ping or access web server.&lt;/P&gt;
&lt;P&gt;Originally my web server was just a notebook (fujitsu) for testing purposes. Then I changed that notebook and replace with mine notebook. All ping echo, request reply were remain unchanged in the inbound traffic firewall as usual. As a result, my ping and traffic finally went through the web server. I really surprise with changing notebook then traffic suddenly allowed. I had no idea what fujitsu had done into that notebook even I had manually bypass the echo, request and reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I consider this issue can be closed since it took me&amp;nbsp;few weeks&amp;nbsp;to overcome this.&lt;/P&gt;
&lt;P&gt;Thanks coffee you are really good problem solver in this discussion and put me into many ways of tracing the root cause. really appreciate that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;cheers&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2017 05:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem-from-inside-to-dmz-and-outside-to-dmz/m-p/3059839#M134787</guid>
      <dc:creator>El Rondo</dc:creator>
      <dc:date>2017-07-04T05:43:30Z</dc:date>
    </item>
  </channel>
</rss>

