<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DMZ ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738429#M178120</link>
    <description>&lt;P&gt;HI There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are setting up a DMZ for our VPS Virtual Machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have our esxi host behind the firewall on 192.168.1.101&lt;/P&gt;&lt;P&gt;Our VMs internally are all working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our issue is we want to create VPS VMs with a static public IP address on the DMZ. We have a public ip address assigned on the DMZ ( 12.12.12.13 ) and on our VM we have assigned another IP address &amp;nbsp;( 12.12.12.14 with a Gateway of 12.12.12.13 ).&lt;/P&gt;&lt;P&gt;We have setup acl for the DMZ to allow any as we want to use IPtables on the VPS machines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We cannot seem to get this to work so what are we doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to setup a number of VPS machines with static ip addresses and use the DMZ interface for this type of traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are we on the right track or have we missed something??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:43:03 GMT</pubDate>
    <dc:creator>Ben McGuire</dc:creator>
    <dc:date>2019-03-12T06:43:03Z</dc:date>
    <item>
      <title>DMZ ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738429#M178120</link>
      <description>&lt;P&gt;HI There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are setting up a DMZ for our VPS Virtual Machines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have our esxi host behind the firewall on 192.168.1.101&lt;/P&gt;&lt;P&gt;Our VMs internally are all working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our issue is we want to create VPS VMs with a static public IP address on the DMZ. We have a public ip address assigned on the DMZ ( 12.12.12.13 ) and on our VM we have assigned another IP address &amp;nbsp;( 12.12.12.14 with a Gateway of 12.12.12.13 ).&lt;/P&gt;&lt;P&gt;We have setup acl for the DMZ to allow any as we want to use IPtables on the VPS machines.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We cannot seem to get this to work so what are we doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to setup a number of VPS machines with static ip addresses and use the DMZ interface for this type of traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are we on the right track or have we missed something??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738429#M178120</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2019-03-12T06:43:03Z</dc:date>
    </item>
    <item>
      <title>Hi,- Are you able to ping the</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738430#M178121</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;- Are you able to ping the ASA DMZ interface (12.12.12.13) IP from your host?&lt;/P&gt;&lt;P&gt;- Also what kind of traffic you are testing?(what is the traffic flow - from where you are initiating)&lt;/P&gt;&lt;P&gt;- As i could understand that you are now using the third vlan (one is inside, one is outside and this is DMZ) , could you please check the output of 'show activation-key' and see if it says 3 vlans, DMZ restricted?&lt;/P&gt;&lt;P&gt;- If you are testing with icmp traffic, have you permitted the return traffic on outside interface or run the command in global mode 'fixup protocol icmp'&lt;/P&gt;&lt;P&gt;- Also if all are set then could you please provide the output of :&lt;/P&gt;&lt;P&gt;"packet-tracer input DMZ tcp 12.12.12.14 12345 4.2.2.2 80 detail"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738430#M178121</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T13:24:25Z</dc:date>
    </item>
    <item>
      <title>OK. I will provide these</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738431#M178122</link>
      <description>&lt;P&gt;OK. I will provide these outputs now&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738431#M178122</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:28:44Z</dc:date>
    </item>
    <item>
      <title>fw-001# packet-tracer input</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738432#M178123</link>
      <description>&lt;P&gt;fw-001# packet-tracer input DMZ tcp 69.162.90.50 12345 4.2.2.2 80 detail&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x415d038, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=1671, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz-VPS&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738432#M178123</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:30:53Z</dc:date>
    </item>
    <item>
      <title>Licensed features for this</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738433#M178124</link>
      <description>&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : 8&lt;BR /&gt;VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 3, DMZ Restricted&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 10&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;VPN-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled&lt;BR /&gt;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 10&lt;BR /&gt;WebVPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Dual ISPs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;VLAN Trunk Ports &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 0&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;The flash activation key is the SAME as the running key.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738433#M178124</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:31:27Z</dc:date>
    </item>
    <item>
      <title>Oh and I also have different</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738434#M178125</link>
