<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.0(3) - host in DMZ to access internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435670#M267395</link>
    <description>&lt;P&gt;hi everyone,&lt;/P&gt;&lt;P&gt;I'm running into an odd situation with DMZ config on 9.0(3). I manage to get it to work with an ANY statement, but i hate that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So below is how my current traffic is&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;INSIDE--------------------------&amp;gt; DMZ --------nat--------&amp;gt;OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.3.4/24 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;192.168.1.55 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;x.x.x.55&lt;/P&gt;&lt;P&gt;Right now 192.168.1.55 (DMZ) can reach both inside and outside perfectly fine. However, because i use an ANY statement, the host in DMZ is actually able to reach the entire INSIDE subnet. I don't want that. I just want it to be able to reach 192.168.3.4 only.&lt;/P&gt;&lt;P&gt;Below is my config (i remove lines that are unneccessary)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel1.102&lt;BR /&gt;&amp;nbsp;vlan 102&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 66.111.20.252 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel3.7&lt;BR /&gt;&amp;nbsp;vlan 7&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.251 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel5&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.250 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network Internal-LAN2_Network&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Hieu-DMZ-Laptop&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.1.55&lt;/P&gt;&lt;P&gt;object network DMZ_Network&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Hieu-WAN-Laptop&lt;BR /&gt;&amp;nbsp;host 66.111.20.55&lt;BR /&gt;object network CORE-Management-VLAN2&lt;BR /&gt;&amp;nbsp;host 192.168.3.4&lt;BR /&gt;object network WAN_Network&lt;BR /&gt;&amp;nbsp;subnet 66.111.20.0 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip object Hieu-DMZ-Laptop object CORE-Management-VLAN2&lt;BR /&gt;access-list dmz_access_in extended permit ip object Hieu-DMZ-Laptop &lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit ip any object Hieu-DMZ-Laptop&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network Internal-LAN2_Network&lt;BR /&gt;&amp;nbsp;nat (inside,dmz) static Internal-LAN2_Network&lt;BR /&gt;object network Hieu-DMZ-Laptop&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static Hieu-WAN-Laptop&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface description INSIDE_OUTBOUND_NAT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.115.229.1 1&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:06:09 GMT</pubDate>
    <dc:creator>HIeu Phan</dc:creator>
    <dc:date>2019-03-12T04:06:09Z</dc:date>
    <item>
      <title>ASA 9.0(3) - host in DMZ to access internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435670#M267395</link>
      <description>&lt;P&gt;hi everyone,&lt;/P&gt;&lt;P&gt;I'm running into an odd situation with DMZ config on 9.0(3). I manage to get it to work with an ANY statement, but i hate that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So below is how my current traffic is&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;INSIDE--------------------------&amp;gt; DMZ --------nat--------&amp;gt;OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 192.168.3.4/24 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;192.168.1.55 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;x.x.x.55&lt;/P&gt;&lt;P&gt;Right now 192.168.1.55 (DMZ) can reach both inside and outside perfectly fine. However, because i use an ANY statement, the host in DMZ is actually able to reach the entire INSIDE subnet. I don't want that. I just want it to be able to reach 192.168.3.4 only.&lt;/P&gt;&lt;P&gt;Below is my config (i remove lines that are unneccessary)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Port-channel1.102&lt;BR /&gt;&amp;nbsp;vlan 102&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 66.111.20.252 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel3.7&lt;BR /&gt;&amp;nbsp;vlan 7&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.251 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel5&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.250 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network Internal-LAN2_Network&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Hieu-DMZ-Laptop&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.1.55&lt;/P&gt;&lt;P&gt;object network DMZ_Network&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Hieu-WAN-Laptop&lt;BR /&gt;&amp;nbsp;host 66.111.20.55&lt;BR /&gt;object network CORE-Management-VLAN2&lt;BR /&gt;&amp;nbsp;host 192.168.3.4&lt;BR /&gt;object network WAN_Network&lt;BR /&gt;&amp;nbsp;subnet 66.111.20.0 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip object Hieu-DMZ-Laptop object CORE-Management-VLAN2&lt;BR /&gt;access-list dmz_access_in extended permit ip object Hieu-DMZ-Laptop &lt;SPAN style="color:#FF0000;"&gt;&lt;STRONG&gt;any&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;access-list outside_access_in extended permit ip any object Hieu-DMZ-Laptop&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;object network Internal-LAN2_Network&lt;BR /&gt;&amp;nbsp;nat (inside,dmz) static Internal-LAN2_Network&lt;BR /&gt;object network Hieu-DMZ-Laptop&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static Hieu-WAN-Laptop&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface description INSIDE_OUTBOUND_NAT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.115.229.1 1&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435670#M267395</guid>
      <dc:creator>HIeu Phan</dc:creator>
      <dc:date>2019-03-12T04:06:09Z</dc:date>
    </item>
    <item>
      <title>Hello oldstu12a4,The</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435671#M267397</link>
      <description>&lt;P&gt;Hello &lt;SPAN class="fullname" itemprop="author"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/oldstu12a4" title="View user profile."&gt;oldstu12a4,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The situation is that as you know the firewall needs an access-list to permit traffic that comes from a lower security level to a higher one. Once you create the inbound access list on the DMZ to permit the specific host on the inside if you don't permit traffic from the source to any you are going to lost connectivity to the internet.&lt;/P&gt;&lt;P&gt;The way to work this is to use the access-list to permit what you need and then deny what you don't using the hierarchical properties of the acl.&lt;/P&gt;&lt;P&gt;It goes something like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 66.111.20.252 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.251 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.250 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;First you permit from DMZ to inside (lower to higher)&lt;/P&gt;&lt;P&gt;EX:&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip object Hieu-DMZ-Laptop object CORE-Management-VLAN2---&amp;gt;with this one you include what you need to allow.&lt;BR /&gt;access-list dmz_access_in deny ip any 192.168.3.0 255.255.255.0----&amp;gt; on this one you deny access to the inside network.&lt;BR /&gt;access-list dmz_access_in permit 192.168.1.0 255.255.255.0 any -----&amp;gt;With this one you permit access from the DMZ range to the internet.&lt;/P&gt;&lt;P&gt;****Please review this configuration and let me know if you have any question. Its very important that you feel comfortable and analyze the variables as this could block the access to host to needed resources if we are not careful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 03:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435671#M267397</guid>
      <dc:creator>joseoroz</dc:creator>
      <dc:date>2014-04-25T03:54:28Z</dc:date>
    </item>
    <item>
      <title>Thank you Jose!I actually</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435672#M267399</link>
      <description>&lt;P&gt;Thank you Jose!&lt;/P&gt;&lt;P&gt;I actually create a rule pretty similar to what you stated.&lt;/P&gt;&lt;P&gt;Things are working really good now.&lt;/P&gt;&lt;P&gt;Thank you for your help&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2014 20:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-0-3-host-in-dmz-to-access-internet/m-p/2435672#M267399</guid>
      <dc:creator>HIeu Phan</dc:creator>
      <dc:date>2014-04-25T20:47:12Z</dc:date>
    </item>
  </channel>
</rss>

