<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic As Samer has said, the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837120#M172572</link>
    <description>&lt;P&gt;As Samer has said, the default behavior is to drop packets that the ASA expects to see on another interface other than the ingress interface. &amp;nbsp;so since the ASA expects to see packets for the public IP of the server on the outside interface, all other packets entering other interfaces will be dropped....by default.&lt;/P&gt;
&lt;P&gt;There are ways to get around this. &amp;nbsp;You can do hairpinning on the inside interface so that traffic going to the public IP of the server will be translated to the private IP of the server and sendt back out the inside interface (please forgive me but I can not be bothered to scroll up and find exact IPs, so I will use my own made up IPs for this example). &amp;nbsp;For example:&lt;/P&gt;
&lt;P&gt;object network SERVER-PRIVATE&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.1.10&lt;/P&gt;
&lt;P&gt;object network SERVER-PUBLIC&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 62.192.76.80&lt;/P&gt;
&lt;P&gt;object network INSIDE-LAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp; subnet 172.16.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (inside,inside) source static INSIDE-LAN INSIDE-LAN destination static SERVER-PUBLIC SERVER-PRIVATE&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Wed, 24 Feb 2016 07:04:04 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-24T07:04:04Z</dc:date>
    <item>
      <title>DMZ host is not accessible from outside/internet</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837107#M172549</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I cannot access my trend micro mobile device manager from outside&amp;nbsp;using this link to download the mdm agent.&lt;/P&gt;
&lt;P&gt;http://outside_interface_public_ip:8080/mobile&lt;/P&gt;
&lt;P&gt;https://outside_interface_public_ip:4343/mobile&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My mdm is a DMZ host with ip 172.29.29.2 and&amp;nbsp;nat rule to translate 172.29.29.2&amp;nbsp;to &lt;STRONG&gt;outside_interface_public_ip&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;nat (DMZ,outside) static interface service&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I have access rule on outside to permit any to real ip of dmz host with service IP.&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did not permit specific port in the first place and use service IP for the meantime to allow all service.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#388ec9"&gt;Please help me.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#388ec9"&gt;Thanks&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837107#M172549</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2019-03-12T07:18:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837108#M172550</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;please put some packet trace from outside to DMZ ip and post in here, also test using the command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;telnet &lt;EM&gt;public-address&lt;/EM&gt; 8080&lt;/P&gt;
&lt;P&gt;telnet &lt;EM&gt;public-addres&lt;/EM&gt; 4343&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from external machine and see if it is open or not.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regarding the packet trace try to see if the packets will be dropped somewhere on the rules&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Samer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 11:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837108#M172550</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2016-02-15T11:25:33Z</dc:date>
    </item>
    <item>
      <title>Hi Samer.</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837109#M172552</link>
      <description>&lt;P&gt;Hi Samer.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please see below packet trace output from random source ip. it is dropped at the end even though I have an access list on outside permitting any with service IP&lt;/P&gt;
&lt;P&gt;**************************************************************************************************&lt;/P&gt;
&lt;P&gt;SMMDZRA002# packet-tracer input outside tcp 192.0.2.123 12345 122.x.x.x 8080&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 122.x.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;*****************************************************************************&lt;/P&gt;
&lt;P&gt;SMMDZRA002# packet-tracer input outside tcp 192.0.2.123 12345 122.x.x.x 4343&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 122.x.x.x&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;******************************************************************&lt;/P&gt;
&lt;P&gt;Running config of ASA&lt;/P&gt;
&lt;P&gt;******************************************************************&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;SMMDZRA002# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(1)&lt;BR /&gt;!&lt;BR /&gt;hostname SMMDZRA002&lt;BR /&gt;domain-name smmph.local&lt;BR /&gt;enable password 8T8R6XdsfHe6TaJO encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd iimrgUvTSQcRUuCl encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool mypool 172.16.1.1-172.16.1.254&lt;BR /&gt;ip local pool mailpool 10.158.30.1-10.158.30.254&lt;BR /&gt;ip local pool 173.30POOL 172.30.30.1-172.30.30.50 mask 255.255.0.0&lt;BR /&gt;ip local pool 158POOL2 10.158.10.100-10.158.10.150 mask 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address&amp;nbsp;122.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.158.2.6 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif intf2&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 172.29.29.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.193.1.250 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone SGT 8&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.193.1.1&lt;BR /&gt;&amp;nbsp;name-server 10.193.1.6&lt;BR /&gt;&amp;nbsp;domain-name smmph.