<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 DMZ Nat question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332074#M310461</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;or&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:juanmh84@hotmail.com"&gt;juanmh84@hotmail.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 06 Nov 2013 22:39:37 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-06T22:39:37Z</dc:date>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332035#M310415</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first time posting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so my goal is to have an FTP Server on the DMZ and be able to access it using the outside interface (which is currently just configured as 10.2.2.2)&amp;nbsp; I tried adding the NAT rule using asdm and CLI but it won't take.&amp;nbsp;&amp;nbsp; What am I missing that i can't NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz, outside) tcp interface 21 172.20.10.5 21 netmask 255.255.255.255 tcp 0 0 udp 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the current config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.1&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif inside1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.3&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif inside3&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.40.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network inside-subnet&lt;/P&gt;&lt;P&gt; network-object 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.40.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network FTPServer&lt;/P&gt;&lt;P&gt; network-object 172.20.10.5 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network FTPServer-External&lt;/P&gt;&lt;P&gt; network-object 10.2.2.2 255.255.255.255&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu inside1 1500&lt;/P&gt;&lt;P&gt;mtu inside3 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 10.2.2.2&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside1) 1 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside3) 1 10.40.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332035#M310415</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2019-03-12T02:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332036#M310417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Static PAT (Port Forward) configuration seems valid&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though you dont have any IP address in the visible configuration for the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address &lt;IP address=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 16:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332036#M310417</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T16:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332037#M310420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems that one of your interfaces is configured as Trunk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Ethernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no ip address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual physical interfaces configurations seems unneeded if you are not planning to add IP address to it. If you are not going to add one you could configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no nameif&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; no security-level&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to avoid any future missunderstanding with the interface in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 16:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332037#M310420</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T16:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332038#M310421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for that quick response.&amp;nbsp;&amp;nbsp; the interface not having an IP was an oversight for not having the correct IP's from the ISP yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll add the temp IP and test again.&amp;nbsp; also, i will remove those configs from eth0/1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'll let you know if all is good.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 16:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332038#M310421</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-23T16:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332039#M310422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant see any other reason for not accepting the command atleast if you did it through ASDM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"static"&lt;/STRONG&gt; command itself refers to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface with the parameter &lt;STRONG&gt;"interface"&lt;/STRONG&gt; and if the interface has no IP address configured I would imagine it wont accept the NAT configuration as there is no IP address to use for the NAT configuration you are trying to insert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz, &lt;SPAN style="color: #ff0000;"&gt;outside&lt;/SPAN&gt;) tcp &lt;SPAN style="color: #ff0000;"&gt;interface&lt;/SPAN&gt; 21 172.20.10.5 21 netmask 255.255.255.255 tcp 0 0 udp 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 16:30:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332039#M310422</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T16:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332040#M310423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok so i removed the security-level and nameif on eth0/1 and now i cannot ping the 10.20.10.1 from a server with IP 10.20.10.5 connected to the same switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the asa i can ping 10.40.20.2 (int vlan 3 IP on switch) but i can't ping 10.20.10.254 (int vlan 1 on switch)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the switch connected to eth 0/1 on port 48 on switch.&amp;nbsp;&amp;nbsp; here's my truncated version of my switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip routing&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.40.20.1 10.40.20.10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool guestwifi&lt;/P&gt;&lt;P&gt; network 10.40.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt; dns-server 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; default-router 10.40.20.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/40&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/41&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,3&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/42&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,3&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/43&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/44&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/45&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/46&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/47&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/48&lt;/P&gt;&lt;P&gt;uplink to Firewall&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,3&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/49&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/51&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/52&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; ip address 10.20.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description Voice Vlan&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description Guest Vlan&lt;/P&gt;&lt;P&gt; ip address 10.40.20.2 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332040#M310423</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-23T17:13:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332041#M310424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If removing those commads created some problems you could always revert back to the original configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I didnt see that there was any IP address configured for the physical interface so I am not sure how it would affect the setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it did it must be related to you using the Vlan1 in the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wondering would you need to change the Native Vlan to something else than the default vlan for the suggested configurations to not cause any problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But probably better to revert to the original configuration though it still leaves the ASA configuration looking pretty strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 17:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332041#M310424</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-23T17:19:50Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332042#M310425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So after removing it still didn't work.