      <description>&lt;P&gt;Oh and I also have different public ip address on the outside interface.&lt;/P&gt;&lt;P&gt;So I have one public ip on the DMZ and one on the outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want VPS machines to use the DMZ IP interface and have the VPS machines to use iptables and not the rules of the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope I am making sense. I thank you for taking a look&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738434#M178125</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:34:46Z</dc:date>
    </item>
    <item>
      <title>We have tried ping the DMZ IP</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738435#M178126</link>
      <description>&lt;P&gt;We have tried ping the DMZ IP from the VPS machine and its says destination ureachable&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738435#M178126</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:39:13Z</dc:date>
    </item>
    <item>
      <title>Hi,Thanks for the output</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738436#M178127</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the output.&lt;/P&gt;&lt;P&gt;First thing here is that you have only two fully functional Vlans. To enable the third vlan which would be able to initiate only in one direction.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;"With the Base license, the third VLAN can only be configured to initiate traffic to one other VLAN. You limit the third VLAN using the &lt;B class="cBold"&gt;no forward interface&lt;/B&gt; command".&lt;/P&gt;&lt;P&gt;This means if you want to have communication between DMZ and Outside then you need to configure 'no forward interface &amp;lt;inside-vlan&amp;gt;'.&amp;nbsp; Please configure this and test.&lt;/P&gt;&lt;P&gt;Also provide the access-list you have configure and placed on DMZ interface and Outside Interface&lt;/P&gt;&lt;P&gt;Also provide the output of 'show run policy-map'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738436#M178127</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T13:44:00Z</dc:date>
    </item>
    <item>
      <title>Hi, Thanks for the response.</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738437#M178128</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;no forward interface command needs to be run on vlan2 yes?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738437#M178128</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:48:06Z</dc:date>
    </item>
    <item>
      <title>Hi,If you want to have</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738438#M178129</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you want to have communication of DMZ host to only Outside host (not Inside) then 'no forward interface &amp;lt;inside-interface vlan&amp;gt;.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738438#M178129</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T13:50:32Z</dc:date>
    </item>
    <item>
      <title>I run the show run policy-map</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738439#M178130</link>
      <description>&lt;P&gt;I run the show run policy-map and it brings back now output - it just takes me back to the command prompt.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738439#M178130</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:50:44Z</dc:date>
    </item>
    <item>
      <title>fw-001# conf tfw-001(config)#</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738440#M178131</link>
      <description>&lt;P&gt;&lt;BR /&gt;fw-001# conf t&lt;BR /&gt;fw-001(config)# no forward interface vlan11&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;It seems that command does not work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738440#M178131</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:54:46Z</dc:date>
    </item>
    <item>
      <title>I believe it is already</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738441#M178132</link>
      <description>&lt;P&gt;I believe it is already configured looking at the asdm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I provide a screenshot&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738441#M178132</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T13:58:39Z</dc:date>
    </item>
    <item>
      <title>Hi,I am sorry. I forgot to</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738442#M178133</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am sorry. I forgot to mention that it is an interface based command.&lt;/P&gt;&lt;P&gt;You need to configure this command under the DMZ vlan interface.&lt;/P&gt;&lt;P&gt;For clear understanding, use the link below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.html#wp1051819&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 13:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738442#M178133</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T13:59:25Z</dc:date>
    </item>
    <item>
      <title>hi,If it is already</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738443#M178134</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;If it is already configured then remove access-group from DMZ vlan interface(bydefault it allows all the traffic from High Security level to low).&lt;/P&gt;&lt;P&gt;It is the access-list issue then(it has not given any license error in packet-tracer).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 14:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738443#M178134</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T14:02:10Z</dc:date>
    </item>
    <item>