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network OBJ-10.158.2.25&lt;BR /&gt;&amp;nbsp;host 10.158.2.25&lt;BR /&gt;object network OBJ-10.158.2.2&lt;BR /&gt;&amp;nbsp;host 10.158.2.2&lt;BR /&gt;object network OBJ-10.159.1.2&lt;BR /&gt;&amp;nbsp;host 10.159.1.2&lt;BR /&gt;object network obj-10.60.1.7&lt;BR /&gt;&amp;nbsp;host 10.60.1.7&lt;BR /&gt;object network obj-10.60.1.60&lt;BR /&gt;&amp;nbsp;host 10.60.1.60&lt;BR /&gt;object network obj-10.60.1.85&lt;BR /&gt;&amp;nbsp;host 10.60.1.85&lt;BR /&gt;object network obj-10.60.1.91&lt;BR /&gt;&amp;nbsp;host 10.60.1.91&lt;BR /&gt;object network obj-10.60.1.206&lt;BR /&gt;&amp;nbsp;host 10.60.1.206&lt;BR /&gt;object network obj-10.60.1.241&lt;BR /&gt;&amp;nbsp;host 10.60.1.241&lt;BR /&gt;object network obj-10.60.1.244&lt;BR /&gt;&amp;nbsp;host 10.60.1.244&lt;BR /&gt;object network obj-10.60.1.245&lt;BR /&gt;&amp;nbsp;host 10.60.1.245&lt;BR /&gt;object network obj-10.60.1.246&lt;BR /&gt;&amp;nbsp;host 10.60.1.246&lt;BR /&gt;object network obj-10.60.1.247&lt;BR /&gt;&amp;nbsp;host 10.60.1.247&lt;BR /&gt;object network obj-10.158.2.4&lt;BR /&gt;&amp;nbsp;host 10.158.2.4&lt;BR /&gt;object network obj-10.158.2.11&lt;BR /&gt;&amp;nbsp;host 10.158.2.11&lt;BR /&gt;object network obj-10.158.2.12&lt;BR /&gt;&amp;nbsp;host 10.158.2.12&lt;BR /&gt;object network obj-10.158.2.28&lt;BR /&gt;&amp;nbsp;host 10.158.2.28&lt;BR /&gt;object network obj-10.158.2.38&lt;BR /&gt;&amp;nbsp;host 10.158.2.38&lt;BR /&gt;object network obj-10.158.2.50&lt;BR /&gt;&amp;nbsp;host 10.158.2.50&lt;BR /&gt;object network obj-10.158.2.52&lt;BR /&gt;&amp;nbsp;host 10.158.2.52&lt;BR /&gt;object network obj-10.158.10.6&lt;BR /&gt;&amp;nbsp;host 10.158.10.6&lt;BR /&gt;object network obj-10.159.1.4&lt;BR /&gt;&amp;nbsp;host 10.159.1.4&lt;BR /&gt;object network obj-10.159.1.10&lt;BR /&gt;&amp;nbsp;host 10.159.1.10&lt;BR /&gt;object network obj-10.159.1.251&lt;BR /&gt;&amp;nbsp;host 10.159.1.251&lt;BR /&gt;object network obj-10.159.1.253&lt;BR /&gt;&amp;nbsp;host 10.159.1.253&lt;BR /&gt;object network obj-10.159.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.159.0.0 255.255.0.0&lt;BR /&gt;object network obj-172.16.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 172.16.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.158.30.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.158.30.0 255.255.255.0&lt;BR /&gt;object network obj-10.158.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network obj-outside&lt;BR /&gt;&amp;nbsp;host 203.177.11.5&lt;BR /&gt;object network obj-10.20.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.20.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.30.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.30.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.40.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.40.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.50.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.50.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.60.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.60.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.70.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.70.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.80.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.80.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.90.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.90.1.0 255.255.255.0&lt;BR /&gt;object network obj-10.20.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.20.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.30.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.30.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.40.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.40.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.50.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.50.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.60.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.60.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.70.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.70.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.80.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.80.0.0 255.255.0.0&lt;BR /&gt;object network obj-10.90.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.90.0.0 255.255.0.0&lt;BR /&gt;object network obj-144.36.217.201&lt;BR /&gt;&amp;nbsp;host 144.36.217.201&lt;BR /&gt;object network obj-58.137.205.2&lt;BR /&gt;&amp;nbsp;host 58.137.205.2&lt;BR /&gt;object network obj-10.161.2.250&lt;BR /&gt;&amp;nbsp;host 10.161.2.250&lt;BR /&gt;&amp;nbsp;description Manila Proxy IP&lt;BR /&gt;object network SMMPH-IT_IP&lt;BR /&gt;&amp;nbsp;range 10.161.2.96 10.161.2.102&lt;BR /&gt;&amp;nbsp;description SMMPH-IT_IP&lt;BR /&gt;object network NETWORK_OBJ_10.158.0.0_16&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network NETWORK_OBJ_10.158.10.80_29&lt;BR /&gt;&amp;nbsp;subnet 10.158.10.80 255.255.255.248&lt;BR /&gt;object network inside158&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network ServerSub2&lt;BR /&gt;&amp;nbsp;subnet 10.193.1.0 255.255.255.0&lt;BR /&gt;object network ServerSubnet&lt;BR /&gt;&amp;nbsp;subnet 10.193.0.0 255.255.0.0&lt;BR /&gt;object network IN158&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network IN161&lt;BR /&gt;&amp;nbsp;subnet 10.161.0.0 255.255.0.0&lt;BR /&gt;object network IN193&lt;BR /&gt;&amp;nbsp;subnet 10.193.1.0 255.255.255.0&lt;BR /&gt;object network INSIDE158&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network INSIDE161&lt;BR /&gt;&amp;nbsp;subnet 10.161.0.0 255.255.0.0&lt;BR /&gt;object network INSIDE193&lt;BR /&gt;&amp;nbsp;subnet 10.193.0.0 255.255.0.0&lt;BR /&gt;object network obj10.158.2.50&lt;BR /&gt;&amp;nbsp;host 10.158.2.50&lt;BR /&gt;object network 203.177.11.3&lt;BR /&gt;&amp;nbsp;host 203.177.11.3&lt;BR /&gt;object network obj10.158.2.25&lt;BR /&gt;&amp;nbsp;host 10.158.2.25&lt;BR /&gt;object network 