<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Aditya in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862942#M155147</link>
    <description>&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There is route, because in the ASA have a interface in each network&lt;/P&gt;
&lt;P&gt;Follow the configuration as you request.&lt;/P&gt;
&lt;P&gt;Thanks for your support&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2016 18:14:56 GMT</pubDate>
    <dc:creator>marcio.tormente</dc:creator>
    <dc:date>2016-04-01T18:14:56Z</dc:date>
    <item>
      <title>DMZ on ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862934#M155139</link>
      <description>&lt;P&gt;Hello Folks!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is my first time that I´m configurin DMZ on ASA. I create a interface with security level 50, my outside is 0 and inside 100, All intefaces with diferent IP range.&lt;/P&gt;
&lt;P&gt;Based on security level the inside should be able to talk to dmz, but is not working, I include some rules to allow the traffic from one to another, even any any and machine from inside can´t talk to dmz.&lt;/P&gt;
&lt;P&gt;When I use packetracer on ASDM to see where is the traffic is stopping, he say that is in the ACL. How is possible if there is a rule to allow any any in all interface?&lt;/P&gt;
&lt;P&gt;Other probleme, I create a NAT the same as the inside to dmz range, but when I include the IP in the same range that dmz interface in my machine, change the vlan in the switch, I can´t access the internet.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I saw may sites about DMZ, but the almost all of then is old and talk about 5505, some command is different, I know that DMZ don´t have to access everything from inside, but first I just want make sure that the comunication is working, after that make filter.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:34:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862934#M155139</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2019-03-12T07:34:06Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862935#M155140</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ASA 5505 minimum license is DMZ restricted, meaning that you are only able to forward traffic to this zone from 1 other zone, could be outside for example. Please check if you maybe have this license restriction ('sh ver').&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regarding the other issue, you could try posting the configuration commands.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 14:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862935#M155140</guid>
      <dc:creator>Thomas Bille Joergensen</dc:creator>
      <dc:date>2016-04-01T14:14:27Z</dc:date>
    </item>
    <item>
      <title>Hello Thomas!</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862936#M155141</link>
      <description>&lt;P&gt;Hello Thomas!&lt;/P&gt;
&lt;P&gt;My ASA is 5506, I don´t know if there is the same restriction, follow the sh ver:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;likasa# sh ver&lt;/P&gt;
&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.4(1)&lt;BR /&gt;Device Manager Version 7.4(3)&lt;/P&gt;
&lt;P&gt;Compiled on Sat 21-Mar-15 11:42 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa941-lfbff-k8.SPA"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;
&lt;P&gt;likasa up 2 days 18 hours&lt;/P&gt;
&lt;P&gt;Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;BR /&gt;BIOS Flash unknown @ 0x0, 0KB&lt;/P&gt;
&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt; Number of accelerators: 1&lt;/P&gt;
&lt;P&gt;1: Ext: GigabitEthernet1/1 : address is e865.49e3.f1e4, irq 255&lt;BR /&gt; 2: Ext: GigabitEthernet1/2 : address is e865.49e3.f1e5, irq 255&lt;BR /&gt; 3: Ext: GigabitEthernet1/3 : address is e865.49e3.f1e6, irq 255&lt;BR /&gt; 4: Ext: GigabitEthernet1/4 : address is e865.49e3.f1e7, irq 255&lt;BR /&gt; 5: Ext: GigabitEthernet1/5 : address is e865.49e3.f1e8, irq 255&lt;BR /&gt; 6: Ext: GigabitEthernet1/6 : address is e865.49e3.f1e9, irq 255&lt;BR /&gt; 7: Ext: GigabitEthernet1/7 : address is e865.49e3.f1ea, irq 255&lt;BR /&gt; 8: Ext: GigabitEthernet1/8 : address is e865.49e3.f1eb, irq 255&lt;BR /&gt; 9: Int: Internal-Data1/1 : address is e865.49e3.f1e3, irq 255&lt;BR /&gt;10: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 0&lt;BR /&gt;11: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 0&lt;BR /&gt;12: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 0&lt;BR /&gt;13: Ext: Management1/1 : address is e865.49e3.f1e3, irq 0&lt;/P&gt;
&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 5 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Disabled perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;GTP/GPRS : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 10 perpetual&lt;BR /&gt;Total VPN Peers : 12 perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;AnyConnect for Mobile : Disabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Disabled perpetual&lt;BR /&gt;Total UC Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;Cluster : Disabled perpetual&lt;/P&gt;
&lt;P&gt;This platform has a Base license.&lt;/P&gt;
