<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947335#M149619</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you enable "&lt;STRONG&gt;fixup protocol &lt;/STRONG&gt;&lt;G class="gr_ gr_11 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="11" data-gr-id="11"&gt;icmp&lt;/G&gt;"&amp;nbsp;command and then test this ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
    <pubDate>Thu, 29 Sep 2016 01:20:33 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-09-29T01:20:33Z</dc:date>
    <item>
      <title>Not able to reach DMZ host from inside hosts</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947334#M149618</link>
      <description>&lt;P&gt;Hi I am new to ASA configuration. I wanted to configure a web server on a DMZ. I have followed Cisco configuration guide to set this up. The DMZ is stable and has internet access. Also the inside hosts have internet access. But I am not able to ping the DMZ host from my inside host also I am not able to ping the inside host from the ASA. Surprisingly the inside host is able to reach the internet. My inside host as an IP of 192.168.5.4 and the web server on DMZ has an IP of 192.168.10.11.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My Config is is attached to this discussion.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also I have run the packet tracer and it says the re is no drop and all flows are allowed:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help is greatly appreciated. I want to make sure that the inside hosts are in communication with the DMZ host and vice-versa&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947334#M149618</guid>
      <dc:creator>rao.anirudhk</dc:creator>
      <dc:date>2019-03-12T08:20:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947335#M149619</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you enable "&lt;STRONG&gt;fixup protocol &lt;/STRONG&gt;&lt;G class="gr_ gr_11 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="11" data-gr-id="11"&gt;icmp&lt;/G&gt;"&amp;nbsp;command and then test this ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2016 01:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947335#M149619</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-09-29T01:20:33Z</dc:date>
    </item>
    <item>
      <title>I am also experiencing</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947336#M149620</link>
      <description>&lt;P&gt;I am also experiencing similar issue with my host from the inside interface of the ASA unable to communicate with a host i setup in the DMZ interface. From the Outside interface i am able to reach the host in the DMZ interface however from the inside interface i am having problems.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also ran packet tracer and it had no drops and allowed both my access-list rule and my NAT entry.&lt;/P&gt;
&lt;P&gt;@Aditya : i will try the "fixup protocol icmp" command you suggested.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2016 20:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947336#M149620</guid>
      <dc:creator>dapo dimeji</dc:creator>
      <dc:date>2016-09-29T20:33:07Z</dc:date>
    </item>
    <item>
      <title>Thanks Aditya, that solved</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947337#M149621</link>
      <description>&lt;P style="text-align: center;"&gt;Thanks Aditya, that solved the problem. Just as a note also my Windows machine firewall was blocking the pings, not sure why.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Really appreciate your help,&lt;/P&gt;
&lt;P&gt;cheers&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2016 20:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947337#M149621</guid>
      <dc:creator>rao.anirudhk</dc:creator>
      <dc:date>2016-09-29T20:38:11Z</dc:date>
    </item>
    <item>
      <title>Hi Dapo,

Sure thing.</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947338#M149622</link>
      <description>&lt;P&gt;Hi Dapo,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sure thing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2016 01:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947338#M149622</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-09-30T01:35:11Z</dc:date>
    </item>
    <item>
      <title>I have ran into another</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947339#M149623</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I have ran into another problem, the inside host is able to reach the DMZ but the DMZ is not able to reach the inside host. This is my config :&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.5.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 162.17.40.167 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 68.87.77.130&lt;BR /&gt; name-server 68.87.72.130&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group network inside-subnet&lt;BR /&gt;object-group network inside_subnet&lt;BR /&gt; network-object 192.168.5.0 255.255.255.0&lt;BR /&gt; network-object 192.168.4.0 255.255.255.0&lt;BR /&gt;object-group network dmz-subnet&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt;object-group network webserver&lt;BR /&gt; network-object host 162.17.40.167&lt;BR /&gt;object-group network webserver-internal&lt;BR /&gt; network-object host 192.168.10.10&lt;BR /&gt;access-list outside_acl extended permit tcp any host 192.168.10.10 eq www&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list dmz_acl extended permit udp any eq domain any&lt;BR /&gt;access-list dmz_acl extended permit udp any host 68.87.72.130 eq domain&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.5.4 eq www&lt;BR /&gt;access-list dmz_acl extended permit icmp any any&lt;BR /&gt;access-list dmz_acl extended permit tcp host 192.168.10.11 host 192.168.5.4 eq domain&lt;BR /&gt;access-list dmz_acl extended permit udp host 192.168.10.11 host 192.168.5.4 eq 88&lt;BR /&gt;access-list dmz_acl extended permit udp host 192.168.10.11 host 192.168.5.4 eq 389&lt;BR /&gt;access-list dmz_acl extended permit tcp host 192.168.10.11 host 192.168.5.4 eq www&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.5.0 eq www&lt;BR /&gt;access-list dmz_acl extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.10.0 eq www&lt;BR /&gt;access-list services extended permit tcp any host 162.17.40.167 eq www&lt;BR /&gt;access-list dmz-in extended permit ip any any&lt;BR /&gt;access-list dmz-in extended permit icmp any any&lt;BR /&gt;access-list inside extended permit ip any any&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq www&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq echo&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq smtp&lt;BR /&gt;access-list nonat extended permit ip 192.168.5.0 255.255.255.0 host 192.168.10.11&lt;BR /&gt;access-list dmz_nat0 extended permit ip any 192.164.5.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-613.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;BR /&gt;nat (dmz) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;static (dmz,outside) tcp 162.17.40.174 www 192.168.10.11 www netmask 255.255.255.255&lt;BR /&gt;static (inside,dmz) tcp 192.168.5.0 www 192.168.10.11 www netmask 255.255.255.255&lt;BR /&gt;static (inside,dmz) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-group services in interface outside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 162.17.40.174 1&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 192.168.10.0 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;vpn-addr-assign local reuse-delay 5&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 60&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username pridevel password BG8S.aktpfGXJmz4 encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map class_http&lt;BR /&gt; match port tcp eq 8080&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect icmp&lt;BR /&gt; class class_http&lt;BR /&gt; inspect http&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:e515cdfe5f34a9a5c8331d8aec89491c&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;And If I try using packet-tracer I get a deny on access-list. This is the output from the packet tracer&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# packet-tracer input dmz tcp 192.168.10.11 12345 192.168.5.4 $&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xc64d5650, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=2, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt; match ip inside 192.168.5.0 255.255.255.0 dmz any&lt;BR /&gt; static translation to 192.168.5.0&lt;BR /&gt; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 192.168.5.0/0 to 192.168.5.0/0 using netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: no-forward-rule&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xc64e0ea8, priority=500, domain=no forward CLI, deny=true&lt;BR /&gt; hits=0, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am simply not able to solve why the trafiic is being denied from DMZ to the inside host.&lt;/P&gt;
&lt;P&gt;Can you please help me out&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2016 21:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947339#M149623</guid>
      <dc:creator>rao.anirudhk</dc:creator>
      <dc:date>2016-10-04T21:32:12Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947340#M149624</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Under the interface config of DMZ:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no forward interface Vlan1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You have no forward interface configured, please remove the same and you should be good.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 01:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947340#M149624</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-10-05T01:13:04Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947341#M149625</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Under the interface config of DMZ:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no forward interface Vlan1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You have no forward interface configured, please remove the same using the no form of the command and you should be good.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please rate helpful posts and mark correct answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 01:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947341#M149625</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-10-05T01:13:58Z</dc:date>
    </item>
    <item>
      <title>That worked!!</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947342#M149626</link>
      <description>&lt;P&gt;That worked!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks Aditya, you're awesome!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 15:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947342#M149626</guid>
      <dc:creator>rao.anirudhk</dc:creator>