203.177.11.3(S)&lt;BR /&gt;&amp;nbsp;host 203.177.11.3&lt;BR /&gt;object network obj-10.60.1.242&lt;BR /&gt;&amp;nbsp;host 10.60.1.242&lt;BR /&gt;object network obj-10.60.1.243&lt;BR /&gt;&amp;nbsp;host 10.60.1.243&lt;BR /&gt;object network 173.30POOL&lt;BR /&gt;&amp;nbsp;subnet 172.30.0.0 255.255.0.0&lt;BR /&gt;object network IN173&lt;BR /&gt;&amp;nbsp;subnet 10.173.0.0 255.255.0.0&lt;BR /&gt;object network NETWORK_OBJ_172.30.30.0_28&lt;BR /&gt;&amp;nbsp;subnet 172.30.30.0 255.255.255.240&lt;BR /&gt;object network INSIDE159&lt;BR /&gt;&amp;nbsp;subnet 10.159.0.0 255.255.0.0&lt;BR /&gt;object network VPNPOOL158&lt;BR /&gt;&amp;nbsp;subnet 10.158.0.0 255.255.0.0&lt;BR /&gt;object network INSIDE173&lt;BR /&gt;&amp;nbsp;subnet 10.173.0.0 255.255.0.0&lt;BR /&gt;object network VPN161POOL&lt;BR /&gt;&amp;nbsp;subnet 10.161.0.0 255.255.0.0&lt;BR /&gt;object network NETWORK_OBJ_172.30.30.0_26&lt;BR /&gt;&amp;nbsp;subnet 172.30.30.0 255.255.255.192&lt;BR /&gt;object network NETWORK_OBJ_10.158.10.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.158.10.0 255.255.255.0&lt;BR /&gt;&lt;STRONG&gt;object network dmz-subnet&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;subnet 172.29.29.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network mdmserver&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;host 172.29.29.2&lt;/STRONG&gt;&lt;BR /&gt;object network dns-server&lt;BR /&gt;&amp;nbsp;host 10.193.1.6&lt;BR /&gt;access-list dmz_acl extended permit ip any object dns-server&lt;BR /&gt;access-list dmz_acl extended deny ip any interface inside&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list 101 extended permit ip 10.159.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list 101 extended permit ip 10.159.0.0 255.255.0.0 10.158.30.0 255.255.255.0&lt;BR /&gt;access-list 101 extended permit ip 10.158.0.0 255.255.0.0 10.158.30.0 255.255.255.0&lt;BR /&gt;access-list ftp.jgc.co.jp extended permit tcp host 10.158.10.130 host 150.5.65.99 eq ftp&lt;BR /&gt;access-list acl-outside extended deny tcp host 60.254.0.0 any eq www&lt;BR /&gt;access-list 102 extended permit ip 10.158.0.0 255.255.0.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.159.0.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.20.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.30.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.40.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.50.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.60.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.70.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.80.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 103 extended permit ip 10.90.1.0 255.255.255.0 host 144.36.217.201&lt;BR /&gt;access-list 104 extended permit ip 10.158.0.0 255.255.0.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.159.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.20.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.30.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.40.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.50.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.60.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.70.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.80.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list 105 extended permit ip 10.90.0.0 255.255.255.0 host 58.137.205.2&lt;BR /&gt;access-list inside_access_in remark Cisco IronPort C170&lt;BR /&gt;access-list inside_access_in extended permit ip object OBJ-10.158.2.25 any inactive&lt;BR /&gt;access-list inside_access_in remark Manila Mail Server&lt;BR /&gt;access-list inside_access_in extended permit ip object OBJ-10.158.2.2 any inactive&lt;BR /&gt;access-list inside_access_in remark Manila Proxy&lt;BR /&gt;access-list inside_access_in remark Blue Coat 300&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-10.161.2.250 any&lt;BR /&gt;access-list inside_access_in remark Manila Proxy&lt;BR /&gt;access-list inside_access_in extended permit ip object obj-10.158.2.50 any&lt;BR /&gt;access-list inside_access_in extended permit ip host 10.158.2.103 any&lt;BR /&gt;access-list inside_access_in extended permit ip object dns-server 172.29.29.0 255.255.255.0 inactive&lt;BR /&gt;access-list inside_access_in extended permit ip object dns-server object 173.30POOL inactive&lt;BR /&gt;access-list SMMPH standard permit 10.193.0.0 255.255.0.0&lt;BR /&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any object mdmserver&lt;/STRONG&gt;&lt;BR /&gt;no pager&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ip audit attack action alarm drop reset&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 10 burst-size 5&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,any) source static INSIDE193 INSIDE193 destination static 173.30POOL 173.30POOL no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static INSIDE158 INSIDE158 destination static 173.30POOL 173.30POOL no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static INSIDE159 INSIDE159 destination static 173.30POOL 173.30POOL no-proxy-arp route-lookup&lt;BR /&gt;nat (dmz,outside) source static dmz-subnet dmz-subnet destination static 173.30POOL 173.30POOL no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static INSIDE159 INSIDE159 destination static NETWORK_OBJ_10.158.10.0_24 NETWORK_OBJ_10.158.10.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,dmz) source static INSIDE193 INSIDE193 destination static dmz-subnet dmz-subnet no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static obj-10.159.0.0_16 obj-10.159.0.0_16 destination static obj-172.16.1.0_24 obj-172.16.1.0_24 inactive&lt;BR /&gt;nat (inside,outside) source static obj-10.159.0.0_16 obj-10.159.0.0_16 destination static obj-10.158.30.0_24 obj-10.158.30.0_24&lt;BR /&gt;nat (inside,outside) source static obj-10.158.0.0_16 obj-10.158.0.0_16 destination static obj-10.158.30.0_24 obj-10.158.30.0_24&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.158.0.0_16 interface&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.20.