&amp;nbsp; what i did was configure the eth0/1 interface with the vlan 1 IP and just kept the eth0/1.3 vlan 3 sub interface.&amp;nbsp; communication is ok now.&amp;nbsp;&amp;nbsp; My next issue\question is, I am trying to get the vlan 1 network 10.20.10.0/24 to see the FTP server on the DMZ (172.20.10.5).&amp;nbsp; here's the asa config so far.&amp;nbsp;&amp;nbsp; What am I missing in access list to be able to hit\ping the FTP Server from vlan 1 server.&amp;nbsp;&amp;nbsp;&amp;nbsp; The switch is configured for DMZ vlan 4.&amp;nbsp; I have the eth0/2 int and FTP server connected to port 43/44 trunked with vlan1, 4.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.2.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.3&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif inside3&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.40.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.30.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network inside-subnet&lt;/P&gt;&lt;P&gt; network-object 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.40.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network FTPServer&lt;/P&gt;&lt;P&gt; network-object 172.20.10.5 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip 10.20.10.0 255.255.255.0 host 172.2&lt;/P&gt;&lt;P&gt;0.10.5&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp 10.20.10.0 255.255.255.0 host 172&lt;/P&gt;&lt;P&gt;.20.10.5&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group FTPServer eq&lt;/P&gt;&lt;P&gt;ftp&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp host 172.20.10.5 10.20.10.0 25&lt;/P&gt;&lt;P&gt;5.255.255.0 timestamp-reply&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 172.20.10.5 10.20.10.0 255&lt;/P&gt;&lt;P&gt;.255.255.0 inactive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu inside3 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 10.2.2.2&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside3) 1 10.40.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface ftp 172.20.10.5 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;hofasa#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 19:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332042#M310425</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-25T19:48:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332043#M310426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem you had before was that you were using incorrectly the native VLAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You changed the setup so we will start from here now:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all remove this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-group inside_access_in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following &lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;inspect FTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case you do not have it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside)&lt;SPAN style="font-size: 10pt;"&gt;172.20.10.5 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;172.20.10.5 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz)&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;10.20.10.0 10.20.10.0 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 23:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332043#M310426</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-25T23:28:03Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332044#M310427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so I removed and added the statements you stated.&amp;nbsp; From the switch i can ping the DMZ interface on asa 172.20.10.1 but not the FTP server 172.20.10.5.&amp;nbsp; From the ASA i can ping the vlan 4 interface on the switch 172.20.10.2 but cannot ping the FTP server 172.20.10.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.2.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.3&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif inside3&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.40.20.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.30.10.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network inside-subnet&lt;/P&gt;&lt;P&gt; network-object 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.40.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network FTPServer&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object 172.20.10.5 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object icmp timestamp-reply&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip 10.20.10.0 255.255.255.0 172.20.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp 10.20.10.0 255.255.255.0 172.20.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group FTPServer eq ftp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu inside3 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 10.2.2.2&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside3) 1 10.40.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface ftp 172.20.10.5 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,inside) 172.20.10.5 172.20.10.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; static (inside,dmz) 10.20.10.0 10.20.10.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.20.10.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 10.20.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 10.20.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.1 255.255.255.255 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:6bcfb01a635982dcd4020570173ae95f&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch config&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/43&lt;/P&gt;&lt;P&gt; FTP Server&lt;/P&gt;&lt;P&gt;switchport access vlan 4&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/44&lt;/P&gt;&lt;P&gt; Uplink to ASA DMZ Eth0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 4&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/45&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/46&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/47&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/48&lt;/P&gt;&lt;P&gt;UPLink to ASA Eth0/1 &lt;/P&gt;&lt;P&gt;switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt;switchport trunk allowed vlan 1,3,4&lt;/P&gt;&lt;P&gt;switchport mode trunk&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description Voice Vlan&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description Guest Vlan&lt;/P&gt;&lt;P&gt; ip address 10.40.20.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description DMZ Vlan&lt;/P&gt;&lt;P&gt; ip address 172.20.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 16:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332044#M310427</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-28T16:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332045#M310428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I'm narrowing this down slowly.&amp;nbsp; I rebooted the switch and i'm able to ping 172.20.10.5 (FTPServer) from switch (when i source the ping from vlan 4) and the ASA.&amp;nbsp;&amp;nbsp; How do i get 10.20.10.0 network able to access dmz (just FTPServer)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it be because Eth0/2 on asa is native vlan and not vlan 4?&amp;nbsp; i don't see an option to change it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 17:13:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332045#M310428</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-28T17:13:24Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332046#M310429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the correct configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I get 10.20.10.0 network able to access just the FTP Server via its translated IP? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lower the security level of the interface where the FTP server resides:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;Interface Ethernet0/2&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why would you do this? Because you are playing with same-security-traffic feature which if you really don't know for what it is used just don't use it as it is not necessary on your setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;static (dmz,inside) tcp 10.2.2.1 21 172.20.10.5 211 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add the next line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might ask yourself, why am I adding this last line? Because you have the next configuration line that obligates it to PAT when going to the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, my question to you? When you access your FTP server from the outside interface, do you do it over domain or IP? See, it is completely another thing to be on the external world and some other device doing a NAT for you and then another thing to try to connect from the internal network to the DMZ FTP server and mapping it to what would see to be the correct IP that would be 10.2.2.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plus your code should be updated, really old version&lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;, maybe a 8.2.5 code would be OK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Oct 2013 01:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332046#M310429</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-29T01:58:19Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332047#M310430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please update the ticket as resolved or answered so we can close out followup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 17:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332047#M310430</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-31T17:52:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332048#M310431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know how to mark it as resolved without hitting correct answer?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332048#M310431</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-31T18:17:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332049#M310432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, with correct answer is the right way, if you believe that the solution was not given you just rate it but the idea is if you post question we continue the conversation until we resolve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question, did you get the information that you needed or do you still have doubts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332049#M310432</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-10-31T18:23:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332050#M310433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok thanks for that info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332050#M310433</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-10-31T18:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332051#M310434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I atleast find it a bit missleading when the Correct Answers marked in the discussion actually have nothing to do with the actual solution to the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually you would mark the replys that answer your question/solve your problem with the "Correct Answer" which in this case would have been some earlier replys of Julio or Jumora probably. That is if you got everything working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 18:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332051#M310434</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-31T18:37:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332052#M310435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; So the issue came up again where i cannot access the ftp server 172.20.10.5 on DMZ from 10.20.10.0 network.&amp;nbsp;&amp;nbsp; It was working, then moved equipment and did not come up again once powere back on.&amp;nbsp;&amp;nbsp; Outside network will only access FTP port on IP of outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interfaceinterface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.3&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif inside3&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.40.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.20.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network inside-subnet&lt;/P&gt;&lt;P&gt; network-object 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network FTPServer&lt;/P&gt;&lt;P&gt; network-object 172.20.10.5 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object icmp&lt;/P&gt;&lt;P&gt; service-object icmp timestamp-reply&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object icmp&lt;/P&gt;&lt;P&gt; service-object icmp echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object-group FTPServer eq&lt;/P&gt;&lt;P&gt;ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;echo-reply&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 17&lt;/P&gt;&lt;P&gt;2.20.10.0 255.255.255.0 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; global (outside) 1&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside3) 1 10.40.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.20.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface ftp 172.20.10.5 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,inside) 172.20.10.5 172.20.10.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.20.10.0 10.20.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 18:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332052#M310435</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-06T18:37:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332053#M310437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quick question... The switch, is it a layer 3 device, meaning, is it routing traffic and do these two VLANs have interfaces configured on the switch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 18:46:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332053#M310437</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-06T18:46:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332054#M310439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;routing is turned off on the switch.&amp;nbsp;&amp;nbsp;&amp;nbsp; I have the FTP Tera station plugged into port 43 and ASA eth0/2 plugged into port 44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/43&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/44&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt; switchport mode access&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/45&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/46&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/47&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/48&lt;/P&gt;&lt;P&gt; switchport trunk encapsulation dot1q&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,3&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/49&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/51&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/52&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; ip address 10.20.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description Voice Vlan&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description Guest Vlan&lt;/P&gt;&lt;P&gt; ip address 10.40.20.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description DMZ Vlan&lt;/P&gt;&lt;P&gt; ip address 172.20.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 18:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-nat-question/m-p/2332054#M310439</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-06T18:55:12Z</dc:date>
    </item>
  </channel>
</rss>

