<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5506 DMZ setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928905#M24478</link>
    <description>&lt;P&gt;Are the other interfaces (voice) and&amp;nbsp;(INTERNAL) linked to this same switch?&lt;/P&gt;&lt;P&gt;Can a host on those ^^ networks ping the ASA interface?&lt;/P&gt;&lt;P&gt;Is there a Default-gateway set on the switch?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2019 19:45:21 GMT</pubDate>
    <dc:creator>Network Keith</dc:creator>
    <dc:date>2019-09-23T19:45:21Z</dc:date>
    <item>
      <title>Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927648#M24408</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am trying to setup a DMZ for a ASA 5506. At the moment we have 3 interfaces active on the ASA which are:&lt;/P&gt;&lt;P&gt;gi1/1 outside&lt;/P&gt;&lt;P&gt;gi1/2 inside&lt;/P&gt;&lt;P&gt;gi1/3 Voice&lt;/P&gt;&lt;P&gt;Voice has an internal ip with a pat on the outside interface with a public ip address from our range.&lt;/P&gt;&lt;P&gt;Now I want to setup the DMZ on gi1/4 also with a pat on the outside interface with a public ip address.&lt;/P&gt;&lt;P&gt;Have setup the interface with a internal ip address and connected a test pc on that interface with an ip address on the same range and as gateway the gi1/4 interface on the ASA. That should at least give me internet access. But that is not the case. Have followed a lot of configuration examples on the internet with google but all have failed to give me even internet access.&lt;/P&gt;&lt;P&gt;Hope you guys can help me out.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 14:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927648#M24408</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-20T14:57:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927676#M24409</link>
      <description>&lt;P&gt;&amp;nbsp;2 example threads help you here :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firewalls/asa-nat-for-dmz-public-ip/m-p/3875511" target="_blank"&gt;https://community.cisco.com/t5/firewalls/asa-nat-for-dmz-public-ip/m-p/3875511&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firewalls/cisco-asa-5505-dmz-setup/m-p/2202705" target="_blank"&gt;https://community.cisco.com/t5/firewalls/cisco-asa-5505-dmz-setup/m-p/2202705&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still you have issue, we would like to see your configuration to asists better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 15:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927676#M24409</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-20T15:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927706#M24465</link>
      <description>I totally agree with expert BB.&lt;BR /&gt;I would like to know few things.&lt;BR /&gt;Have you configured interface withe necessary nameif and security level.&lt;BR /&gt;Have you configured NAT rule to allow DMZ internet access&lt;BR /&gt;Have you configured PAT to allow server access from outside.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 20 Sep 2019 16:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927706#M24465</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-20T16:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927786#M24467</link>
      <description>&lt;P&gt;Thanks for the links BB, I did follow those links but still not working.&lt;/P&gt;&lt;P&gt;I included our config in this post&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 18:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927786#M24467</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-20T18:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927893#M24468</link>
      <description>&lt;DIV&gt;The configuration looks good to allow internet for DMZ host. Few points.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;Please double check your DMZ host configuration like IP, Subnet, Default Gateway, DNS.&lt;/LI&gt;&lt;LI&gt;Run packet tracer to see if ASA is dropping the packet, and for what reason. (ref:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;packet-tracer input Dmz tcp 192.168.17.10 80 8.8.8.8 80 detailed (You can run from ASDM)&lt;/LI&gt;&lt;LI&gt;If Packet tracer is fine. See your request from DMZ host is reaching the ASA by looking at the logging. (ASDM Monitor Live Logs)&lt;/LI&gt;&lt;LI&gt;If you see requests are coming in and ASA is allowing the traffic also look for the return traffic hitting the ASA.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Try the NAT rule for DMZ on the OUTSIDE interface rather than particular IP, This is just to test out as sometime ARP can cause issue. (ARP for your DMZ MAPPED IP&amp;nbsp;188.202.95.227)&lt;/LI&gt;&lt;/UL&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Please revert with the output of above. which will be helpful for us to visualise it better.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;HTH&lt;/DIV&gt;</description>
      <pubDate>Sat, 21 Sep 2019 04:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3927893#M24468</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-21T04:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928021#M24469</link>
      <description>&lt;P&gt;I’m no expert but I do have several ASAs in production and looking at your config it looks to me like your NAT statement is incomplete.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You’re missing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.17.0 255.355.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or wherever you’re trying to PAT the DMZ traffic to.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2019 01:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928021#M24469</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-09-22T01:03:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928351#M24470</link>
