<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Instead of NATing to the DMZ, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619723#M195772</link>
    <description>&lt;P&gt;Instead of NATing to the DMZ, you could also configure NAT-Exemption for the traffic from inside to DMZ:&lt;/P&gt;

&lt;PRE&gt;
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.10.0 255.255.255.0&lt;/PRE&gt;

&lt;P&gt;With that, your DMZ-systems see the real IPs of your inside hosts. That's what I prefer for internal communication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 22 Mar 2015 01:02:02 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2015-03-22T01:02:02Z</dc:date>
    <item>
      <title>Manage hosts on DMZ from Inside network</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619718#M195763</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've setup a ASA5505 with basic license running version 8.2 using all 3 interfaces, outside, inside, and the dmz. All is working as it should with the inside and dmz interfaces being able to access the outside and get to the internet.&lt;/P&gt;&lt;P&gt;The issue i'm having is being able to ping or manage any devices from the inside network to any devices on the dmz. Being that the inside has a higher security level, I thought that it would communicate with the dmz at a lower security level.&lt;/P&gt;&lt;P&gt;I'm obviously missing something and more configuration is needed. I've tried several suggestions with nat and static nat but still not working.&lt;/P&gt;&lt;P&gt;I have uploaded my config. Any help on this issue would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619718#M195763</guid>
      <dc:creator>razorbakill</dc:creator>
      <dc:date>2019-03-12T05:40:35Z</dc:date>
    </item>
    <item>
      <title>With the base license you can</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619719#M195766</link>
      <description>&lt;P&gt;With the base license you can't do this.&lt;/P&gt;&lt;P&gt;Notice this command under your DMZ interface -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no forward interface Vlan1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;this is a restriction with the license you have. Your DMZ is only allowed to talk to one other interface and naturally you want that to be the outside interface.&lt;/P&gt;&lt;P&gt;You would need a license upgrade to be able to communicate between all interfaces.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 21 Mar 2015 13:12:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619719#M195766</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-21T13:12:32Z</dc:date>
    </item>
    <item>
      <title>I was under the impression</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619720#M195769</link>
      <description>&lt;P&gt;I was under the impression that the "no forward interface vlan1" on the DMZ interface was so the DMZ could not initiate communication to the inside network. I'm trying to have the inside interface initiate the communication to the DMZ network, which would then reply to the inside network.&lt;/P&gt;&lt;P&gt;So for instance if I had a web server on the DMZ network, should it not be that any device on the inside network could initiate communication to the web server in the DMZ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Mar 2015 15:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619720#M195769</guid>
      <dc:creator>razorbakill</dc:creator>
      <dc:date>2015-03-21T15:09:54Z</dc:date>
    </item>
    <item>
      <title>I was under the impression</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619721#M195770</link>
      <description>&lt;P&gt;&lt;EM&gt;I was under the impression that the "no forward interface vlan1" on the DMZ interface was so the DMZ could not initiate communication to the inside network.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;My apologies, I think I gave you incorrect information and your understanding is correct.&lt;/P&gt;&lt;P&gt;Can you add this to your configuration and try again -&lt;/P&gt;&lt;P&gt;"global (DMZ) 1 interface"&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 21 Mar 2015 15:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619721#M195770</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-21T15:17:59Z</dc:date>
    </item>
    <item>
      <title>That did it! Thanks so much</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619722#M195771</link>
      <description>&lt;P&gt;That did it! Thanks so much for your for your help Jon. It is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Mar 2015 16:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619722#M195771</guid>
      <dc:creator>razorbakill</dc:creator>
      <dc:date>2015-03-21T16:19:42Z</dc:date>
    </item>
    <item>
      <title>Instead of NATing to the DMZ,</title>
      <link>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619723#M195772</link>
      <description>&lt;P&gt;Instead of NATing to the DMZ, you could also configure NAT-Exemption for the traffic from inside to DMZ:&lt;/P&gt;

&lt;PRE&gt;
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.10.0 255.255.255.0&lt;/PRE&gt;

&lt;P&gt;With that, your DMZ-systems see the real IPs of your inside hosts. That's what I prefer for internal communication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2015 01:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/manage-hosts-on-dmz-from-inside-network/m-p/2619723#M195772</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-03-22T01:02:02Z</dc:date>
    </item>
  </channel>
</rss>

