<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow Specific Access Across Interfaces ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360647#M271365</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got it correctly, except port mapping.&lt;/P&gt;&lt;P&gt;You should read the nat rule by the following:&lt;/P&gt;&lt;P&gt;nat (real_ifc,mapped_ifc) static interface service {tcp | udp} real_port mapped_port&lt;/P&gt;&lt;P&gt;that is:&lt;/P&gt;&lt;P&gt;real_ifc = Inside&lt;/P&gt;&lt;P&gt;mapped_ifc = Outside&lt;/P&gt;&lt;P&gt;real_port = 8080 (behind real_ifc)&lt;/P&gt;&lt;P&gt;mapped_port = 80 (behind mapped_ifc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You connect to the Outside interface IP address port 80 and get to the CAM behind the Inside port 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Outside access list you indicate real IP and real port, since access list is applied after NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Jan 2014 22:32:08 GMT</pubDate>
    <dc:creator>maxmogorean</dc:creator>
    <dc:date>2014-01-24T22:32:08Z</dc:date>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360626#M271341</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my quest to learn Cisco IOS and devices, I need some help in traffic shaping, or access-lists, specifically allowing traffic between internal interfaces on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5510:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN/WAN/DMZ labled ports E0/0 (LAN), E0/1 (WAN), E0/2 (DMZ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached to port E0/0 is a 2811 Router&lt;/P&gt;&lt;P&gt;Attached to port E0/1 is the Internet (Outside)&lt;/P&gt;&lt;P&gt;Attached to port E0/2 is a 2821&lt;/P&gt;&lt;P&gt;(I will be adding a 3745 for VOIP) port E0/3 but it hasn't arrived yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to allow traffic between the 2811 and the 2821 routers so that devices on the networks behind them can talk to each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have specified specif subnets between the ASA and the Routers because I want to learn how to shape traffic behind the routers as well as on the ASA. So behind the routers I have different VLANS, but I am not restricting access between them, yet, at least I don't think I am. But as it is, devices behind the 2821 can't access the DNS / DOMAIN SERVER which is behind the 2811. Right now I am having the routers supply DHCP, which is working. Currently devices behind the 2821 router - 3560 switch cannot access the domain server, primary dns server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I setup the ASA to allow traffic to flow between the two routers and their VLANS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the configs of each of the devices and I have also included my switch configs, incase something needs to be set on them. I have only redacted the passwords and parts of the external IP's. I appreciate the help in what statements to create and on which devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it is best I put links to the text files here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360626#M271341</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2019-03-12T03:31:33Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360627#M271343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'll need to add &lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;in the ASA. You'll also want to create ACL's for each interface and apply them for filtering.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2014 14:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360627#M271343</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-17T14:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360628#M271345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah, I didn't know of that command. Can you give me an example? Say to allow devices one and behind the 2821 access to the domain server behind the 2811 at IP address 192.168.1.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still very unsure how the access lists work and would like to see one setu pproperly so I can see one in my inviroment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;P&gt;&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2014 19:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360628#M271345</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-17T19:53:00Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360629#M271347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would anyone be able to give me some examples of how to setup the access-lists so that devices behind the 2821 can access the domain server behind the 2811 at att ress 192.168.1.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would appreciate it. I am still trying to learn the access lists and the way I am trying to setup my network, I know I would also need allow the traffic on the ASA but also setup routes on the 2821 and 2811 as well correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, I appreciate the help. I am trying to learn this as fast as I can but it helps to see a working statement for my enviroment so I know how traffic flows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 22:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360629#M271347</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-18T22:09:41Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360630#M271348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A diagram would help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wanted vlan 10 access through the ASA &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit ip &lt;SPAN style="font-size: 10pt;"&gt;168.162.10.0 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;or to filter more granually&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz-access extended permit tcp host 192.162.1.100 host 10.10.1.1 eq 445&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 22:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360630#M271348</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-18T22:17:57Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360631#M271349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking to access the DC from the 128.162.1.0/24 which is behind the 2821. The DC is 192.168.1.2 and it is behind the 2811.