<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access DMZ from VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238983#M348427</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using ASA version 9.1, and ASDM version 7.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When connecting from my VPN using AnyConnect VPN client, I can access computers in my LAN without any issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot access anything on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My lan is 172.20.20.x&lt;/P&gt;&lt;P&gt;My DMZ is 172.21.20.x&lt;/P&gt;&lt;P&gt;and my VPN is 10.20.20.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to me to extract snippets of my config just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm very amateur with this unit so I'm not sure how to formulate the command, but I am thinking I just need an acces list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:54:55 GMT</pubDate>
    <dc:creator>Brendan Wood</dc:creator>
    <dc:date>2019-03-12T01:54:55Z</dc:date>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238983#M348427</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using ASA version 9.1, and ASDM version 7.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When connecting from my VPN using AnyConnect VPN client, I can access computers in my LAN without any issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot access anything on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My lan is 172.20.20.x&lt;/P&gt;&lt;P&gt;My DMZ is 172.21.20.x&lt;/P&gt;&lt;P&gt;and my VPN is 10.20.20.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to me to extract snippets of my config just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm very amateur with this unit so I'm not sure how to formulate the command, but I am thinking I just need an acces list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238983#M348427</guid>
      <dc:creator>Brendan Wood</dc:creator>
      <dc:date>2019-03-12T01:54:55Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238984#M348428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are a couple of basic things worth checking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First one would be to determine if you are using a Full Tunnel or Split Tunnel VPN Client connection. Full Tunnel naturally means that all traffic is forwarded to the VPN connection while its active. Split Tunnel defines the network to which traffic is tunneled through the VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be checked either through the configuration or when the VPN connection is up you have to navigate on the client software to the section which shows Route Details - Secured Routes. If the output is something along the lines of "0.0.0.0 0.0.0.0" then its Full Tunnel. If there is separate networks listed then its Split Tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Split Tunnel VPN you would have to add the DMZ network into the Split Tunnel ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to the above you might be missing NAT configuration for the DMZ network to VPN Pool traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would have to really see the configurations to say anything specific but I would imagine that the above things are the most common problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 19:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238984#M348428</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-08T19:22:45Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238985#M348429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Brendan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please provide me the configuration of the firewall (sh run). remove any of the passwords or sensitive information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 19:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238985#M348429</guid>
      <dc:creator>plotniku7</dc:creator>
      <dc:date>2013-06-08T19:24:51Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238986#M348430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, I checked my split tunnel settings, and I have both networks listed in there.&amp;nbsp; I will post my configuration below.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 19:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238986#M348430</guid>
      <dc:creator>Brendan Wood</dc:creator>