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.30.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.40.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.50.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.60.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.70.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.80.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.90.1.0_24 interface destination static obj-144.36.217.201 obj-144.36.217.201 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.158.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.159.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.20.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.30.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.40.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.50.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.60.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.70.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.80.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source dynamic obj-10.90.0.0_16 interface destination static obj-58.137.205.2 obj-58.137.205.2 inactive&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.158.0.0_16 NETWORK_OBJ_10.158.0.0_16 destination static NETWORK_OBJ_10.158.10.80_29 NETWORK_OBJ_10.158.10.80_29 no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.158.10.80_29 NETWORK_OBJ_10.158.10.80_29 no-proxy-arp route-lookup inactive&lt;BR /&gt;!&lt;BR /&gt;object network OBJ-10.159.1.2&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 203.177.11.2 net-to-net&lt;BR /&gt;object network obj-10.60.1.7&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.60&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.85&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.91&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.206&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.241&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.244&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.245&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.246&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.247&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.2.4&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.2.28&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.2.38&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.2.50&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.2.52&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.158.10.6&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.159.1.4&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.159.1.10&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.159.1.251&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.159.1.253&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.242&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj-10.60.1.243&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;&lt;STRONG&gt;object network mdmserver&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;nat (dmz,outside) static interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0&amp;nbsp;122.x.x.x 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.158.1.1 1&lt;BR /&gt;route inside 10.159.0.0 255.255.0.0 10.158.2.100 1&lt;BR /&gt;route management 10.161.2.0 255.255.255.0 10.193.255.254 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.252 10.158.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;&amp;nbsp;action terminate&lt;BR /&gt;dynamic-access-policy-record DAP-GP-VPNAC-TEST3&lt;BR /&gt;dynamic-access-policy-record DAP-GP-VPNCL-TEST&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list value MNL-FS&lt;BR /&gt;dynamic-access-policy-record DAP-GP-VPNAC-MNL&lt;BR /&gt;dynamic-access-policy-record DAP-GP-VPNAC-PAL&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server SG-GP-VPNAC-TEST protocol ldap&lt;BR /&gt;aaa-server SG-GP-VPNAC-TEST (inside) host 10.193.1.1&lt;BR /&gt;&amp;nbsp;ldap-base-dn dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute SamAccountName&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn cn=administrator, cn=users, dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;aaa-server SG-GP-VPNCL-TEST protocol ldap&lt;BR /&gt;aaa-server SG-GP-VPNCL-TEST (inside) host 10.193.1.1&lt;BR /&gt;&amp;nbsp;ldap-base-dn dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute samaccountname&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn cn=administrator, cn=users, dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;aaa-server SG-GP-VPNAC-MNL protocol ldap&lt;BR /&gt;aaa-server SG-GP-VPNAC-MNL (inside) host 10.193.1.1&lt;BR /&gt;&amp;nbsp;timeout 5&lt;BR /&gt;&amp;nbsp;ldap-base-dn dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute samaccountname&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn cn=administrator, cn=users, dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;aaa-server SG-GP-VPNAC-PAL protocol ldap&lt;BR /&gt;aaa-server SG-GP-VPNAC-PAL (inside) host 10.193.1.1&lt;BR /&gt;&amp;nbsp;ldap-base-dn dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;ldap-scope subtree&lt;BR /&gt;&amp;nbsp;ldap-naming-attribute samaccountname&lt;BR /&gt;&amp;nbsp;ldap-login-password *****&lt;BR /&gt;&amp;nbsp;ldap-login-dn cn=administrator, cn=users, dc=smmph, dc=local&lt;BR /&gt;&amp;nbsp;server-type microsoft&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.158.0.0 255.255.0.0 inside&lt;BR /&gt;http 10.159.1.16 255.255.255.255 inside&lt;BR /&gt;http 10.161.2.0 255.255.255.0 inside&lt;BR /&gt;http 10.161.2.99 255.255.255.255 management&lt;BR /&gt;http 10.161.2.101 255.255.255.255 management&lt;BR /&gt;http 10.161.2.102 255.255.255.255 management&lt;BR /&gt;http 10.161.2.98 255.255.255.255 management&lt;BR /&gt;http 10.161.2.96 255.255.255.255 management&lt;BR /&gt;http 10.161.2.97 255.255.255.255 management&lt;BR /&gt;http 10.193.1.0 255.255.255.0 inside&lt;BR /&gt;snmp-server host inside 10.158.254.254 poll community *****&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set myset esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;&amp;nbsp;protocol esp encryption 3des&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-192&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;&amp;nbsp;protocol esp encryption aes-256&lt;BR /&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map dynmap 10 set ikev1 transform-set myset&lt;BR /&gt;crypto dynamic-map dynmap 10 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map mymap interface outside&lt;BR /&gt;crypto ca trustpoint SMMDZRA002_TrustPoint0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=SMMDZRA002&lt;BR /&gt;&amp;nbsp;keypair SMMDZRA002KP&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint LOCAL-CA-SERVER&lt;BR /&gt;&amp;nbsp;keypair LOCAL-CA-SERVER&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca server&lt;BR /&gt;&amp;nbsp;lifetime ca-certificate 3650&lt;BR /&gt;&amp;nbsp;lifetime certificate 3650&lt;BR /&gt;&amp;nbsp;subject-name-default cn=SMMDZRA002, o=smmph&lt;BR /&gt;&amp;nbsp;issuer-name cn=SMMDZRA002, o=smmph&lt;BR /&gt;crypto ca certificate chain SMMDZRA002_TrustPoint0&lt;BR /&gt;&amp;nbsp;certificate d9ac7656&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201fb 30820164 a0030201 020204d9 ac765630 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003042 31133011 06035504 03130a53 4d4d445a 52413030 32312b30 2906092a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 864886f7 0d010902 161c534d 4d445a52 41303032 2e436973 636f4153 412d3535&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 34352e63 6f6d301e 170d3136 30313231 30373236 33345a17 0d323630 31313830&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 37323633 345a3042 31133011 06035504 03130a53 4d4d445a 52413030 32312b30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2906092a 864886f7 0d010902 161c534d 4d445a52 41303032 2e436973 636f4153&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 412d3535 34352e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30818902 818100b8 4eb35cdb f45b2a35 aeee5a0c 8ff0b915 04a71205 7eea4f1d&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4f8416a4 23f44f0a 34745bfb 188b25a2 fc4ce95a 7c434084 bc553439 518d52e2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68f41793 58b40c17 254c3854 c05708be ce28597b a6e4174a 78d5bcda 926dfec2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a1a187d0 6237fff8 dc19814a ea902e02 a0c4cb79 75ead721 f48a2bd4 27212348&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 151657fc b9909502 03010001 300d0609 2a864886 f70d0101 05050003 81810047&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6ae1e858 25a8c692 4f1efbfc 31ad9c00 bb24285c 6a6d6b20 ce24ba54 2f45347b&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d4852c07 5445fd63 291e7a56 72804cbf aa23bb9f 40775a46 785efcd1 4cf28531&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3562e30e d1b27787 86f46c66 80807934 5b115e56 14c29d88 3df5870a 4d708763&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2c442855 701da13f 5574ee6e 3e74f342 72742440 cfcefc37 eb7ee98b 0dfcb3&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain LOCAL-CA-SERVER&lt;BR /&gt;&amp;nbsp;certificate ca 01&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820223 3082018c a0030201 02020101 300d0609 2a864886 f70d0101 05050030&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25310e30 0c060355 040a1305 736d6d70 68311330 11060355 0403130a 534d4d44&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a524130 3032301e 170d3136 30323032 30383530 30395a17 0d313930 32303130&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 38353030 395a3025 310e300c 06035504 0a130573 6d6d7068 31133011 06035504&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03130a53 4d4d445a 52413030 3230819f 300d0609 2a864886 f70d0101 01050003&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 818d0030 81890281 8100c50d d6782f24 4d1bd8ae 6ece49b9 fe3937b6 ec69b668&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e7ad49bb 6c7ebf71 31fc0721 fe4f79ee abdd6dd8 90f024a6 38883756 93255e8c&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b404a9dc 420f2d25 b091a005 b1c6eb7a d8a9c26f f3b84a5d 3b422c12 d19aa382&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9f7c4929 30729af2 420960de ba2d9194 fc6ca772 ea636f3b 8140ad98 f3ce36fd&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8dba140f 0a05c519 11fb0203 010001a3 63306130 0f060355 1d130101 ff040530&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 030101ff 300e0603 551d0f01 01ff0404 03020186 301f0603 551d2304 18301680&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 142a8ebe e5671138 288ca6a1 55fb326b 367bfbbe fd301d06 03551d0e 04160414&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2a8ebee5 67113828 8ca6a155 fb326b36 7bfbbefd 300d0609 2a864886 f70d0101&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05050003 81810097 bf94ed09 8f4bd0c2 d0a62ac4 6712b8e1 3503c904 bfd5b6e0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6e408455 15521b21 eab1234b 9607257f 3c73c572 66b3b9c8 43d1e0cf d63e256f&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 54040347 acb8b7df 9245a872 84bb52bb 4e27473f ad6c5aed 7c23a1b7 e1d311be&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9b332ade 103c2349 148f473e 1edd3b40 5a7d9ffd 8f0b6f0e 9f00203d f6b70031&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e9cf0d3b 6bf222&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 5 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint SMMDZRA002_TrustPoint0&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 10.158.0.0 255.255.0.0 inside&lt;BR /&gt;telnet 10.159.0.0 255.255.0.0 inside&lt;BR /&gt;telnet 10.60.1.0 255.255.255.0 inside&lt;BR /&gt;telnet 10.158.0.0 255.255.0.0 intf2&lt;BR /&gt;telnet 10.159.0.0 255.255.0.0 intf2&lt;BR /&gt;telnet 10.60.1.0 255.255.255.0 intf2&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.161.2.98 255.255.255.255 inside&lt;BR /&gt;ssh 10.161.2.99 255.255.255.255 inside&lt;BR /&gt;ssh 10.161.2.