      <description>&lt;P&gt;Hello bhargavdesia,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the output for you questions:&lt;/P&gt;&lt;P&gt;- DMZ host configuration is:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; IP: 192.168.17.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; GW: 192.168.17.254 (interface Gi1/4 on the ASA)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; DNS: 8.8.8.8&lt;/P&gt;&lt;P&gt;- output from ASA packet tracer:&lt;/P&gt;&lt;P&gt;fw01# packet-tracer input Dmz tcp 192.168.17.10 80 8.8.8.8 80 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 188.202.95.225 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group ACL-dmz in interface Dmz&lt;BR /&gt;access-list ACL-dmz extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac36d7220, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x2aaabb803580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Dmz,outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.17.10/80 to 188.202.95.230/80&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac36d9e60, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x2aaac34df320, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Dmz, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1c94360, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=63322227, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac31ba780, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=590, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map global-traffic-shaping-class&lt;BR /&gt;description *** Default KPN traffic-shaping policy (90% of the capacity)&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class global-traffic-shaping-class&lt;BR /&gt;police input 28311500 15728&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac36d3090, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=591, user_data=0x2aaac36d2be0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Dmz,outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaac33cf0e0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x2aaac18a38d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Dmz, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map global-traffic-shaping-class&lt;BR /&gt;description *** Default KPN traffic-shaping policy (90% of the capacity)&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class global-traffic-shaping-class&lt;BR /&gt;police input 28311500 15728&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac3413be0, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=52095847, user_data=0x2aaac33d0560, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1c94360, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=63322229, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2676330, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=40789894, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 43812321, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;- Request from host is not reaching the ASA, link is up and the DMZ host is directly connected to the ASA on interface 1/4, also checked all cables and these are fine.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 14:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928351#M24470</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T14:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928518#M24472</link>
      <description>&lt;P&gt;I may have overlooked it, but I did not see an access-group for DMZ, can you confirm?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 12:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928518#M24472</guid>
      <dc:creator>Network Keith</dc:creator>
      <dc:date>2019-09-23T12:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928594#M24474</link>
      <description>&lt;P&gt;Hello Keith,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes Access-group is configured:&lt;/P&gt;&lt;P&gt;fw01# sh run access-group&lt;BR /&gt;access-group ACL-outside in interface outside&lt;BR /&gt;access-group ACL-inside in interface inside&lt;BR /&gt;access-group ACL-voice in interface Voice&lt;BR /&gt;access-group ACL-dmz in interface Dmz&lt;BR /&gt;fw01#&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 14:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928594#M24474</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T14:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928603#M24475</link>
      <description>&lt;P&gt;Cleaned the config a bit up and have made some changes.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 14:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928603#M24475</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T14:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928613#M24476</link>
      <description>This means that we have issue at layer 1 or 2.&lt;BR /&gt;Packet tracer shows packet is allowed. So internet will be available once we solve the issue at below layers.&lt;BR /&gt;Can you check that ASA can ping Host and Host can ping ASA.&lt;BR /&gt;You can check arp entry as well.&lt;BR /&gt;Sometimes arp cache can also be a problem.&lt;BR /&gt;See if proxy arp is not creating problem.&lt;BR /&gt;&lt;BR /&gt;I would say you should get the reachability to ASA and then think about issue with ASA NAT and ACL configuration.&lt;BR /&gt;&lt;BR /&gt;Can you look all this and confirm.&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 23 Sep 2019 14:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928613#M24476</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-23T14:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928858#M24477</link>
      <description>&lt;P&gt;Host can not ping ASA and ASA can not ping host. In Arp table no entry for the host. Checked the cabels and host with a connection on a L2 Switch and that is working. Host could ping the Switch and the Switch could ping the host. Arp proxy is enabled on the interface but after setting it to no proxy-arp it still did not show up in the arp table and the host still could not ping the ASA. Am a little stumped at this. Normaly putting a device directly on an interface it shows up in the arp table of the ASA. Routing table on the ASA is showing the interface as a connected route.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 19:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928858#M24477</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T19:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928905#M24478</link>
      <description>&lt;P&gt;Are the other interfaces (voice) and&amp;nbsp;(INTERNAL) linked to this same switch?&lt;/P&gt;&lt;P&gt;Can a host on those ^^ networks ping the ASA interface?&lt;/P&gt;&lt;P&gt;Is there a Default-gateway set on the switch?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 19:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928905#M24478</guid>
      <dc:creator>Network Keith</dc:creator>
      <dc:date>2019-09-23T19:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928926#M24479</link>
      <description>&lt;P&gt;No, the inside is on a L3 switch and has their GW on vlan1 which is 192.168.16.200, that switch has a route to his interface on the ASA which is 192.168.16.254 as default route. The voice network is connected on a unmanaged 1 GB switch and all devices have their GW on the ASA which is 192.168.15.254. On the L3 switch I can ping the interface on the ASA for the inside network. The voice network have only VOIP devices which connect to the cloud Phone solution and they are all working normaly. For the DMZ I was planning to connect the inside switch with a seperate vlan but from that vlan I can not ping the ASA interface which is on 192.168.17.254 so for troubleshooting I put the server straight on the ASA interface and had the server GW point to 192.168.17.254 but that is not working also.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 20:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928926#M24479</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T20:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928945#M24480</link>
