<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sorry, I mixed up the order in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601144#M203850</link>
    <description>&lt;P&gt;Sorry, I mixed up the order of the keywords in the first line. This should work now and the other lines&amp;nbsp;are also not needed:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static INSIDE-HOSTS INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS no-proxy-arp route-lookup
no nat (outside,inside) source static VPN-HOSTS VPN-HOSTS
no nat (outside,outside) source dynamic INSIDE-HOSTS interface
&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Nov 2014 16:16:35 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-11-14T16:16:35Z</dc:date>
    <item>
      <title>How do I allow access over port 80 to webserver in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601139#M203843</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I am fairly new to this level of configuration and was hoping someone would grace me with their knowledge. &amp;nbsp;&lt;/P&gt;&lt;P&gt;My current setup is that I have a webserver (10.1.10.5) in a DMZ with its SQL counterpart on the inside. &amp;nbsp;Traffic is flowing correctly between the two as well as from the DMZ to the internet, however, I cannot access the website on the webserver from the public internet. &amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run canyouseeme.org on the webserver it shows that port 80 is not getting traffic. &amp;nbsp;Any ideas on how to fix my config? &amp;nbsp;I've been /headesk on this one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601139#M203843</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2019-03-12T05:04:42Z</dc:date>
    </item>
    <item>
      <title>You config looks fine. You</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601140#M203844</link>
      <description>&lt;P&gt;You config looks fine. You have a translation for the server and the ACL allows it. You NAT-config seems to be overly complicated but is not the cause of the problem as I see it.&lt;/P&gt;&lt;P&gt;1) Is the Webserver active? Run a "ping tcp 10.1.10.5 80".&lt;/P&gt;&lt;P&gt;2) what is the output of "packet-tracer input outside tcp 1.2.3.4 1234 YOUR-OUTSIDE-IP 80".&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 21:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601140#M203844</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-13T21:54:00Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply Karsten.</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601141#M203845</link>
      <description>&lt;P&gt;Thanks for the reply Karsten.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 - The ping test:&lt;/P&gt;&lt;P&gt;Sending 5 TCP SYN requests to 10.1.10.5 prot 80 from 10.1.10.1, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5)&lt;/P&gt;&lt;P&gt;2 - &lt;FONT color="#000000" face="Courier New, Courier, monospace"&gt;&lt;SPAN style="font-size: 14px; line-height: normal; white-space: pre-wrap;"&gt;Attached&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 22:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601141#M203845</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-13T22:31:57Z</dc:date>
    </item>
    <item>
      <title>I think it really could be a</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601142#M203846</link>
      <description>&lt;P&gt;I think it really could be a NAT-problem.&amp;nbsp;Please change your NAT the following way:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static INSIDE-HOSTS INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS route-lookup no-proxy-arp
no nat (outside,inside) source static VPN-HOSTS VPN-HOSTS
no nat (outside,outside) source dynamic INSIDE-HOSTS interface
no nat (inside,dmz) source static OBJ-10.0.10.0-24 OBJ-10.0.10.0-24

object network obj_any
 no nat (inside,outside) dynamic interface
object network DMZ_outside
 no nat (dmz,outside) dynamic interface

nat (dmz,outside) after-auto source dynamic any interface&lt;/PRE&gt;