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/3/8/6/177683-Network.jpg" alt="Network.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Jan 2014 06:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360631#M271349</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-19T06:14:51Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360632#M271350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the diagram. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit all traffic to NAS&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit ip 128.162.1.0 255.255.255.0 host 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit only DNS traffic to DNS server&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit udp 128.162.1.0 255.255.255.0 host 192.168.1.2 eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit ICMP to all devices in DC&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit icmp 128.162.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Jan 2014 14:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360632#M271350</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-19T14:10:13Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360633#M271351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I entered all those commands and yet I still cannot access the DC or DNS. none of the clients behind the 2821 (128.162.1.0/24) are able to resolve DNS nor ping the DC that the access lists were suposed to have allowed. Am I supposed to put these commands on the ASA or the 2811 router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 00:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360633#M271351</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-21T00:13:37Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360634#M271352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Should I restructure this network? Since I can't seem to get traffic to pass across ports, I am not sure if these devices will support that or not. I was told I should just put everything behind the ASA and then let the routers route and let the ASA be just a firewall. Seperating all my traffic by VLANS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My thinking was this would be better off this way but I guess not, I can't seem to get any traffic from the DMZ to the Inside network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 17:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360634#M271352</guid>
      <dc:creator>metuckness</dc:creator>
      <dc:date>2014-01-21T17:14:02Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360635#M271353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Both routers' interfaces looking to ASA have PAT configured. Because of this hosts behind one router will not reach any host behind the other one. &lt;/P&gt;&lt;P&gt;I think that there is not need to PAT traffic on the routers. Traffic between networks behind the routers should be simply routed by routers and ASA.&lt;/P&gt;&lt;P&gt;You only need to PAT traffic leaving the ASA outward the Internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 20:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360635#M271353</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-22T20:57:30Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360636#M271354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I would correct myself. As I said you do not need to PAT traffic leaving both routers, but only traffic arriving to the LAN interface and leaving the ASA should be translated. Addresses from behind the DMZ interface should not be translated when leaving the ASA.&lt;/P&gt;&lt;P&gt;Generealy speaking you have NAT issue. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 21:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360636#M271354</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-22T21:20:28Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360637#M271355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so I have to remove the PAT statements and setup static routes for each of the routers behind the ASA? Can you give me an example so I can get an idea of how that works, if you would. I would appreciate it. Boy is this tough when you're first trying to get a handle on it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mitch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 21:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360637#M271355</guid>
      <dc:creator>metuckness</dc:creator>
      <dc:date>2014-01-22T21:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360638#M271356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should delete the following statements on both routers:&lt;BR /&gt;- # ip nat inside source ... overload&lt;BR /&gt;- for each interface # ip nat inside/outside, if they have it configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove from rip advertisments of networks which are not directly connected:&lt;BR /&gt;- 2821: 172.16.0.0, 192.168.1.0, 199.195.xxx.0&lt;BR /&gt;- 2811: 199.195.xxx.0&lt;BR /&gt;- ASA: 128.0.0.0&lt;/P&gt;&lt;P&gt;No routes should be added to the routers, since there is the default one, directing to ASA.&lt;/P&gt;&lt;P&gt;Verify routing tables on the routers and ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;- remove:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;# object-group network PAT-SOURCE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;# nat (Inside,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;- create objects of the networks behind the LAN router and enable dynamic NAT:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;# object network &lt;OBJ name=""&gt;&lt;/OBJ&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;&amp;nbsp;&amp;nbsp; subnet &lt;SUBNET ip=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/SUBNET&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: line-through;"&gt;&amp;nbsp;&amp;nbsp; nat (Inside,Outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- review remained NAT rules.&lt;/P&gt;&lt;P&gt;- configure/adjust ingress access lists on the interfaces. Don't forget to permit rip on the LAN and DMZ interfaces.