<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The security levels only take in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765603#M192377</link>
    <description>&lt;P&gt;The security levels only take effect while there are no access-lists assigned to the interface.&amp;nbsp; Once you assign an ACL to an interface it is the ACL that counts and not the security level.&lt;/P&gt;&lt;P&gt;what version of ASA are you running?&amp;nbsp; If you are running a version earlier than 8.2 you may need to either add a NAT exempt statement for the traffic or issue the command &lt;STRONG&gt;no nat-control&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Wed, 26 Aug 2015 20:09:49 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2015-08-26T20:09:49Z</dc:date>
    <item>
      <title>Access from Inside network to subnetwork (DMZ)</title>
      <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765600#M192365</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a request from a customer to allow a server on the inside network (192.168.1.203) to the "learning network" 10.10.10.0/24 over a specific set of ports. Here is the current ACL to allow from DMZ to Inside network&lt;/P&gt;&lt;P&gt;access-list learning_access_in extended permit icmp 10.10.10.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit ip 10.10.10.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit tcp 10.10.10.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit tcp 10.10.10.0 255.255.255.0 any eq www&amp;nbsp;&lt;BR /&gt;access-list learning_access_in remark Allow access to mmgi-apps&lt;BR /&gt;access-list learning_access_in extended permit tcp any host 192.168.1.203 eq 7725&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit tcp any host 192.168.1.203 eq 7751&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit tcp any host 192.168.1.203 eq 7752&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit tcp any host 192.168.1.203 eq 7753&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit udp any host 192.168.1.203 eq 7725&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit udp any host 192.168.1.203 eq 7751&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit udp any host 192.168.1.203 eq 7752&amp;nbsp;&lt;BR /&gt;access-list learning_access_in extended permit udp any host 192.168.1.203 eq 7753&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the application is still unable to access desktops using the core application from Inside network to DMZ. I was under the assumption that lower security networks by default would allow higher ones to access the networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description ** Inside Network **&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.254.0&amp;nbsp;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/2.7&lt;BR /&gt;&amp;nbsp;vlan 25&lt;BR /&gt;&amp;nbsp;nameif learning&lt;BR /&gt;&amp;nbsp;security-level 25&lt;BR /&gt;&amp;nbsp;ip address 10.10.10.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp host 192.168.0.25 any eq smtp&amp;nbsp;&lt;BR /&gt;access-list inside extended deny tcp any any eq smtp&amp;nbsp;&lt;BR /&gt;access-list inside remark To allow the website "Timothysmithnetwork.org"&lt;BR /&gt;access-list inside extended permit tcp any host xxx.xxx.xxx.xxx eq www&amp;nbsp;&lt;BR /&gt;access-list inside extended permit ip any any&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765600#M192365</guid>
      <dc:creator>Bobby Mazzotti</dc:creator>
      <dc:date>2019-03-26T00:56:55Z</dc:date>
    </item>
    <item>
      <title>That is correct, until you</title>
      <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765601#M192370</link>
      <description>&lt;P&gt;That is correct, until you put an ACL on it. The traffic will go from the inside to the learning network? or from the Learning network to the inside? or both?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There might be some NAT issues as well, you can try to do a packet tracer to see where the problem is.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input &amp;lt;input src interface ie inside&amp;gt; &amp;lt;tcp/udp&amp;gt; &amp;lt;src host&amp;gt; &amp;lt;dest host&amp;gt; &amp;lt;port&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It should give you something if it is the firewall that is blocking it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 18:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765601#M192370</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-08-26T18:52:17Z</dc:date>
    </item>
    <item>
      <title>I ran packet tracer for the</title>
      <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765602#M192374</link>
      <description>&lt;P&gt;I ran packet tracer for the destined port and received the following -&lt;/P&gt;&lt;P&gt;FW1# packet-tracer input inside tcp 192.168.1.213 7751 10.10.10.34 7751&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 10.10.10.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; learning&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-list inside extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any learning any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1408, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: learning&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 19:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765602#M192374</guid>
      <dc:creator>Bobby Mazzotti</dc:creator>
      <dc:date>2015-08-26T19:06:59Z</dc:date>
    </item>
    <item>
      <title>The security levels only take</title>
      <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765603#M192377</link>
      <description>&lt;P&gt;The security levels only take effect while there are no access-lists assigned to the interface.&amp;nbsp; Once you assign an ACL to an interface it is the ACL that counts and not the security level.&lt;/P&gt;&lt;P&gt;what version of ASA are you running?&amp;nbsp; If you are running a version earlier than 8.2 you may need to either add a NAT exempt statement for the traffic or issue the command &lt;STRONG&gt;no nat-control&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 20:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765603#M192377</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2015-08-26T20:09:49Z</dc:date>
    </item>
    <item>
      <title>Ended up having to place a no</title>
      <link>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765604#M192382</link>
      <description>&lt;P&gt;Ended up having to place a no nat rule -&lt;/P&gt;&lt;P&gt;access-list NO_NAT_LEARNING extended permit ip 192.168.1.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (learning) 0 access-list NO_NAT_LEARNING&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 20:17:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-inside-network-to-subnetwork-dmz/m-p/2765604#M192382</guid>
      <dc:creator>Bobby Mazzotti</dc:creator>
      <dc:date>2015-08-26T20:17:32Z</dc:date>
    </item>
  </channel>
</rss>