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 1000&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ssl trust-point SMMDZRA002_TrustPoint0 inside&lt;BR /&gt;ssl trust-point SMMDZRA002_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;enable inside&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-4.2.01035-k9.pkg 2&lt;BR /&gt;&amp;nbsp;anyconnect profiles CP-GP-VPNAC-MNL_client_profile disk0:/CP-GP-VPNAC-MNL_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles CP-GP-VPNAC-PAL_client_profile disk0:/CP-GP-VPNAC-PAL_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles CP-GP-VPNAC-TEST_client_profile disk0:/CP-GP-VPNAC-TEST_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles CP-VPNAC-TEST2_client_profile disk0:/CP-VPNAC-TEST2_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles CP-VPNAC-TEST3_client_profile disk0:/CP-VPNAC-TEST3_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy GroupPolicy_CP-GP-VPNAC-MNL internal&lt;BR /&gt;group-policy GroupPolicy_CP-GP-VPNAC-MNL attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.193.1.1 10.193.1.6&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value smmph.local&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value CP-GP-VPNAC-MNL_client_profile type user&lt;BR /&gt;group-policy GroupPolicy_CP-GP-VPNAC-PAL internal&lt;BR /&gt;group-policy GroupPolicy_CP-GP-VPNAC-PAL attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.193.1.1 10.193.1.6&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value smmph.local&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value CP-GP-VPNAC-PAL_client_profile type user&lt;BR /&gt;group-policy GrpPolicy-GP-VPNCL-TEST internal&lt;BR /&gt;group-policy GrpPolicy-GP-VPNCL-TEST attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list value MNL-FS&lt;BR /&gt;group-policy GroupPolicy_CP-VPNAC-TEST3 internal&lt;BR /&gt;group-policy GroupPolicy_CP-VPNAC-TEST3 attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.193.1.1 10.193.1.6&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value smmph.local&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value CP-VPNAC-TEST3_client_profile type user&lt;BR /&gt;username danb password DgJTLLr60YlCc/qa encrypted privilege 15&lt;BR /&gt;username sumitomoph password 2HHy4WoREOxqpVos encrypted privilege 15&lt;BR /&gt;username trends password /A/vfSkRhckIGmQX encrypted privilege 15&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username ryant password VkL8b6LC.2VB9B9S encrypted privilege 15&lt;BR /&gt;username mailserver password gohYQXFN3/pIjNMt encrypted&lt;BR /&gt;tunnel-group CP-GP-VPNAC-MNL type remote-access&lt;BR /&gt;tunnel-group CP-GP-VPNAC-MNL general-attributes&lt;BR /&gt;&amp;nbsp;address-pool 173.30POOL&lt;BR /&gt;&amp;nbsp;authentication-server-group SG-GP-VPNAC-MNL&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_CP-GP-VPNAC-MNL&lt;BR /&gt;tunnel-group CP-GP-VPNAC-MNL webvpn-attributes&lt;BR /&gt;&amp;nbsp;authentication aaa certificate&lt;BR /&gt;&amp;nbsp;group-alias CP-GP-VPNAC-MNL enable&lt;BR /&gt;tunnel-group CP-GP-VPNAC-PAL type remote-access&lt;BR /&gt;tunnel-group CP-GP-VPNAC-PAL general-attributes&lt;BR /&gt;&amp;nbsp;address-pool 158POOL2&lt;BR /&gt;&amp;nbsp;authentication-server-group SG-GP-VPNAC-PAL&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_CP-GP-VPNAC-PAL&lt;BR /&gt;tunnel-group CP-GP-VPNAC-PAL webvpn-attributes&lt;BR /&gt;&amp;nbsp;authentication aaa certificate&lt;BR /&gt;&amp;nbsp;group-alias CP-GP-VPNAC-PAL enable&lt;BR /&gt;tunnel-group CP-VPNAC-TEST3 type remote-access&lt;BR /&gt;tunnel-group CP-VPNAC-TEST3 general-attributes&lt;BR /&gt;&amp;nbsp;address-pool 173.30POOL&lt;BR /&gt;&amp;nbsp;authentication-server-group SG-GP-VPNAC-TEST&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_CP-VPNAC-TEST3&lt;BR /&gt;tunnel-group CP-VPNAC-TEST3 webvpn-attributes&lt;BR /&gt;&amp;nbsp;authentication aaa certificate&lt;BR /&gt;&amp;nbsp;group-alias CP-VPNAC-TEST3 enable&lt;BR /&gt;tunnel-group CP-GP-VPNCL-TEST type remote-access&lt;BR /&gt;tunnel-group CP-GP-VPNCL-TEST general-attributes&lt;BR /&gt;&amp;nbsp;authentication-server-group SG-GP-VPNCL-TEST&lt;BR /&gt;&amp;nbsp;default-group-policy GrpPolicy-GP-VPNCL-TEST&lt;BR /&gt;tunnel-group CP-GP-VPNCL-TEST webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias CP-GP-VPNCL-TEST enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; set connection decrement-ttl&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 23&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 23&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:035c8fa008ba5587e044c2beb7782ac3&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 01:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837109#M172552</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-16T01:41:24Z</dc:date>
    </item>
    <item>
      <title>I also cannot telnet to the</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837110#M172554</link>
      <description>&lt;P&gt;I also cannot telnet to the public-address&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 01:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837110#M172554</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-16T01:49:22Z</dc:date>
    </item>
    <item>
      <title>Looks like the traffic is not</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837111#M172555</link>
      <description>&lt;P&gt;Looks like the traffic is not matching your NAT statement and therefore not matching your ACL. &amp;nbsp;I would suggest trying to place the NAT statement in manual NAT.&lt;/P&gt;
&lt;P&gt;object service tcp_8080&lt;/P&gt;
&lt;P&gt;nat (dmz,outside) static mdmserver interface service tcp_8080 tcp_8080&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 04:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837111#M172555</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-16T04:36:29Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837112#M172557</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The traffic is still blocked.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But I changed the public ip to my ISP default gateway and the packet trace result is now allowed.&lt;/P&gt;