&lt;P&gt;These changes shouldn't remove any functionality, but many of the rules are probably not needed as they don't make any sense.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2014 23:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601142#M203846</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-13T23:06:00Z</dc:date>
    </item>
    <item>
      <title>Good morning Karsten,I have</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601143#M203848</link>
      <description>&lt;P&gt;Good morning Karsten,&lt;/P&gt;&lt;P&gt;I have cleaned up the rules as you specified with the exception of below. &amp;nbsp;Since I could not get that command to run I haven't removed the corresponding NAT (I assume your rule combines the two separate rules).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="color:#800000;"&gt;nat (inside,outside) source static INSIDE-HOSTS INSIDE-HOSTS destination static&lt;BR /&gt;VPN-HOSTS VPN-HOSTS route-lookup no-proxy-arp&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm attaching the updated running config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ran the packet sniffer again and attached results.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 16:16:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601143#M203848</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-14T16:16:34Z</dc:date>
    </item>
    <item>
      <title>Sorry, I mixed up the order</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601144#M203850</link>
      <description>&lt;P&gt;Sorry, I mixed up the order of the keywords in the first line. This should work now and the other lines&amp;nbsp;are also not needed:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static INSIDE-HOSTS INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS no-proxy-arp route-lookup
no nat (outside,inside) source static VPN-HOSTS VPN-HOSTS
no nat (outside,outside) source dynamic INSIDE-HOSTS interface
&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 16:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601144#M203850</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-14T16:16:35Z</dc:date>
    </item>
    <item>
      <title>I've applied that - thank you</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601145#M203851</link>
      <description>&lt;P&gt;I've applied that - thank you. &amp;nbsp;The new running config attached. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The webserver is still not playing nice with the outside world. &amp;nbsp;Since the error message on the tracer isn't giving me specifics is it possible I've gotten interfaces mixed up somewhere?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried the following but it was unsuccessful:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#800000;"&gt;ciscoasa(config)# no access-group dmz_acl in interface dmz&lt;BR /&gt;ciscoasa(config)# access-group dmz_acl in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;After looking at this I think the correct form is actually:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#800000;"&gt;access-group outside_acl in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The outside_acl is what contains the rules for the WEBSERVER-TCP80. &amp;nbsp;I removed the dmz_acl. &amp;nbsp;I think it may have been from a prior attempt to get this working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 18:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601145#M203851</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-14T18:53:19Z</dc:date>
    </item>
    <item>
      <title>My latest config is attached.</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601146#M203853</link>
      <description>&lt;P&gt;My latest config is attached...I've been trying various things but have not had any luck thus far. &amp;nbsp;I'm probably going to end up with a lot of junk in there I do not need.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 21:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601146#M203853</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-14T21:25:15Z</dc:date>
    </item>
    <item>
      <title>This is again the initial</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601147#M203854</link>
      <description>&lt;P&gt;This is again the initial config that will cause NAT-problems.&lt;/P&gt;
&lt;P&gt;Here is a cleaned up NAT- and (outside) ACL config which you need for the server and the VPN-communication:&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static INSIDE-HOSTS INSIDE-HOSTS destination static VPN-HOSTS VPN-HOSTS no-proxy-arp route-lookup
!
object network WEBSERVER-TCP80
 nat (dmz,outside) static interface service tcp www www
!
nat (any,outside) after-auto source dynamic any interface
!
access-list outside_acl extended permit tcp any object WEBSERVER-TCP80 eq www
access-group outside_acl in interface outside&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 22:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601147#M203854</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-14T22:29:10Z</dc:date>
    </item>
    <item>
      <title>I removed that extraneous VPN</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601148#M203855</link>
      <description>&lt;P&gt;I removed that extraneous VPN rule as instructed and matched up my config with yours. &amp;nbsp;How else might I track down the point of failure?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your time sir!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 23:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601148#M203855</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-14T23:19:28Z</dc:date>
    </item>
    <item>
      <title>What is the result of the</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601149#M203856</link>
      <description>&lt;P&gt;What is the result of the packet-tracer with that config?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Nov 2014 11:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601149#M203856</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-15T11:19:35Z</dc:date>
    </item>
    <item>
      <title>The new packet sniff results</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601150#M203857</link>
      <description>&lt;P&gt;The new packet sniff results are attached. &amp;nbsp;Still being dropped somewhere. &amp;nbsp;=\&lt;/P&gt;</description>
      <pubDate>Sun, 16 Nov 2014 22:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601150#M203857</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-16T22:10:17Z</dc:date>
    </item>
    <item>
      <title>Additional bit of information</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601151#M203858</link>
      <description>&lt;P&gt;Additional bit of information. &amp;nbsp;I was watching the ASDM log as I attempted to hit the webserver. &amp;nbsp;I got the following message:&lt;/P&gt;&lt;P&gt;TCP access denied by ACL from xx.xx.xx.xx/60382 to outside: xx.xx.xx.xx/80&lt;/P&gt;&lt;P&gt;It shows the destination as the correct IP and the port as the correct port.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 14:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601151#M203858</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-17T14:33:33Z</dc:date>
    </item>
    <item>
      <title>So I was finally able to get</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601152#M203859</link>
      <description>&lt;P&gt;So I was finally able to get it to pass traffic. &amp;nbsp;I had the NAT interfaces backwards.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My rule should have read:&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(245, 249, 237);"&gt;&lt;STRONG style="color: rgb(56, 142, 201);"&gt;object network WEBSERVER-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(245, 249, 237);"&gt;&lt;STRONG style="color: rgb(56, 142, 201);"&gt;host 10.1.10.5&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(245, 249, 237);"&gt;&lt;STRONG style="color: rgb(56, 142, 201);"&gt;nat (DMZ,outside) static interface service tcp www www&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(245, 249, 237);"&gt;My new issue is figuring out why it will not accept the domain address. &amp;nbsp;It only seems to go through if I enter the IP address.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 15:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601152#M203859</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-17T15:09:58Z</dc:date>
    </item>
    <item>
      <title>Where do you want to use a</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601153#M203860</link>
      <description>&lt;P&gt;Where do you want to use a domain-name? In this setup with traffic coming from outside, it will probably not work. If you use an object for your server&amp;nbsp;with a fqdn in the ACL, it has to resolve to the internal IP in the DMZ.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 18:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601153#M203860</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-17T18:54:40Z</dc:date>
    </item>
    <item>
      <title>I'd like users on the Inside</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601154#M203861</link>
      <description>&lt;P&gt;I'd like users on the Inside interface to be able to enter the web address of the webserver application and access it without having to use the internal IP. &amp;nbsp;I may have to accomplish this using an actual DNS server.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 18:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601154#M203861</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-17T18:57:37Z</dc:date>
    </item>
    <item>
      <title>Can you use a dedicated</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601155#M203862</link>
      <description>&lt;P&gt;Can you use a dedicated public IP for the webserver? Then you can tweak the DNS-replys in a form that the ASA changes the public address in a DNS-reply to the actual IP of the server. But that doesn't work if only a port is forwarded. If you can, the translation looks like the following:&lt;/P&gt;