      <dc:date>2016-10-05T15:42:37Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947343#M149627</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi Aditya,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Thank you so much for helping me out, Really solved a lot of problems for me. So I went ahead and created a web dispatcher on my DMZ machine, but it is not accessible from the outside or the internet. This is the last step. This is my config:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password QEYqExl1M5.wvO.b encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.5.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 162.17.40.167 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 68.87.77.130&lt;BR /&gt; name-server 68.87.72.130&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group network inside-subnet&lt;BR /&gt;object-group network inside_subnet&lt;BR /&gt; network-object 192.168.5.0 255.255.255.0&lt;BR /&gt; network-object 192.168.4.0 255.255.255.0&lt;BR /&gt;object-group network dmz-subnet&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt;object-group network webserver&lt;BR /&gt; network-object host 162.17.40.167&lt;BR /&gt;object-group network webserver-internal&lt;BR /&gt; network-object host 192.168.10.10&lt;BR /&gt;access-list outside_acl extended permit tcp any host 192.168.10.10 eq www&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list dmz_acl extended permit udp any eq domain any&lt;BR /&gt;access-list dmz_acl extended permit udp any host 68.87.72.130 eq domain&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.5.4 eq www&lt;BR /&gt;access-list dmz_acl extended permit icmp any any&lt;BR /&gt;access-list dmz_acl extended permit tcp host 192.168.10.11 host 192.168.5.4 eq domain&lt;BR /&gt;access-list dmz_acl extended permit udp host 192.168.10.11 host 192.168.5.4 eq 88&lt;BR /&gt;access-list dmz_acl extended permit udp host 192.168.10.11 host 192.168.5.4 eq 389&lt;BR /&gt;access-list dmz_acl extended permit tcp host 192.168.10.11 host 192.168.5.4 eq www&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.5.0 eq www&lt;BR /&gt;access-list dmz_acl extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list dmz_acl extended permit tcp any host 192.168.10.0 eq www&lt;BR /&gt;access-list dmz_acl extended permit tcp host 192.168.10.11 host 192.168.5.0 eq 1433&lt;BR /&gt;access-list dmz_acl extended permit udp any host 162.17.40.167 eq www&lt;BR /&gt;access-list dmz_acl extended permit udp any host 162.17.40.167 eq 8000&lt;BR /&gt;access-list services extended permit tcp any host 162.17.40.167 eq www&lt;BR /&gt;access-list services extended permit tcp any host 162.17.40.167 eq 8000&lt;BR /&gt;access-list services extended permit tcp any host 162.17.40.167 eq 8080&lt;BR /&gt;access-list services extended permit tcp any host 192.168.10.11 eq www&lt;BR /&gt;access-list services extended permit tcp any host 192.168.10.11 eq 8000&lt;BR /&gt;access-list dmz-in extended permit ip any any&lt;BR /&gt;access-list dmz-in extended permit icmp any any&lt;BR /&gt;access-list inside extended permit ip any any&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq www&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq echo&lt;BR /&gt;access-list inside extended permit tcp host 192.168.10.11 any eq smtp&lt;BR /&gt;access-list nonat extended permit ip 192.168.5.0 255.255.255.0 host 192.168.10.11&lt;BR /&gt;access-list dmz_nat0 extended permit ip any 192.164.5.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-613.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;BR /&gt;nat (dmz) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;static (dmz,outside) tcp 162.17.40.174 www 192.168.10.11 www netmask 255.255.255.255&lt;BR /&gt;static (inside,dmz) tcp 192.168.5.0 www 192.168.10.11 www netmask 255.255.255.255&lt;BR /&gt;static (inside,dmz) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;BR /&gt;static (inside,dmz) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-group services in interface outside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 162.17.40.174 1&lt;BR /&gt;route inside 192.168.5.0 255.255.255.0 192.168.10.0 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;vpn-addr-assign local reuse-delay 5&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 60&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username pridevel password BG8S.aktpfGXJmz4 encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map class_http&lt;BR /&gt; match port tcp eq 8080&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect icmp&lt;BR /&gt; class class_http&lt;BR /&gt; inspect http&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:f08ff564ee451d15fd1e3bcafb119602&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;And when I run packet-tracer on the outside interface, I keep getting packet dropped due to a configured rule. This is the output.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input outside tcp 162.17.40.174 12345 162.17.40.167 80$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 162.17.40.167 255.255.255.255 identity&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can you please help me out with this. I really&amp;nbsp;appreciate&amp;nbsp;your help.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Thank you&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 17:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/not-able-to-reach-dmz-host-from-inside-hosts/m-p/2947343#M149627</guid>
      <dc:creator>rao.anirudhk</dc:creator>
      <dc:date>2016-10-06T17:29:18Z</dc:date>
    </item>
  </channel>
</rss>

