<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for correcting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499520#M236203</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Thank you for correcting yourself. You seriously had me confused. Relieved now.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Partly its my fault as I didn't send in all the relevant ACEntries. I do have the first ACL u mentioned in the list. Below is the full list (only relating to the webserver. No ACLs for the inside)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list DMZ_access_in extended permit tcp object GSB_Web_Server any eq https log debugging&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any object GSB_Web_Server eq https log debugging&lt;BR /&gt;access-list outside_access_out extended permit tcp object GSB_Web_Server any eq https log debugging&lt;BR /&gt;access-list outside_access_in extended permit tcp any object GSB_Web_Server eq https log debugging&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now I understand what you mean by my forst ACL is not necessary.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list DMZ_access_in extended permit tcp object GSB_Web_Server any eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN style="font-size:14px;"&gt;If I am access the server from inside I will be allowed. If I am accessing from outside my 4th ACL will permit. I do not need incoming rule fOR DMZ interface as the web server would be access anything. Just annswering requests. Correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Will answer your 3 qs once this is cleared.&lt;/P&gt;&lt;P&gt;Really appreciate your time. Huge help. Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jul 2014 20:09:38 GMT</pubDate>
    <dc:creator>NInja Black</dc:creator>
    <dc:date>2014-07-24T20:09:38Z</dc:date>
    <item>
      <title>DMZ setup. Net from inside?</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499515#M236198</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I was trying to configure a DMZ on our firewall for a webserver.&lt;/P&gt;&lt;P&gt;Our topology is&amp;nbsp; ...&amp;nbsp; Internet &amp;gt; Router 3925 &amp;gt; ASA5525 &amp;gt; Switch(inside LAN)&lt;/P&gt;&lt;P&gt;I have an interface on the ASA connected to the DMZ switch. ASA5525 &amp;gt; DMZ switch &amp;gt; Web server. The ACEs for the DMZ permit only tcp/https traffic.&lt;/P&gt;&lt;P&gt;The NATing is on the router for the WServer access from outside.&lt;/P&gt;&lt;P&gt;Do I need to configure a NAT statement for access from inside? Or the URL (Linked to the public ip address) will work from the inside too?&lt;/P&gt;&lt;P&gt;Hope my question is clear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499515#M236198</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2019-03-12T04:32:06Z</dc:date>
    </item>
    <item>
      <title>What version is your ASA? ..</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499516#M236199</link>
      <description>&lt;P&gt;What version is your ASA? .. If 8.3+, then no need for NATing between inside and DMZ interfaces. Just set the same security levels between the interfaces and issue the "same-security-traffic permit intra-interface". Also, no need to ACLs either. Access is open. Internal users do NOT need to access the web server by its public address if they can access it locally using its private address.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 16:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499516#M236199</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-24T16:53:18Z</dc:date>
    </item>
    <item>
      <title>The ASA version is 9.1. Isn't</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499517#M236200</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;The ASA version is 9.1. Isn't the purpose of the DMZ is to have sec level between 0-100. Mine is set at 50.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Below are the DMZ int ACL enteries.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list DMZ_access_in extended permit tcp object WebServer any eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-list DMZ_access_out extended permit tcp any object WebServer eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-group DMZ_access_in in interface DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;access-group DMZ_access_out out interface DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;We have internal access to the server to its other NIC. But how do we access the URL from inside. (As URL is associated to the public ip). My understanding is when trying to access the URL from inside, the traffic passes through the ASA to the router, detects the NAT entry and then router sends it back to the ASA and the ASA forwards it to the DMZ int. Is this correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 18:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499517#M236200</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-24T18:51:50Z</dc:date>
    </item>
    <item>
      <title>Hi,First, both of your access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499518#M236201</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;First, both of your access lists are not correct. Because you want your web server to be accessed by the public, you must modify the first ACL so that the web server is the destination (not the source). Source should be ANY. The second ACL is not important at all and doesn't accomplish anything. It is even not recommended to use the "out" keyword in your access group command.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;access-list DMZ_access_in extended permit tcp any&amp;nbsp;object WebServer eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I believe you must have a different local URL for the web server. Refer to the DNS server and check for A (host) record for your web server. Your scenario can work ONLY if you implement a feature in the ASA called "DNS Rewrite" and if the ASA does the NATing not the router.&lt;/P&gt;&lt;P&gt;Beginning from 8.3, NAT is no longer forced as in previous versions. So, you can set both the inside and DMZ interfaces to be 50 and you can access both resource without NATing and ACLs.&lt;/P&gt;&lt;P&gt;My questions to you:&lt;/P&gt;&lt;P&gt;1) Why wouldn't you do the NATing in the ASA? why the router?&lt;/P&gt;&lt;P&gt;2) I am not sure what is the problem exactly. Is it just URL internal access issue ?&lt;/P&gt;&lt;P&gt;3) Is it outside access issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 19:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499518#M236201</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-24T19:20:14Z</dc:date>