&lt;P&gt;So I cannot use the ip of outside interface as a translated IP of dmz host?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;SMMDZRA002# packet-tracer input outside tcp 192.0.2.123 12345 122.x.x.x 8080&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network mdmserver&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 122.x.x.x&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface dmz&lt;BR /&gt;Untranslate 122.x.x.x/8080 to 172.29.29.2/8080&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit ip any object mdmserver&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network mdmserver&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static 122.x.x.x&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5211034, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is that the ideal output?&lt;/P&gt;
&lt;P&gt;**********************&lt;/P&gt;
&lt;P&gt;Still I cannot access the mdm host from outside using the links below&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://ISP_defaultgateway:8080/mobile&lt;/P&gt;
&lt;P&gt;https://ISP_defaultgateway:4343/mobile&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 05:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837112#M172557</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-16T05:21:48Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837113#M172559</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this is the right output for your configuration, you dont have any drop at any point.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;if you can scan your device you trying to access if there is firewall settings on it that prevents you accessing, also make scan port for it to see which port is open on it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 10:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837113#M172559</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2016-02-16T10:37:42Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837114#M172562</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Packet tracer usually used to verify whether the configuration on the ASA is correct or not. Since the firewall is not dropping the packet we have to take the packet capture on the ASA with the real traffic. you can take capture on the outside and dmz interface using he correct IP. Please note that when we set the capture on dmz interface the destination host IP will the private or translated IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cap capin interface outside match tcp host &amp;lt;sourceip&amp;gt; host&amp;nbsp;&lt;SPAN&gt;122.x.x.x eq&amp;nbsp;8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;cap capout interface dmz match tcp host &amp;lt;sourceip&amp;gt; host&amp;nbsp;172.29.29.2 eq 8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;to view the capture--show cap capin / show cap capout&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;BR /&gt;Shivapramod M&lt;BR /&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 13:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837114#M172562</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2016-02-16T13:15:23Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837115#M172563</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;The source ip is s public ip?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 04:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837115#M172563</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-17T04:43:46Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837116#M172565</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Yes, Source IP is the device IP address from where you are initiating the traffic. So if you are testing from a PC in internet then the public IP address of the PC.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Shiva&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 08:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837116#M172565</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2016-02-17T08:14:51Z</dc:date>
    </item>
    <item>
      <title>Ah ok...here is the problem</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837117#M172567</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Ah ok...here is the problem "&lt;SPAN&gt;Untranslate 122.x.x.x/8080 to 172.29.29.2/8080"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The server is only listening for port 80 so the command I gave you earlier is incorrect.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please change it to the following&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;nat (dmz,outside) static mdmserver interface service tcp 80 8080&lt;/P&gt;
&lt;P&gt;For the sake of cleaing up the configuration you might also want to remove the previous NAT command before applying this new one.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 20 Feb 2016 07:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837117#M172567</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-20T07:15:12Z</dc:date>
    </item>
    <item>
      <title>Hi all</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837118#M172568</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My dmz mdm server is now accessible from outside.&lt;/P&gt;
&lt;P&gt;It was resolved when i assigned a different public ip for translation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, i cannot ping this public IP from outside, inside and dmz.&lt;/P&gt;