&lt;PRE&gt;
object network WEBSERVER-TCP80
 nat (dmz,outside) static a.b.c.d dns&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other ways are to configure the FQDN in your internal DNS with the private IP, or use destination NAT for the public IP. But that again makes your config more complex and harder to troubleshoot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 20:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601155#M203862</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-17T20:07:38Z</dc:date>
    </item>
    <item>
      <title>Unfortunately I only have the</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601156#M203863</link>
      <description>&lt;P&gt;Unfortunately I only have the 1 static IP address. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would something like this work?&lt;/P&gt;

&lt;PRE style="padding: 5px; border: 0px; font-size: 14px; vertical-align: baseline; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; overflow: auto; width: auto; max-height: 600px; word-wrap: normal; color: rgb(0, 0, 0); line-height: 17.8048000335693px; background: rgb(238, 238, 238);"&gt;
&lt;CODE style="margin: 0px; font-size: 14px; vertical-align: baseline; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; white-space: inherit; background: rgb(238, 238, 238);"&gt;object network internal
 range 192.168.0.1 192.168.0.254
object network external
 host [IP address of your WAN interface]
object network server-internal
 host [server internal IP address]
object network server-external
 host [server external (NATted) IP address]
nat (internal, internal) source static internal external destination static server-external server-internal&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 17 Nov 2014 21:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601156#M203863</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-17T21:24:43Z</dc:date>
    </item>
    <item>
      <title>That goes into the right</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601157#M203864</link>
      <description>&lt;P&gt;That goes into the right direction (if you really want to go that way):&lt;/P&gt;
&lt;P&gt;The destination is changed statically from server-external to server-internal. But you don't have to change the source address. These addresses can be dynamically identity-natted. And if I remember right, the interfaces are (inside,dmz) in this scenario, but I don't remember exactly:&lt;/P&gt;

&lt;PRE&gt;
nat (inside, dmz) source dynamic internal internal destination static server-external server-internal&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Nov 2014 21:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601157#M203864</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-11-17T21:41:47Z</dc:date>
    </item>
    <item>
      <title>This worked :)  I had to</title>
      <link>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601158#M203865</link>
      <description>&lt;P&gt;This worked &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &amp;nbsp;I had to create another rule above it to allow my SQL server to still communicate with the webserver using internal IPs. &amp;nbsp;I'm good with everything else being outside. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks so much for all of your insight. &amp;nbsp;You've been a great help!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 20:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-i-allow-access-over-port-80-to-webserver-in-dmz/m-p/2601158#M203865</guid>
      <dc:creator>alafever1</dc:creator>
      <dc:date>2014-11-18T20:47:32Z</dc:date>
    </item>
  </channel>
</rss>