&lt;/P&gt;&lt;P&gt;- disable rip on the Outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 07:51:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360638#M271356</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-23T07:51:14Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360639#M271357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know if there is really need to make the NAT rules any more complex by creating a configuration for each interface separately as a Section 2 Auto NAT. Not that this environment will probably have that much NAT configurations in the future to make it too complex but I prefer doing the Dynamic PAT with one command instead of configuring multiple &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could change the above Dynamic PAT configuration which I probably original suggested before you had added devices to network to the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the PAT-SOURCE &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; then to tell all the networks which require PAT translation to the external network. (by adding statements under it for the networks required)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 08:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360639#M271357</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-23T08:14:14Z</dc:date>
    </item>
    <item>
      <title>Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360640#M271358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Jouni, you are right!&lt;/P&gt;&lt;P&gt;No need to delete # object-group network PAT-SOURCE, # nat (Inside,Outside) after-auto source dynamic PAT-SOURCE interface, and to create object for each network. Just to add networks behind the LAN router into the PAT-SOURCE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 08:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360640#M271358</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-23T08:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360641#M271359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so I don't remove the statements from the PAT-SOURCE group per MAXIM's suggestions. I did add the statement from Jouni:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if I want to get access between the interfaces, I have to specif access lists for them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or just add the networks to the PAT-SOURCE Object-Group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5510&lt;/P&gt;&lt;P&gt;domain-name maladomini.int&lt;/P&gt;&lt;P&gt;enable password liqChangedfzvir2g encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd liqhNWIChAnged2g encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description LAN Interface&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description WAN Interface&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 199.195.168.123 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.0.1 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description VOIP&lt;/P&gt;&lt;P&gt; nameif VOIP&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.2.1 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa914-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup Outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 199.195.168.4&lt;/P&gt;&lt;P&gt; name-server 205.171.2.65&lt;/P&gt;&lt;P&gt; name-server 205.171.3.65&lt;/P&gt;&lt;P&gt; domain-name maladomini.int&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network ROUTER-2811&lt;/P&gt;&lt;P&gt; host 10.10.1.2&lt;/P&gt;&lt;P&gt;object network ROUTER-2821&lt;/P&gt;&lt;P&gt; host 10.10.0.2&lt;/P&gt;&lt;P&gt;object network WEBCAM-01&lt;/P&gt;&lt;P&gt; host 192.168.1.5&lt;/P&gt;&lt;P&gt;object network DNS-SERVER&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network ROUTER-3745&lt;/P&gt;&lt;P&gt; host 10.10.2.2&lt;/P&gt;&lt;P&gt;object-group network PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object 10.10.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt; network-object 10.10.0.0 255.255.255.252&lt;/P&gt;&lt;P&gt; network-object 10.10.2.0 255.255.255.252&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object host 98.22.xxx.xxx&lt;/P&gt;&lt;P&gt;object-group network Outside_access_in&lt;/P&gt;&lt;P&gt;access-list USERS standard permit 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx object ROUTER-2811 eq ssh&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx object ROUTER-2821 eq ssh&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx interface Outside eq https&lt;/P&gt;&lt;P&gt;access-list dmz-access-vlan1 extended permit ip 128.162.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit all traffic to DC1&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit ip 128.162.1.0 255.255.255.0 host 192.168.1.2&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit only DNS traffic to DNS server&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit udp 128.162.1.0 255.255.255.0 host 192.168.1.2 eq domain&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit ICMP to all devices in DC&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit icmp 128.162.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu VOIP 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any Outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-715.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network ROUTER-2811&lt;/P&gt;&lt;P&gt; nat (Inside,Outside) static interface service tcp ssh 222&lt;/P&gt;&lt;P&gt;object network ROUTER-2821&lt;/P&gt;&lt;P&gt; nat (DMZ,Outside) static interface service tcp ssh 2222&lt;/P&gt;&lt;P&gt;object network ROUTER-3745&lt;/P&gt;&lt;P&gt; nat (VOIP,Outside) static interface service tcp ssh 2223&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;nat (DMZ,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;nat (VOIP,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;nat (any,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router rip&lt;/P&gt;&lt;P&gt; network 10.0.0.0&lt;/P&gt;&lt;P&gt; version 2&lt;/P&gt;&lt;P&gt; no auto-summary&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 199.195.xxx.xxx 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Inside&lt;/P&gt;&lt;P&gt;http 98.22.xxx.xxx 255.255.255.255 Outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 Inside&lt;/P&gt;&lt;P&gt;ssh 98.22.xxx.xxx 255.255.255.255 Outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username redacted password vj4PChaNgEDB.Ksz encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;password encryption aes&lt;/P&gt;&lt;P&gt;Cryptochecksum:d41cdcd98f00b204e9800998ecf8427e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;BR /&gt;&lt;/MENU&gt;&lt;MENU&gt;&lt;BR /&gt;&lt;/MENU&gt;&lt;MENU&gt;&lt;BR /&gt;&lt;/MENU&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 18:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360641#M271359</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-24T18:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360642#M271360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made these changes. Can I remove the items strieked out below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510# sh run nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network ROUTER-2811&lt;/P&gt;&lt;P&gt; nat (Inside,Outside) static interface service tcp ssh 222&lt;/P&gt;&lt;P&gt;object network ROUTER-2821&lt;/P&gt;&lt;P&gt; nat (DMZ,Outside) static interface service tcp ssh 2222&lt;/P&gt;&lt;P&gt;object network ROUTER-3745&lt;/P&gt;&lt;P&gt; nat (VOIP,Outside) static interface service tcp ssh 2223&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;nat (Inside,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;nat (DMZ,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;nat (VOIP,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (any,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I grant access to respources behind the routers in the PAT-SOURCE? For example. If I have a webpage at 192.168.1.5 running on port 8080. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 19:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360642#M271360</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-24T19:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360643#M271361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where from do you want to grant the access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the sec level of the DMZ and Inside is the same, and same security inter interface trafic is permitted, hosts from behind these interfaces must have access to each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to networks behind the LAN router have access to the internet, add them to the PAT-SOURCE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For sec reasons, sec level of the DMZ interface should be lower than the Inside and higher than the Outside. In this case &lt;/P&gt;&lt;P&gt;access-list should be apllied to the DMZ to permitt certain traffic to the networks behind the Inside and Outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 19:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360643#M271361</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-24T19:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360644#M271362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;MENU id="menuid"&gt;&lt;/MENU&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Maxim Mogorean wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where from do you want to grant the access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the sec level of the DMZ and Inside is the same, and same security inter interface trafic is permitted, hosts from behind these interfaces must have access to each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to networks behind the LAN router have access to the internet, add them to the PAT-SOURCE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For sec reasons, sec level of the DMZ interface should be lower than the Inside and higher than the Outside. In this case &lt;/P&gt;&lt;P&gt;access-list should be apllied to the DMZ to permitt certain traffic to the networks behind the Inside and Outside.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to grant access to security cameras on some of the different networks froma&amp;nbsp; specific outside source (remote location).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I want to allow http (www) access from 98.22.xxx.xxx to an IP address behind the 2811 at IP address 192.168.1.5 port 8080.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my updated NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510# sh run nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network ROUTER-2811&lt;/P&gt;&lt;P&gt; nat (Inside,Outside) static interface service tcp ssh 222&lt;/P&gt;&lt;P&gt;object network ROUTER-2821&lt;/P&gt;&lt;P&gt; nat (DMZ,Outside) static interface service tcp ssh 2222&lt;/P&gt;&lt;P&gt;object network ROUTER-3745&lt;/P&gt;&lt;P&gt; nat (VOIP,Outside) static interface service tcp ssh 2223&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (any,Outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-Lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510# sh run access-list&lt;/P&gt;&lt;P&gt;access-list USERS standard permit 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx object ROUTER-2811 eq ssh&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx object ROUTER-2821 eq ssh&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx interface Outside eq https&lt;/P&gt;&lt;P&gt;access-list dmz-access-vlan1 extended permit ip 128.162.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit all traffic to DC1&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit ip 128.162.1.0 255.255.255.0 host 192.168.1.2&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit only DNS traffic to DNS server&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit udp 128.162.1.0 255.255.255.0 host 192.168.1.2 eq domain&lt;/P&gt;&lt;P&gt;access-list dmz-access remark Permit ICMP to all devices in DC&lt;/P&gt;&lt;P&gt;access-list dmz-access extended permit icmp 128.162.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 20:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360644#M271362</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-01-24T20:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Specific Access Across Interfaces ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360645#M271363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object network CAM&lt;/P&gt;&lt;P&gt; host 192.168.1.5&lt;/P&gt;&lt;P&gt; nat (Inside,Outside) static interface service tcp 8080 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.xxx object CAM eq 8080&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 20:35:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-specific-access-across-interfaces-asa-5510/m-p/2360645#M271363</guid>
      <dc:creator>maxmogorean</dc:creator>
      <dc:date>2014-01-24T20:35:18Z</dc:date>
    </item>
  </channel>
</rss>

