<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem Accessing Web Server on DMZ from Internal Network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3943894#M31662</link>
    <description>&lt;P&gt;Do I need to enable DNS inspection on ASA. According to my network topology/scenario, I am not able to go to web server. Web server can be accessed from outside world but not from ASA's inside to DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;</description>
    <pubDate>Sat, 19 Oct 2019 22:59:41 GMT</pubDate>
    <dc:creator>patelparth3</dc:creator>
    <dc:date>2019-10-19T22:59:41Z</dc:date>
    <item>
      <title>Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935626#M31648</link>
      <description>&lt;PRE&gt;DMZ                                 Internal Network&lt;BR /&gt;192.168.0.0   -------Firewall-------192.168.1.0&lt;BR /&gt;255.255.255.0           |           255.255.255.0&lt;BR /&gt;                        |&lt;BR /&gt;                        |&lt;BR /&gt;                     Internet&lt;BR /&gt;                     204.0.0.3&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Web Server: 192.168.0.11 - NAT 204.0.0.11&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Internal Net Accessing Internet: 192.168.1.0 - NAT 204.0.0.3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Firewall: ASA ver 7.0&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Ok, I'm having an odd problem. I have setup a web server on our DMZ with a private IP address. The firewall is ARPing for the address 204.0.0.11 and forwarding it to the private address on the DMZ. This works fine when accessing from anywhere on the Internet. The problem I am having is that people on the Internal network can't get to the website. They can get to anywhere else on the Internet. I can't figure out what is happening. The Internal requests should go out the external interface of the firewall, get NAT'ed to a real IP address, then try and access the real IP of the website, and come back through, just like accessing any other website out there on the Internet. I see the request going through the firewall, but nothing ever seems to come back to the client.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I don't want the Internal network to have direct access to the DMZ.&amp;nbsp;Am I doing this wrong?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;* All IP addresses have been changed to protect the innocent.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2019 21:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935626#M31648</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2019-10-04T21:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935708#M31651</link>
      <description>You require U turn/Hairpin NAT or DNS Doctoring (If supported by your version)&lt;BR /&gt;Few references&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/dns-doctoring-and-u-turning-on-the-asa-quot-when-and-how-to-use/ta-p/3153693" target="_blank"&gt;https://community.cisco.com/t5/security-documents/dns-doctoring-and-u-turning-on-the-asa-quot-when-and-how-to-use/ta-p/3153693&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1150-cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html" target="_blank"&gt;http://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1150-cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Sat, 05 Oct 2019 05:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935708#M31651</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-05T05:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935722#M31653</link>
      <description>&lt;P&gt;Hairpinning is not required here unless DNS and internal networks are hanging off the same physical interface.&amp;nbsp; But DNS rewrite (aka DNS doctoring) is where to start, but for this to work DNS server needs to be located off a different firewall interface than the internal network.&amp;nbsp; This is done by adding the &lt;EM&gt;&lt;STRONG&gt;DNS&lt;/STRONG&gt; &lt;/EM&gt;keyword at the end of the NAT statement for the web server.&lt;/P&gt;
&lt;P&gt;If this does not work, please provide a full running configuration of your ASA (remove any public IPs, usernames and passwords).&amp;nbsp; Also, provide the model of ASA you are running.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2019 07:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935722#M31653</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-05T07:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935724#M31655</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;This is not current configuration but it is required some extra configuration as Hairpin NAT or uses an internal DNS server to redirect your traffic to the web server using the internal IP address only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DNS Setup Maybe likes:&lt;/P&gt;
&lt;P&gt;DNS name: &lt;A href="http://www.xyz.com&amp;nbsp;" target="_blank"&gt;www.xyz.com&amp;nbsp;&lt;/A&gt; and Host IP: 192.168.0.X&lt;/P&gt;
&lt;P&gt;DNS Name: xyz.com&amp;nbsp; &amp;nbsp;and Host IP: 192.168.0.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hairpin Solution Maybe like:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://networklessons.com/cisco/asa-firewall/cisco-asa-hairpin-internal-server" target="_blank"&gt;https://networklessons.com/cisco/asa-firewall/cisco-asa-hairpin-internal-server&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0000040" target="_blank"&gt;https://www.petenetlive.com/KB/&lt;/A&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0000040" target="_blank"&gt;Article/0000040&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2019 07:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3935724#M31655</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2019-10-05T07:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940426#M31658</link>
      <description>&lt;P&gt;Here is the configuration -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif OUTSIDE&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 204.0.0.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif INSIDE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 204.0.0.11 eq www&lt;/P&gt;&lt;P&gt;icmp deny any OUTSIDE&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 100 interface&lt;BR /&gt;global (OUTSIDE) 110 204.0.0.11&lt;/P&gt;&lt;P&gt;nat (INSIDE) 100 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (DMZ) 110 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,ISP) tcp 204.0.0.11 www 192.168.0.10 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface ISP&lt;/P&gt;&lt;P&gt;route ISP 0.0.0.0 0.0.0.0 204.0.0.2 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know what I need to configure to reach my goal.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 20:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940426#M31658</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2019-10-14T20:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940458#M31659</link>
      <description>&lt;P&gt;you just need to add "dns" to the end of the NAT statment.&amp;nbsp; If this doesnt work, you will need to explain more about your network, in particular where you have your DNS server.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;static (DMZ,ISP) tcp 204.0.0.11 www 192.168.0.10 www netmask 255.255.255.255&lt;/STRONG&gt; &lt;EM&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;dns&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Would recommend upgrading your ASA software as the version you are running is end of support at the end of this month.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 21:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940458#M31659</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-14T21:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940470#M31660</link>
      <description>&lt;P&gt;-&amp;gt; My DNS server is outside of the network. I am using ISP's DNS server.&lt;/P&gt;&lt;P&gt;-&amp;gt; Do you I need to configure ACL from DMZ to INSIDE ?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 22:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940470#M31660</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2019-10-14T22:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940481#M31661</link>
      <description>No ACL is needed.</description>
      <pubDate>Mon, 14 Oct 2019 22:33:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3940481#M31661</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-14T22:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3943894#M31662</link>
      <description>&lt;P&gt;Do I need to enable DNS inspection on ASA. According to my network topology/scenario, I am not able to go to web server. Web server can be accessed from outside world but not from ASA's inside to DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2019 22:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3943894#M31662</guid>
      <dc:creator>patelparth3</dc:creator>
      <dc:date>2019-10-19T22:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem Accessing Web Server on DMZ from Internal Network</title>
      <link>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3943903#M31663</link>
      <description>&lt;P&gt;No you do not need DNS inspection, besides DNS inspection should be enabled by default unless you have cleared all the config and configured from scratch.&lt;/P&gt;
&lt;P&gt;most likely your DNS resolution on the inside network returns the public IP of your web server. If this is the case, then the solution provided in this post is the correct solution.&amp;nbsp; However, if you are restriction access with an ACL on the inside interface you need to allow traffic to the private IP of the web server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A different option would be to configure twice NAT and NAT the destination public IP to the private IP of the web server.&amp;nbsp; Same as with using the DNS keyword, if you use an access list on the inside interface you will need to allow this traffic in that ACL also.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2019 23:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-accessing-web-server-on-dmz-from-internal-network/m-p/3943903#M31663</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-19T23:42:34Z</dc:date>
    </item>
  </channel>
</rss>