&lt;P&gt;Serial Number: JAD1922018J&lt;BR /&gt;Running Permanent Activation Key: 0x280cc85d 0x442fef6c 0xe0310dac 0x9e64c824 0xc0230ea8&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Image type : Release&lt;BR /&gt;Key Version : A&lt;BR /&gt;Configuration last modified by administrator at 17:05:36.257 UTC Thu Mar 31 2016&lt;BR /&gt;likasa#&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 14:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862936#M155141</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-01T14:21:16Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862937#M155142</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you share the packet-tracer output of the concerned traffic ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where did you allow the traffic ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are you using any NAT for the traffic ? From inside to DMZ you do not need any rules to permit the traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_242 gr-alert gr_gramm gr_run_anim Punctuation multiReplace" id="242" data-gr-id="242"&gt;Also&lt;/G&gt; what traffic are you testing, is it &lt;G class="gr_ gr_238 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="238" data-gr-id="238"&gt;icmp&lt;/G&gt; ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If yes you can use fixup protocol &lt;G class="gr_ gr_262 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="262" data-gr-id="262"&gt;icmp&lt;/G&gt;.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 14:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862937#M155142</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-01T14:24:38Z</dc:date>
    </item>
    <item>
      <title>Hello Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862938#M155143</link>
      <description>&lt;P&gt;Hello Aditya,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow attached the packet tracer.&lt;/P&gt;
&lt;P&gt;I allow the traffic in all interface just to make sure that the problem is not rules.&lt;/P&gt;
&lt;P&gt;I´m using NAT as the same I did with inside network (Dynamic NAT - DMZ to Outside)&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 14:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862938#M155143</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-01T14:55:02Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862939#M155144</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you share the NAT statement ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I do not see NAT statement hit on the packet tracer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You told that traffic is not working from DMZ to &lt;G class="gr_ gr_132 gr-alert gr_gramm gr_run_anim Grammar only-ins replaceWithoutSep" id="132" data-gr-id="132"&gt;inside&lt;/G&gt; but the packet tracer shows traffic for outside.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you let me know that what are we trying to access from DMZ ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 15:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862939#M155144</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-01T15:14:09Z</dc:date>
    </item>
    <item>
      <title>Hi Aditya</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862940#M155145</link>
      <description>&lt;P&gt;Hi Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In fact you was talk to my in other case that thare is relation with this one, I split to do step by step.&lt;/P&gt;
&lt;P&gt;The other case is (Ididn´t understand yet):&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/12948051/port-map-nat&lt;/P&gt;
&lt;P&gt;Yes, I have both problem, DMZ to internet is not working and from insit to DMZ as well, follow the new tracer and my topology to this service that I´m traying to solve.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NAT&lt;/P&gt;
&lt;P&gt;object network Rede_DMZ&lt;BR /&gt; subnet 192.168.17.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object network Rede_DMZ&lt;BR /&gt; nat (any,outside1) dynamic interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 15:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862940#M155145</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-01T15:31:11Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862941#M155146</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In the packet &lt;G class="gr_ gr_57 gr-alert gr_gramm gr_run_anim Punctuation only-ins replaceWithoutSep" id="57" data-gr-id="57"&gt;tracer&lt;/G&gt; I see no route to host.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you share the show run of the ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 17:53:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862941#M155146</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-01T17:53:58Z</dc:date>
    </item>
    <item>
      <title>Aditya</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862942#M155147</link>
      <description>&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There is route, because in the ASA have a interface in each network&lt;/P&gt;
&lt;P&gt;Follow the configuration as you request.&lt;/P&gt;
&lt;P&gt;Thanks for your support&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 18:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862942#M155147</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-01T18:14:56Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862943#M155148</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you try using this NAT statement and check ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (dmz,outside1) 1 source dynamic&amp;nbsp;&lt;SPAN&gt;Rede_DMZ interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After using this NAT please share the packet tracer output:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input &lt;G class="gr_ gr_198 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="198" data-gr-id="198"&gt;dmz&lt;/G&gt; &lt;G class="gr_ gr_199 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="199" data-gr-id="199"&gt;icmp&lt;/G&gt; 192.168.17.5 8 0 8.8.8.8 &lt;G class="gr_ gr_200 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="200" data-gr-id="200"&gt;det&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2016 03:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862943#M155148</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-02T03:23:25Z</dc:date>
    </item>
    <item>
      <title>First off I would suggest</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862944#M155149</link>
      <description>&lt;P&gt;First off I would suggest trying a packet tracer using TCP instead of IP:&lt;/P&gt;
&lt;P&gt;packet-tracer input inside tcp 192.168.13.100 12345 192.168.17.100 80 detail&lt;/P&gt;