      <description>&lt;P&gt;OK, Setup a constant ping to the asa from the host,&lt;/P&gt;&lt;P&gt;On the asa run&amp;nbsp;debug icmp trace 7...... See if you see the host listed.&lt;/P&gt;&lt;P&gt;Also check&amp;nbsp;the following:&lt;/P&gt;&lt;P&gt;sho logging asdm&lt;/P&gt;&lt;P&gt;Show conn address (Host IP)&lt;/P&gt;&lt;P&gt;See if any of this can help you pinpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 20:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928945#M24480</guid>
      <dc:creator>Network Keith</dc:creator>
      <dc:date>2019-09-23T20:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928964#M24481</link>
      <description>&lt;P&gt;Host is not coming up on the debug icmp trace 7. Also on the logging he is not showing up. show conn address 192.168.17.1 gives no repons. Seems like there is no network connection at all.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 21:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3928964#M24481</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-23T21:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929095#M24482</link>
      <description>&lt;P&gt;Although, I have not looked at your updated configuration, the first configuration you post was fine as we are able to run the packet tracer successfully.&lt;/P&gt;&lt;P&gt;I clearly told you that you need to solve the problem at Layer 1, Layer 2 as our DMZ host is not able to reach DMZ interface on ASA. Just think about this, How could ASA do anything with the packet without receiving it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With all due respect, to clarify some points discussed here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By default, ASA will allow all communication (TCP/UDP) from high security level (in your case DMZ with security level 20) going out to low security level (in your case OUTSIDE with security level 0). So&amp;nbsp;There is no access-list or access-group configuration required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You already had NAT statement. This is Manual NAT statement.&lt;/P&gt;&lt;PRE&gt;nat (DMZ,outside) source dynamic any OBJ-NET-188.202.95.227&lt;/PRE&gt;&lt;P&gt;So you don't need AUTO NAT configuration.&lt;/P&gt;&lt;PRE&gt;object network DMZ
subnet 192.168.17.0 255.355.255.0
nat (dmz,outside) dynamic interface&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Now back to your issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I would say please check if ASA can ping its own DMZ interface IP 192.168.17.254 to make sure the interface is up up.&lt;/LI&gt;&lt;LI&gt;Have you checked with a Laptop by direct connecting to DMZ. (not the server, just to check out.)&lt;/LI&gt;&lt;LI&gt;When you connected DMZ Server and DMZ interface to a managed switch, did you see MAC address entry on the port and arp entry if in layer 3 mode.&lt;/LI&gt;&lt;LI&gt;Change the Cable (MIDI and MIDI-X the old concept consideration)and also try to check speed duplex.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;I would urge you to not change any ASA configuration other than DMZ interface level configuration to establish layer 1, layer 2 connectivity to ASA. Our first target should be to establish communication between DMZ host and DMZ interface on ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 05:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929095#M24482</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-24T05:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929173#M24483</link>
      <description>&lt;P&gt;Thanks for the reply bhargavdesai,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will remove the auto NAT statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About your questions:&lt;/P&gt;&lt;P&gt;- Yes the ASA can ping the dmz interface&lt;/P&gt;&lt;P&gt;- Checked it with a server and a laptop connected directly on the interface both give the same result&lt;/P&gt;&lt;P&gt;- Yes on the layer 3 switch I see a mac entry for the server/laptop but the ASA interface is not visible on the switch port or in the arp table.&lt;/P&gt;&lt;P&gt;- Change out the cables and set the speed duplex from auto to 1000 full still no result.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 08:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929173#M24483</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-24T08:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929283#M24484</link>
      <description>So to conclude on your setup, you have a connection as below.&lt;BR /&gt;&lt;BR /&gt;DMZ HOST/LAPTOP &amp;gt;&amp;gt;&amp;gt;&amp;gt; L2/L3 SWITCH &amp;gt;&amp;gt;&amp;gt;&amp;gt; Cisco ASA DMZ Interface&lt;BR /&gt;&lt;BR /&gt;Connection between Switch and ASA is focus point.&lt;BR /&gt;&lt;BR /&gt;Do you see light on Switch and ASA DMZ interface?&lt;BR /&gt;Do ports on ASA and Switch show UP?&lt;BR /&gt;Do Cisco ASA DMZ interface and DMZ host/Laptop connect to same VLAN?&lt;BR /&gt;&lt;BR /&gt;I am ready to help your remotely, if you are ready for the same personal message me, this will reduce time and effort in troubleshooting.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;BR /&gt;</description>
      <pubDate>Tue, 24 Sep 2019 10:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929283#M24484</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-24T10:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506 DMZ setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929311#M24485</link>
      <description>&lt;P&gt;Hello bhargavdesai,&lt;/P&gt;&lt;P&gt;No at the moment the setup is DMZ HOST/LAPTOP &amp;gt;&amp;gt;&amp;gt; Cisco ASA DMZ Interface&lt;/P&gt;&lt;P&gt;I see light on the ASA interface and on the network card of the DMZ host&lt;/P&gt;&lt;P&gt;The interface on the ASA is showing up and the network Card on the DMZ host is showing connected&lt;/P&gt;&lt;P&gt;Host and ASA share the same network without a switch between them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment I am not on location but I will be tomorrow, if you could assist remotely that would be great.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 11:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-dmz-setup/m-p/3929311#M24485</guid>
      <dc:creator>HarrydenOuden7643</dc:creator>
      <dc:date>2019-09-24T11:32:13Z</dc:date>
    </item>
  </channel>
</rss>

