<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access for for new DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463262#M269534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am assuming that the new DMZ is not to be able to initiate traffic to the old DMZ and the other subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/1&lt;/P&gt;&lt;P&gt;description LAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;nameif LAN-subnet&lt;/P&gt;&lt;P&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/2&lt;/P&gt;&lt;P&gt;description Old-DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;nameif Old-DMZ&lt;/P&gt;&lt;P&gt;ip address 11.11.11.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/3&lt;/P&gt;&lt;P&gt;description New-DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;nameif New-DMZ&lt;/P&gt;&lt;P&gt;ip address 12.12.12.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN-to-New-DMZ extended permit tcp 10.10.10.0 255.255.255.0 12.12.12.0 255.255.255.0 eq 21&lt;/P&gt;&lt;P&gt;access-list Old-DMZ-to-New-DMZ extended perit tcp 11.11.11.0 255.255.255.0 12.12.12.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group LAN-to-New-DMZ in interface LAN&lt;/P&gt;&lt;P&gt;access-group Old-DMZ-to-New-DMZ in interface Old-DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use objects when creating the ACLs but for the sake simplicity I have not done so here.&amp;nbsp; This will allow traffic that is initiated from the LAN and Old-DMZ to access the New-DMZ.&amp;nbsp; This configuration will however not allow the New-DMZ to initiate any traffic to either of those networks.&amp;nbsp; If the New-DMZ needs to be able to initiate traffic then you would also need to create an ACL and apply it to the New-DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Feb 2014 15:22:22 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-02-15T15:22:22Z</dc:date>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463261#M269530</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help me to filter the traffic for a new dmz which i have created right now the follwing acl is under this new dmz&lt;/P&gt;&lt;P&gt;access-list TEST line 1 extended permit ip any any &lt;/P&gt;&lt;P&gt;but i want to allow certain subnets plus an old dmz to access the this new DMZ. i am not expert of FWSM so could you please he to wrire down this ACL ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Malik&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463261#M269530</guid>
      <dc:creator>Faisal Shabbir</dc:creator>
      <dc:date>2019-03-12T03:46:01Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463262#M269534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am assuming that the new DMZ is not to be able to initiate traffic to the old DMZ and the other subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/1&lt;/P&gt;&lt;P&gt;description LAN&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;nameif LAN-subnet&lt;/P&gt;&lt;P&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/2&lt;/P&gt;&lt;P&gt;description Old-DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;nameif Old-DMZ&lt;/P&gt;&lt;P&gt;ip address 11.11.11.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface g0/3&lt;/P&gt;&lt;P&gt;description New-DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;nameif New-DMZ&lt;/P&gt;&lt;P&gt;ip address 12.12.12.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN-to-New-DMZ extended permit tcp 10.10.10.0 255.255.255.0 12.12.12.0 255.255.255.0 eq 21&lt;/P&gt;&lt;P&gt;access-list Old-DMZ-to-New-DMZ extended perit tcp 11.11.11.0 255.255.255.0 12.12.12.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group LAN-to-New-DMZ in interface LAN&lt;/P&gt;&lt;P&gt;access-group Old-DMZ-to-New-DMZ in interface Old-DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use objects when creating the ACLs but for the sake simplicity I have not done so here.&amp;nbsp; This will allow traffic that is initiated from the LAN and Old-DMZ to access the New-DMZ.&amp;nbsp; This configuration will however not allow the New-DMZ to initiate any traffic to either of those networks.&amp;nbsp; If the New-DMZ needs to be able to initiate traffic then you would also need to create an ACL and apply it to the New-DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 15:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463262#M269534</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-15T15:22:22Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463263#M269536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marius for your reply here the details&lt;/P&gt;&lt;P&gt;inside security level is 100&lt;/P&gt;&lt;P&gt;outside &lt;SPAN style="font-size: 10pt;"&gt;security level is zero&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;old DMZ &lt;SPAN style="font-size: 10pt;"&gt;security level is zero&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;New DMZ is &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;security level 50 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;now above ACL which is mentioned is on every interafce and everything is working fine. from new DMZ i can access every thing but i want to filer more traffic to allow certain subnet's to access new DMZ and old and new dmz should be abale to communicate with each other &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;new DMZ = 192.168.95.0/24&lt;/P&gt;&lt;P&gt;old DMZ = 192.168.2.0/24&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 15:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463263#M269536</guid>
      <dc:creator>Faisal Shabbir</dc:creator>
      <dc:date>2014-02-15T15:34:03Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463264#M269537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;now above ACL which is mentioned is on every interafce&lt;/PRE&gt;&lt;P&gt;Is this ASA in production?&amp;nbsp; You should most definately remove this ACL from the outside interface if this a production ASA. Also I would suggest finding out what ports you need to allow on the other interfaces and only allow those ports and remove the permit ip any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing is that unless you remove the permit IP any any you will still be allowing all traffic through even if you configure more specific rules above the permit ip any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to decipher how to configure the ACLs by the config example I posted earlier.&amp;nbsp; But here it is anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list new-to-old extended permit tcp 192.168.95.0 255.255.255.0 192.168.2.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;access-list old-to-new extended permit tcp 192.168.2.0 255.255.255.0 192.168.95.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group new-to-old in interface NEW-INTERFACE&lt;/P&gt;&lt;P&gt;access-group old-to-new in interface OLD-INTERFACE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just adjust the ports you want to allow and/or IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 15:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463264#M269537</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-15T15:50:54Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463265#M269538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marius i will try since FWSM is in production network&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 15:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463265#M269538</guid>
      <dc:creator>Faisal Shabbir</dc:creator>
      <dc:date>2014-02-15T15:55:12Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463266#M269540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok since it is in production I would be very careful when removing the permit IP any any rule.&amp;nbsp; make sure you know all the ports which are in use and have then defined in the ACL before you remove it.&amp;nbsp; But you should for sure remove it on the outside interface and only allow specific ports into your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use packet capture, or SPAN the switch port which connects to the ASA&amp;nbsp; to see what ports are being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 16:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463266#M269540</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-15T16:01:51Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463267#M269542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius i have another FW on perimeter which is doing traffic filtering so not an issue on outside interface, what i want to achieve is to allow subnet's lets say 192.168.10.0/24, &lt;SPAN style="font-size: 10pt;"&gt;192.168.20.0/24 and &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;192.168.2.0/24 (old dmz) to communicate with 192.168.95.0/24 (new dmz) rest should be blocked, hope that i explained what i want&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 16:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463267#M269542</guid>
      <dc:creator>Faisal Shabbir</dc:creator>
      <dc:date>2014-02-15T16:09:34Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463268#M269545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&amp;nbsp; Then on the new and old DMZ interfaces remove the permit IP any any, and then add the ACLs permitting more specific ports.&amp;nbsp; As for the outside interface, I would suggest keeping the permit IP any any until you know 100% which ports you are to allow through that interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 16:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463268#M269545</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-15T16:16:39Z</dc:date>
    </item>
    <item>
      <title>Access for for new DMZ</title>
      <link>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463269#M269548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marius&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Feb 2014 16:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-for-for-new-dmz/m-p/2463269#M269548</guid>
      <dc:creator>Faisal Shabbir</dc:creator>
      <dc:date>2014-02-15T16:18:20Z</dc:date>
    </item>
  </channel>
</rss>

