<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885289#M154119</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Based on your configuration the acl applied on the Comcast interface will allow only RDP to specific hosts from the outside. You should check the Comcast_access_in all and permit traffic for Skype server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have mentioned that you have dual ISP and one ISP act as backup for the other, so you should add nat for backup ISP as well or else servers won't be accessible if one of the ISP is down.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;
&lt;P&gt;Rate if this helps in resolving your query.&lt;/P&gt;</description>
    <pubDate>Fri, 06 May 2016 20:59:11 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2016-05-06T20:59:11Z</dc:date>
    <item>
      <title>Help with DMZ Interface</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885288#M154118</link>
      <description>&lt;P&gt;I am fairly new to the ASA world. I ran out options, and turning to experts here for help. I have an ASA 5506-X with 4 interfaces. ASA is running OS 9.4(2) and I am using ASDM to configure everything. ASDM is version 7.6&lt;/P&gt;
&lt;P&gt;Interface 1: Outside Network 1 Verizon&lt;/P&gt;
&lt;P&gt;Interface 2: Inside Network&lt;/P&gt;
&lt;P&gt;Interface 3: Outside Network Comcast&lt;/P&gt;
&lt;P&gt;Interface 4: DMZ 192.168.1.0/24&lt;/P&gt;
&lt;P&gt;There are two outside networks, in case one goes down, it fails over to the second one.&lt;/P&gt;
&lt;P&gt;Aside from these interfaces, ASA is also used for VPN connectivity.&lt;/P&gt;
&lt;P&gt;My Problem: I have an Skype for Business Edge Server that I would like people to access from outside. The server is connected to the DMZ and has 3 Private IPs Nated to Public IPs. I have created the NAT rules and the server is connected to the internet (meaning i can go on the server and surf the web). I can't for some reason ping the server or connect to it from outside using any of the 3 public IPs. I have opened the necessary ports using ACL, but still no luck. Any idea on how I could get this up and running? I really appreciate any help with this. Like I said, I have researched this a lot and I couldn't find any solutions. I apologize if this question has already been asked.&lt;/P&gt;
&lt;P&gt;Config&amp;nbsp;attached&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885288#M154118</guid>
      <dc:creator>dougken444</dc:creator>
      <dc:date>2019-03-12T07:43:15Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885289#M154119</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Based on your configuration the acl applied on the Comcast interface will allow only RDP to specific hosts from the outside. You should check the Comcast_access_in all and permit traffic for Skype server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have mentioned that you have dual ISP and one ISP act as backup for the other, so you should add nat for backup ISP as well or else servers won't be accessible if one of the ISP is down.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;
&lt;P&gt;Rate if this helps in resolving your query.&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 20:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885289#M154119</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-05-06T20:59:11Z</dc:date>
    </item>
    <item>
      <title>As far as I know, access from</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885290#M154120</link>
      <description>&lt;P&gt;As far as I know, access from lower security level interface(outside) to higher interface(inside) is denied by default unless ACL explicitly permission is defined.&lt;/P&gt;
&lt;P&gt;You need to configure ACLs to permit any service which DMZ server would provide, including ICMP message to troubleshooting.&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 05:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885290#M154120</guid>
      <dc:creator>David_Che</dc:creator>
      <dc:date>2016-05-09T05:00:35Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh, </title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885291#M154121</link>
      <description>&lt;P&gt;Hi Rishabh,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried adding the DMZ_subnet network object to the Comcast_access_in acl and allowed any traffic. it still didn't work. The Comcast interface that is setup only includes one of the IP addresses I have. How do I add the other 4 IP addresses to the interface?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 16:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885291#M154121</guid>
      <dc:creator>dougken444</dc:creator>
      <dc:date>2016-05-09T16:00:10Z</dc:date>
    </item>
    <item>
      <title>Hi Doug,</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885292#M154122</link>
      <description>&lt;P&gt;Hi Doug,&lt;/P&gt;
&lt;P&gt;You can create nat rules using different public IP addresses. ASA allows only one up address on an interface. So you can identify the type of nat(static/dynamic) that is required for your network and configure it with public IP addresses.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope this will help you in right direction, in case my understanding of you requirement is wrong then feel free to correct me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;
&lt;P&gt;Rate if the post helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 17:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885292#M154122</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-05-09T17:03:42Z</dc:date>
    </item>
    <item>
      <title>I did create static NATs</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885293#M154123</link>
      <description>&lt;P&gt;I did create static NATs where I nated the private IPs to public IPs. For example, I created a network object called DMZ-Edge-Access-INT that has a private IP of 192.168.x.x then I nated that to another network object called DMZ-Edge-Access-EXT that has a public IP address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the configuration was created this way:&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ASA-5506-ASA(config)# &lt;SPAN class="ASA_RED"&gt;object network DMZ-Edge-Access-INT&lt;/SPAN&gt;
&lt;SPAN&gt;ASA-5506-ASA&lt;/SPAN&gt;(config-network-object)# &lt;SPAN class="ASA_RED"&gt;host 192.168.x.x&lt;/SPAN&gt;
P&lt;SPAN&gt;ASA-5506-ASA&lt;/SPAN&gt;(config-network-object)# &lt;SPAN class="ASA_RED"&gt;nat (DMZ,COMCAST) static DMZ-Edge-Access-EXT&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN class="ASA_RED"&gt;So in the ACL list should I create a rule like the one below?&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ASA-5506-ASA(config)# &lt;SPAN class="ASA_RED"&gt;access-list COMCAST_access_in extended permit tcp any object DMZ-Edge-Access-EXT eq https&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 09 May 2016 17:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885293#M154123</guid>
      <dc:creator>dougken444</dc:creator>
      <dc:date>2016-05-09T17:18:22Z</dc:date>
    </item>
    <item>
      <title>Hi Doug,</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885294#M154124</link>
      <description>&lt;P&gt;Hi Doug,&lt;/P&gt;
&lt;P&gt;Ensure that you are using real IP in the acl as the nat translation will happen before acl evaluation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P dir="ltr"&gt;RS&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 17:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885294#M154124</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-05-09T17:32:18Z</dc:date>
    </item>
    <item>
      <title>Thank you very much for your</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885295#M154125</link>
      <description>&lt;P&gt;Thank you very much for your prompt response. Should I create the same rules on the DMZ interface acl, or the comcast one will suffice?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 17:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885295#M154125</guid>
      <dc:creator>dougken444</dc:creator>
      <dc:date>2016-05-09T17:38:05Z</dc:date>
    </item>
    <item>
      <title>Hi Doug,</title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885296#M154126</link>
      <description>&lt;P&gt;Hi Doug,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ACLs are evaluated only once while creation of the connection. So while creating acls keep in mind the direction in which they are applied and evaluate packet flow based on the direction of traffic from source to destination and create appropriate acls to allow traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example; assume there are two interfaces Inside and Outside. There is an acl acess_in on inside interface in IN direction and there is a acess_out acl on outside interface in OUT direction. If traffic from in to out needs to be allowed then access_in and acess_out both should allow traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So basically evaluate how your ASA is configured and accordingly allow traffic. You can also use packet tracer utility to check the cause of drop and rectify configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 18:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885296#M154126</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-05-09T18:16:14Z</dc:date>
    </item>
    <item>
      <title>Thanks for your help sir! </title>
      <link>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885297#M154127</link>
      <description>&lt;P&gt;Thanks for your help sir!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 14:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-dmz-interface/m-p/2885297#M154127</guid>
      <dc:creator>dougken444</dc:creator>
      <dc:date>2016-05-13T14:28:24Z</dc:date>
    </item>
  </channel>
</rss>