&lt;P&gt;You have two outside interfaces configured (outside and outside1) &amp;nbsp;What is the difference between these two? I mean what is outside used for and what is outside1 used for.&lt;/P&gt;
&lt;P&gt;Your topology map shows only outside as being used in this scenario but in your configuration your dynamic NAT statement&amp;nbsp;for DMZ is only for outside1.&lt;/P&gt;
&lt;P&gt;Also, you have a lot of incorrect configuration in your ACLs, or should I say configuration that is not needed. The only time you would add an explicity deny any any on an ACL is if you want to log the traffic. &amp;nbsp;But none of your statements have the log keyword defined:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list outside1_access_in extended permit ip 192.168.17.0 255.255.255.0 any 
&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-list DMZ_access_in extended permit ip 192.168.17.0 255.255.255.0 any 
&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-list DMZ_access_in extended permit ip 192.168.17.0 255.255.255.0 any 
&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-list DMZ_access_in extended permit ip 192.168.17.0 255.255.255.0 any 
&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-list outside_access_in extended deny ip any any&lt;/PRE&gt;
&lt;P&gt;Also, open up the Real Time log viewer in ASDM and then monitor it while trying to access the DMZ from the inside network. &amp;nbsp;It might indicate what is stopping the traffic.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2016 07:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862944#M155149</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-04-02T07:52:10Z</dc:date>
    </item>
    <item>
      <title>I see, it does not look as if</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862945#M155150</link>
      <description>&lt;P&gt;I see,&amp;nbsp;it does not look as if you have this restriction.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2016 09:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862945#M155150</guid>
      <dc:creator>Thomas Bille Joergensen</dc:creator>
      <dc:date>2016-04-02T09:09:23Z</dc:date>
    </item>
    <item>
      <title>Hello Marius!</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862946#M155151</link>
      <description>&lt;P&gt;Hello Marius!&lt;/P&gt;
&lt;P&gt;Frst, thanks for your support.&lt;/P&gt;
&lt;P&gt;Yes, I have 02 interfaces to internet, one (outside1) is the primary that I have public IP (only one), this is the main link, the other (outside) is ADLS, I only use this link in case the first is not working because the low speed.&lt;/P&gt;
&lt;P&gt;All this rule, I include recently just to make sure that the problema is not rule.&lt;/P&gt;
&lt;P&gt;I'll make all the tests that you you request soon, I'll be out of the office for 3 days for&amp;nbsp;&lt;SPAN&gt;health problem, when I can back I'll let you know the result.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2016 02:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862946#M155151</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-04T02:21:21Z</dc:date>
    </item>
    <item>
      <title>Hello Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862947#M155152</link>
      <description>&lt;P&gt;Hello Aditya,&lt;/P&gt;
&lt;P&gt;Thanks for your support.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'll make all the tests that you you request soon, I'll be out of the office for 3 days for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;health problem, when I can back I'll let you know the result.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Marcio&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2016 02:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862947#M155152</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-04T02:23:15Z</dc:date>
    </item>
    <item>
      <title>Hello Aditya!</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862948#M155153</link>
      <description>&lt;P&gt;Hello Aditya!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow attached the packet tracer as you request after aply NAT command.&lt;/P&gt;
&lt;P&gt;Only with this NAT is enought to solve my problem about expressway Server or is just to acesse the internet?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 18:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862948#M155153</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-06T18:00:19Z</dc:date>
    </item>
    <item>
      <title>Hello Marius!</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862949#M155154</link>
      <description>&lt;P&gt;Hello Marius!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow attached the packet tracert as you request.&lt;/P&gt;
&lt;P&gt;I collected this command after apply the command:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (dmz,outside1) 1 source dynamic&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Rede_DMZ interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This command was suggest by Adytia above.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 18:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862949#M155154</guid>
      <dc:creator>marcio.tormente</dc:creator>
      <dc:date>2016-04-06T18:04:14Z</dc:date>
    </item>
    <item>
      <title>Hi Marcio,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862950#M155155</link>
      <description>&lt;P&gt;Hi Marcio,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This NAT is just for the internet access.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For the &lt;G class="gr_ gr_93 gr-alert gr_gramm gr_run_anim Punctuation only-ins replaceWithoutSep" id="93" data-gr-id="93"&gt;expressway&lt;/G&gt; you can use the other static NAT that I suggested.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Glad that the internet is working now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 18:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-on-asa-5506/m-p/2862950#M155155</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-04-06T18:06:27Z</dc:date>
    </item>
  </channel>
</rss>