    </item>
    <item>
      <title>Sorry i made a mistake here.</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499519#M236202</link>
      <description>&lt;P&gt;Sorry i made a mistake here. Let me rephrase the first ACL issue.&lt;/P&gt;&lt;P&gt;Because you want your web server to be accessed by the public, you have two ways:&lt;/P&gt;&lt;P&gt;- Use Outside ACL Inbound:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;access-list Outside_access_in extended permit tcp any&amp;nbsp;object WebServer eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;- Use DMZ ACL Outbound: (your 2nd ACL is correct in this case)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px"&gt;access-list DMZ_access_out extended permit tcp any object WebServer eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I prefer the first method because your limiting your web server access to the outside ONLY. The second method is allowing everybody to access the web server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 19:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499519#M236202</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-24T19:29:26Z</dc:date>
    </item>
    <item>
      <title>Thank you for correcting</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499520#M236203</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Thank you for correcting yourself. You seriously had me confused. Relieved now.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Partly its my fault as I didn't send in all the relevant ACEntries. I do have the first ACL u mentioned in the list. Below is the full list (only relating to the webserver. No ACLs for the inside)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list DMZ_access_in extended permit tcp object GSB_Web_Server any eq https log debugging&lt;BR /&gt;access-list DMZ_access_out extended permit tcp any object GSB_Web_Server eq https log debugging&lt;BR /&gt;access-list outside_access_out extended permit tcp object GSB_Web_Server any eq https log debugging&lt;BR /&gt;access-list outside_access_in extended permit tcp any object GSB_Web_Server eq https log debugging&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group DMZ_access_out out interface DMZ&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now I understand what you mean by my forst ACL is not necessary.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list DMZ_access_in extended permit tcp object GSB_Web_Server any eq https log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN style="font-size:14px;"&gt;If I am access the server from inside I will be allowed. If I am accessing from outside my 4th ACL will permit. I do not need incoming rule fOR DMZ interface as the web server would be access anything. Just annswering requests. Correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Will answer your 3 qs once this is cleared.&lt;/P&gt;&lt;P&gt;Really appreciate your time. Huge help. Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 20:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499520#M236203</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-24T20:09:38Z</dc:date>
    </item>
    <item>
      <title>Ok, let us analyze your ACLs</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499521#M236204</link>
      <description>&lt;P&gt;Ok, let us analyze your ACLs one by one to clear any confusion.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:12px"&gt;access-list DMZ_access_in extended permit tcp object GSB_Web_Server any eq https log debugging&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px"&gt;As you said, you will not need this entry since you don't want the web server itself to access anything. The purpose is to be accessed.&lt;/SPAN&gt; &lt;SPAN style="font-size:12px;"&gt;However, you may need the web server to access, for example, the internet for online updates.&lt;/SPAN&gt; &lt;SPAN style="font-size:12px;"&gt;But i would recommend to push updates locally from an internal update server.&lt;/SPAN&gt; (Result: Not Necessary)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:12px"&gt;access-list DMZ_access_out extended permit tcp any object GSB_Web_Server eq https log debugging&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;This is not necessary as the below entry accomplishes the same goal.The difference is the below entry limits the access to the outside world only. You can keep it ONLY if you want also internal users to access the web server as well. In this case, you don't need the below entry.&lt;/SPAN&gt; (Result: Necessary only if you want the web server to be accessed by both outside and inside users)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:12px"&gt;access-list outside_access_in extended permit tcp any object GSB_Web_Server eq https log debugging&lt;/SPAN&gt;&lt;/STRONG&gt; (Result: Necessary only if you want the web server to be accessed by outside users only)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:12px"&gt;access-list outside_access_out extended permit tcp object GSB_Web_Server any eq https log debugging&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;This is not necessary at all and must be removed.&lt;/SPAN&gt; (Result: Not Necessary)&lt;/P&gt;&lt;P&gt;As you can see, you only need the necessary ACL that i mentioned in order to let the outside users access the web server.&lt;/P&gt;&lt;P&gt;Keep in mind that traffic and interface directions are very critical and they differ. The "out" keyword is rarely used and creates more confusion. You should only focus with the "in" keyword. If you still don't understand what i clarified, i suggest to read more about traffic and ACL directions in ASA.&lt;/P&gt;&lt;P&gt;Also, same security levels (inside and DMZ interfaces) minimizes the need for ACLs and NAT. However, ACLs and NAT are still needed for outside interface. The NATing also should be in the ASA.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2014 20:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499521#M236204</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-24T20:59:42Z</dc:date>
    </item>
    <item>
