<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 CONFIGURATION WITH DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407767#M309761</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jamora your suggestion did the trick!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 09 Nov 2013 13:00:11 GMT</pubDate>
    <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
    <dc:date>2013-11-09T13:00:11Z</dc:date>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407760#M309748</link>
      <description>&lt;P&gt;HI Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if you could help me with my issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a providers router connected on the Asa 5505 (I didn't buy extra ips only the one that gives me access to the internet through the router).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Providers router ip:192.168.10.254&lt;/P&gt;&lt;P&gt;Asa outside ip: 192.168.10.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a web server and an exchange server on the dmz zone (192.168.0.0/24) and i want those servers to be able to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i want my internal hosts to be able to get an ip from the ASA and access the internet and also the web server and exchange server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because i don't have a public ip for my ASA i am confused in how to create the access-lists and natting ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;something like access-list outside_in extended permit tcp any host 192.168.10.3 eq 80 would be the correct statement or shall i change the 192.168.10.3 with the public ip adress of my providers router ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a complete example of my scenario i would be very grateful to you. (PRE 8.3 SINCE IT HAS 8.2 IOS)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching a diagram to give you an idea of my network structure.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407760#M309748</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2019-03-12T02:59:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407761#M309751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is just not one scenario for what you have because the options to change things at you ISP side are much more simple but I will give you a couple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;1) You will need to configure the NAT on your ISP router and add static routes on the ISP device for the servers that reside behind the ASA DMZ interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Configure NAT mapping in most cases called port forwardings or service mappings depending on the brand of your router.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routes are the most important things here, if the router does not know how to reach the server the maps won´t work at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;2) Configure NAT statements on the ASA that map to the 192.168.10.X/24 network that your is given you, that way you don´t have to add routes on the ISP device give to you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Make your ISP forward the public IP address to the ASA instead receiving a private network and having to do double NAtting on your network devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your answer please let me know what you want to do and I can help you out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 02:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407761#M309751</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T02:47:46Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407762#M309752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Jumora,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for explaining all possible scenarios, i would prefer giving me more details on the 2 option if it's possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stelios&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 10:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407762#M309752</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2013-11-03T10:36:25Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407763#M309754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am configuring this based on what you have given to me, please ask if you have any doubts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want my internal hosts to be able to get an IP from the ASA and access the internet and also the web server and exchange server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet Service Provider router´s IP address is 192.168.10.254&lt;/P&gt;&lt;P&gt;ASA outside IP address: 192.168.10.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a web server and an exchange server on the DMZ zone (192.168.0.0/24) and I want those servers to be able to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you need to configure static NAT entries on the ASA, do something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;interface vlan 1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;interface vlan 2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.10.3 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan 2 by default is associated to interface e0/0 as an access port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;interface e0/0&lt;/P&gt;&lt;P&gt;switchpor access vlan 3&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring the static PAT and ACLs for the server´s that reside behind the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable&lt;/P&gt;&lt;P&gt;Config t&lt;/P&gt;&lt;P&gt;Static (dmz,outside) tcp interface 25 192.168.0.10 25&lt;/P&gt;&lt;P&gt;Static (dmz,outside) tcp interface 80 192.168.0.10 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access list configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any interface outside eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list inbound permit tcp any interface outside eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;interface vlan3&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to associate the vlan to a physical port:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;interface e0/7&lt;/P&gt;&lt;P&gt;switchpor access vlan 3&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the ASA 5505 has a 192.168.1.0/24 network associated to the inside interface with a DHCP server enabled.&lt;/P&gt;&lt;P&gt;If by any chance this was removed I can re-configure the device over CLI for you but just to avoid misconfiguration we need to delete all DHCPD settings that are associated to DHCP on&amp;nbsp; the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable&lt;/P&gt;&lt;P&gt;Config t&lt;/P&gt;&lt;P&gt;Clear config dhcpd&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAT configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing that needs to be configuring:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0 0 192.168.10.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your ISP device you will need to configure static mapping, port forwarding or service mapping for TCP/80 and TCP/25 pointing to the 192.168.10.3 on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI: Make sure that the ISP service that is provided to you supports incoming connections such as mail and http, if this is not a comercial line you might need to request these services to be allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 21:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407763#M309754</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T21:54:59Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407764#M309756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also do this with the quick startup guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/quick_start/5505/5505-poster.html#wp59685"&gt;http://www.cisco.com/en/US/docs/security/asa/quick_start/5505/5505-poster.html#wp59685&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 21:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407764#M309756</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T21:55:29Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407765#M309758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Jamora,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for spending your time assisting me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will test the configuration and i will let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stelios&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 22:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407765#M309758</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2013-11-03T22:42:54Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407766#M309760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any news???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 20:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407766#M309760</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-04T20:44:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 CONFIGURATION WITH DMZ</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407767#M309761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jamora your suggestion did the trick!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Nov 2013 13:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-configuration-with-dmz/m-p/2407767#M309761</guid>
      <dc:creator>STYLIANOS DEMETRIOU</dc:creator>
      <dc:date>2013-11-09T13:00:11Z</dc:date>
    </item>
  </channel>
</rss>