      <title>Hi, Yes the command will work</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738444#M178135</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes the command will work but I provided a screen shot of the DMZ interface which is set to prevent traffic to the inside interface already as without this setting the licence restricts any other setting. The packet tracer states when traffic hit the outside interface it gets blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is we want all traffic generatedfrom the DMZ to go out via the DMZ as this has its own gateway and public ip. Traffic should not be touching the outside interface like the packet tracer states&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 14:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738444#M178135</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T14:07:01Z</dc:date>
    </item>
    <item>
      <title>Hi, I do not know what you</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738445#M178136</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not know what you mean by "&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;remove access-group from DMZ vlan interface"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;I have attached our ACL via ADSM and the network object in the DMZ ( VPS-Customers ) has a public ip of the VPS Machine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;I believe we do not need to setup anything in inside or outside interfaces so why is traffic trying to go out the outside interface?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Yes it seems to be an ACL issue but where??&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 14:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738445#M178136</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T14:12:25Z</dc:date>
    </item>
    <item>
      <title>Hi,I think there is a</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738446#M178137</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think there is a misunderstanding. I had asked in the starting what is the communication flow(from where it is initiating and to what destination(behind which interface of ASA) it is going.&lt;/P&gt;&lt;P&gt;From the snapshot, i could see that you have configured destination as VPC-customer. So where is this VPC-customer subnet?&lt;/P&gt;&lt;P&gt;Packet-tracer is a way to create a dumy packet and sent through ASA. The example was for host coming from the subnet of DMZ to 4.2.2.2(it is a google server ip) which lies behind Outside Interface.&lt;/P&gt;&lt;P&gt;Please explain in detail what is the communication flow.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 14:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738446#M178137</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T14:42:25Z</dc:date>
    </item>
    <item>
      <title>The traffic flow should be</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738447#M178138</link>
      <description>&lt;P&gt;The traffic flow should be from the internet to the DMZ interface which has an IP of 69.162.90.49. The VPS-Customer object in the DMZ has a public IP of 69.162.90.50.&lt;/P&gt;&lt;P&gt;The DMZ subnet VPS customer is a VM on an ESXi host that I want to be able to bypass the access rules on the ASA &amp;nbsp;and manage the VPS-customer VM firewall via iptables.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To explain further:-&lt;/P&gt;&lt;P&gt;I have an ESXi Host&lt;/P&gt;&lt;P&gt;An ASA Firewall&lt;/P&gt;&lt;P&gt;There are three VMs on the ESXi Host&lt;/P&gt;&lt;P&gt;Two VMs are setup with NAT and are working fine on the inside interface&lt;/P&gt;&lt;P&gt;The third VM has a public IP address and is also on the ESXi Host but this VM needs to use the DMZ ( VPS-customer) and not use the firewall rules of the other VMs. I want to allow 'Any" &amp;nbsp;on the DMZ and also come in and out via the DMZ. Is this how it works or does it still need to go out via the outside interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have made a quick net diagram.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 14:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738447#M178138</guid>
      <dc:creator>Ben McGuire</dc:creator>
      <dc:date>2015-10-08T14:54:08Z</dc:date>
    </item>
    <item>
      <title>Hi,Thanks for the detailed</title>
      <link>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738448#M178139</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the detailed explanation.&lt;/P&gt;&lt;P&gt;We need to understand that traffic is by default allowed from High security zone interface to low(return traffic is allowed). Vice versa is not allowed(initiated from lower security zone until there is an access-list configured on the lower interface to allow the traffic).&lt;/P&gt;&lt;P&gt;- Now in your case traffic is initiated form Outside (which is a lower security zone) then you need to allow traffic with access-list source from outside host(any) to your server IP for TCP or IP traffic(whatever is your profile) and apply it on Outside interface(you have already configured access-list on Outside, you can just add one more entry to allow the traffic as mentioned above).&lt;/P&gt;&lt;P&gt;- Also your access-list on DMZ is wrong as VPC-customer is already behind DMZ so this network object should be source not destination(you have configured) and destination should be any(configure specific destination IP on Internet if you are aware of).&lt;/P&gt;&lt;P&gt;Please let me know if you have any query.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Akshay Rastogi&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2015 15:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-asa-5505/m-p/2738448#M178139</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-10-08T15:08:21Z</dc:date>
    </item>
  </channel>
</rss>