      <title>Hey, I went through what you</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499522#M236205</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I went through what you explained and it totally made sense. I made the appropriate changes and the DMZ is set up and working as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!!!&lt;/P&gt;&lt;P&gt;Also regarding NATing at the router, thats how it was setup from before. Will look into it and make changes if necessary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I really appreciate your time and the detailed explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jul 2014 02:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499522#M236205</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-27T02:22:40Z</dc:date>
    </item>
    <item>
      <title>Great !! Very glad it works</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499523#M236206</link>
      <description>&lt;P&gt;Great !! very glad it works.&lt;/P&gt;&lt;P&gt;You can use packet tracer to test your directions.&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp src_ip src_port dest_ip dest_port&lt;/P&gt;&lt;P&gt;The output is shown in phases and result of each phase. If all results in all phases is "ALLOW", then everything works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jul 2014 08:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499523#M236206</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-27T08:19:46Z</dc:date>
    </item>
    <item>
      <title>Hey. Had a question regarding</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499524#M236207</link>
      <description>&lt;P&gt;Hey.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had a question regarding putting both the DMZ and the inside on same securit level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Isn't it vulnerable to spoofing attacks. If anyone spoofs the webserver IP they will have access to the inside.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2014 15:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499524#M236207</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-28T15:05:46Z</dc:date>
    </item>
    <item>
      <title>Hi,There is a default</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499525#M236208</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;There is a default functionality in ASA called "uRPF" stands for Unicast Reverse Path Forwarding. When a source traffic comes in and hit, lets say, the inside interface, the ASA checks the IP of the sender. If the IP belongs to other interfaces (DMZ or Outside), it knows that it is a spoofed address, RPF test fails, and it drops the traffic. If the IP does NOT belong to other interfaces, it knows that it is valid and forward the traffic to other processes such as ACL lookup, NAT lookup, inspection engines,...etc. So, even if there are same security interfaces, traffic cannot be spoofed easily because of the uRPF feature. This feature, actually, does its job by using the route table.&lt;/P&gt;&lt;P&gt;This RPF is part of "Initial Checking" process, in which the ASA does an initial traffic checking for spoofed senders. The beauty is that, this process is done early in the game before any ACL or address translations lookups, thus saving firewall resources. You don't want the firewall to detect spoofers late in the game after consuming unnecessary resources caused by this spoofed traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2014 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499525#M236208</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-28T16:44:41Z</dc:date>
    </item>
    <item>
      <title>Sorry, i made a minor mistake</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499526#M236209</link>
      <description>&lt;P&gt;Sorry, i made a minor mistake. This feature is not by default enabled in the ASA. You have to enable it for each interface by using the below command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip verify reverse-path interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jul 2014 16:48:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499526#M236209</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-28T16:48:44Z</dc:date>
    </item>
    <item>
      <title>AM. You are awesome!!!Will</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499527#M236210</link>
      <description>&lt;P&gt;AM. You are awesome!!!&lt;/P&gt;&lt;P&gt;Will look into this. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 01:35:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499527#M236210</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-29T01:35:27Z</dc:date>
    </item>
    <item>
      <title>Thank you. :-) I am just</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499528#M236211</link>
      <description>&lt;P&gt;Thank you. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I am just trying to help.&lt;/P&gt;&lt;P&gt;Please feel free to ask any question at any time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 03:16:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499528#M236211</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-29T03:16:26Z</dc:date>
    </item>
    <item>
      <title>Actually I do have a question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499529#M236212</link>
      <description>&lt;P&gt;Actually I do have a question about EHWIC replacement for a switch.&lt;/P&gt;&lt;P&gt;Currently we have Cisco ISR router connecting to a switch for ASA failover.&lt;/P&gt;&lt;P&gt;I want to replace the switch with a EHWIC 4ESG module on the router.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 05:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499529#M236212</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-29T05:19:30Z</dc:date>
    </item>
    <item>
      <title>Hi,I recommend to post this</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499530#M236213</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I recommend to post this issue in the 'WAN, Routing and Switching' topic in the 'Network Infrastructure' section.&lt;/P&gt;&lt;P&gt;I am really sorry but i can't help you with this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 05:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499530#M236213</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2014-07-29T05:19:31Z</dc:date>
    </item>
    <item>
      <title>No problem AM. Thanks again</title>
      <link>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499531#M236214</link>
      <description>&lt;P&gt;No problem AM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for the DMZ issue. Big help!!!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 15:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-setup-net-from-inside/m-p/2499531#M236214</guid>
      <dc:creator>NInja Black</dc:creator>
      <dc:date>2014-07-29T15:19:53Z</dc:date>
    </item>
  </channel>
</rss>