&lt;P&gt;how can i ping the public IP from inside and outside? is it ISP related?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 01:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837118#M172568</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-23T01:51:02Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837119#M172570</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;good to hear that, regarding ping you need to check icmp inspection or if you allowing icmp packets from outside to your firewall&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regarding pinging the public IP from inside interface, you will not be able to do that and its not related to ISP, its firewall default behavior&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;good luck.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2016 05:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837119#M172570</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2016-02-23T05:07:50Z</dc:date>
    </item>
    <item>
      <title>As Samer has said, the</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837120#M172572</link>
      <description>&lt;P&gt;As Samer has said, the default behavior is to drop packets that the ASA expects to see on another interface other than the ingress interface. &amp;nbsp;so since the ASA expects to see packets for the public IP of the server on the outside interface, all other packets entering other interfaces will be dropped....by default.&lt;/P&gt;
&lt;P&gt;There are ways to get around this. &amp;nbsp;You can do hairpinning on the inside interface so that traffic going to the public IP of the server will be translated to the private IP of the server and sendt back out the inside interface (please forgive me but I can not be bothered to scroll up and find exact IPs, so I will use my own made up IPs for this example). &amp;nbsp;For example:&lt;/P&gt;
&lt;P&gt;object network SERVER-PRIVATE&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.1.10&lt;/P&gt;
&lt;P&gt;object network SERVER-PUBLIC&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 62.192.76.80&lt;/P&gt;
&lt;P&gt;object network INSIDE-LAN&lt;/P&gt;
&lt;P&gt;&amp;nbsp; subnet 172.16.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (inside,inside) source static INSIDE-LAN INSIDE-LAN destination static SERVER-PUBLIC SERVER-PRIVATE&lt;/P&gt;
&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 07:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837120#M172572</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-24T07:04:04Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837121#M172573</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;unfortunately the mdm is unaccessible from outside again. Damn. I just removed the lan cables from the switch that connects to dmz host yesterday afternoon. Putting it back again in the morning. Suddenly it is not working and it is not a faulty cable. How weird could that be! Can it be a problem to the public ip?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 09:09:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837121#M172573</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-24T09:09:13Z</dc:date>
    </item>
    <item>
      <title>I could be a problem with the</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837122#M172575</link>
      <description>&lt;P&gt;I could be a problem with the routing of the public IP...but that is very unlikely.&lt;/P&gt;
&lt;P&gt;in the ASDM realtime log viewer do you see any drops or asynchronous NAT...&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 22:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837122#M172575</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-24T22:09:35Z</dc:date>
    </item>
    <item>
      <title>No async nat on viewer when</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837123#M172576</link>
      <description>&lt;P&gt;No async nat on viewer when pinging 8.8.8.8 from dmz host. But i can see the permit hit count increase on dmz access rules permit any any. Also. On the real time viewer, teardown icmp can be seen and no drop. It worked one day then the next morning it became intermittent up to not working at all.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 23:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837123#M172576</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-24T23:07:38Z</dc:date>
    </item>
    <item>
      <title>I suggest setting up a packet</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837124#M172577</link>
      <description>&lt;P&gt;I suggest setting up a packet capture between the interfaces for the specific server&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/110117-asa-capture-asdm-config.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/110117-asa-capture-asdm-config.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;And see if you see traffic flow in both directions.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 11:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837124#M172577</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-25T11:32:35Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837125#M172578</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is working again now. It cannot work when I set a specific TCP port 4343&amp;nbsp;in access-list for outside going in. After I changed to IP it worked. But I wonder why it cannot work after permitting only specific ports.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2016 01:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837125#M172578</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-03-01T01:00:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837126#M172579</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1.check the inspection list on firewall&lt;/P&gt;
&lt;P&gt;2. if it is working on [ IP ] check the ports that is in listening on both ends to see which port is in use and then check if its permitted on your firewall or not.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;try capture traffic between the two hosts on firewall and analyze the traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Samer.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2016 07:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-host-is-not-accessible-from-outside-internet/m-p/2837126#M172579</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2016-03-01T07:23:54Z</dc:date>
    </item>
  </channel>
</rss>