      <dc:date>2013-06-08T19:49:01Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238987#M348431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxx.LOCAL&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool AnyConnectVPNPool 10.20.20.1-10.20.20.30 mask 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.20.1 255.255.254.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; pppoe client vpdn group Acanac&lt;/P&gt;&lt;P&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.21.20.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner login Welcome to Brendan's ASA5505 firewall.&lt;/P&gt;&lt;P&gt;boot system disk0:/asa911-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxxxxxxx.LOCAL&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network SRV-DMZ-LNX01&lt;/P&gt;&lt;P&gt; host 172.21.20.3&lt;/P&gt;&lt;P&gt; description DMZ Linux Host 1&lt;/P&gt;&lt;P&gt;object network SRV-DMZ-WIN01&lt;/P&gt;&lt;P&gt; host 172.21.20.2&lt;/P&gt;&lt;P&gt; description DMZ Windows Host 1&lt;/P&gt;&lt;P&gt;object network TEST&lt;/P&gt;&lt;P&gt; host 172.21.20.2&lt;/P&gt;&lt;P&gt;object service rdp&lt;/P&gt;&lt;P&gt; service tcp source range 1 65535 destination eq 3389 &lt;/P&gt;&lt;P&gt; description Windows Remote Desktop&lt;/P&gt;&lt;P&gt;object service mssql&lt;/P&gt;&lt;P&gt; service tcp source range 1 65535 destination eq 1433 &lt;/P&gt;&lt;P&gt; description MS SQL Server 2xxx&lt;/P&gt;&lt;P&gt;object network SRV-WIN&lt;/P&gt;&lt;P&gt; host 172.21.20.2&lt;/P&gt;&lt;P&gt; description Static NAT entry to my Windows web server.&lt;/P&gt;&lt;P&gt;object network SRV-LNX&lt;/P&gt;&lt;P&gt; host 172.21.20.3&lt;/P&gt;&lt;P&gt; description Static NAT entry to my Linux web server.&lt;/P&gt;&lt;P&gt;object network external-170&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;object network external-171&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;object network SRV-LAN-WIN01&lt;/P&gt;&lt;P&gt; host 172.20.20.60&lt;/P&gt;&lt;P&gt;object network TEST2&lt;/P&gt;&lt;P&gt; host 172.21.20.3&lt;/P&gt;&lt;P&gt;object network Stuff&lt;/P&gt;&lt;P&gt; host 172.20.20.60&lt;/P&gt;&lt;P&gt;object network external-175&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;object network SRV-LAN-WIN02&lt;/P&gt;&lt;P&gt; host 172.20.20.61&lt;/P&gt;&lt;P&gt;object service kerboros_authentication&lt;/P&gt;&lt;P&gt; service udp destination eq 88 &lt;/P&gt;&lt;P&gt; description Kerboros authentication&lt;/P&gt;&lt;P&gt;object service domain_file_replication_tcp&lt;/P&gt;&lt;P&gt; service tcp destination eq netbios-ssn &lt;/P&gt;&lt;P&gt;object service domain_file_replication_udp&lt;/P&gt;&lt;P&gt; service udp destination eq netbios-dgm &lt;/P&gt;&lt;P&gt;object service global_cat&lt;/P&gt;&lt;P&gt; service tcp destination range 3268 3269 &lt;/P&gt;&lt;P&gt;object service ldap&lt;/P&gt;&lt;P&gt; service udp destination eq 389 &lt;/P&gt;&lt;P&gt;object network external-169&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;object network external-172&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;object network Wan_to_SSH&lt;/P&gt;&lt;P&gt; host 172.21.20.3&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.20.20.0_27&lt;/P&gt;&lt;P&gt; subnet 10.20.20.0 255.255.255.224&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network SRV-DMZ-GROUP&lt;/P&gt;&lt;P&gt; network-object object SRV-DMZ-LNX01&lt;/P&gt;&lt;P&gt; network-object object SRV-DMZ-WIN01&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp-udp destination eq domain &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ssh &lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 66.49.220.95&lt;/P&gt;&lt;P&gt; network-object host 67.55.0.11&lt;/P&gt;&lt;P&gt; network-object host 8.8.8.8&lt;/P&gt;&lt;P&gt;object-group service domain-operations tcp-udp&lt;/P&gt;&lt;P&gt; description UDP and TCP Port 135 for domain controllers-to-domain controller and client to domain controller operations.&lt;/P&gt;&lt;P&gt; port-object eq 135&lt;/P&gt;&lt;P&gt;object-group service file_replication_svc tcp-udp&lt;/P&gt;&lt;P&gt; port-object eq 445&lt;/P&gt;&lt;P&gt;object-group service kerboros_pwd_change tcp-udp&lt;/P&gt;&lt;P&gt; port-object eq 464&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Allow servers in DMZ to talk to http outside.&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp object-group SRV-DMZ-GROUP any4 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit object-group TCPUDP object-group SRV-DMZ-GROUP object-group DM_INLINE_NETWORK_1 eq domain &lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit icmp object-group SRV-DMZ-GROUP any4 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark Deny all traffic to the inside which wasn't implicitcy allowed.&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip object-group SRV-DMZ-GROUP 172.20.20.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list OutsidetoDMZ extended permit object-group DM_INLINE_SERVICE_1 any4 object-group SRV-DMZ-GROUP &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_list standard permit 172.20.20.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list Split_Tunnel_list standard permit 172.21.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 50&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.20.20.0_27 NETWORK_OBJ_10.20.20.0_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network TEST&lt;/P&gt;&lt;P&gt; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network SRV-WIN&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static external-170 service tcp www www &lt;/P&gt;&lt;P&gt;object network SRV-LNX&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static external-171 service tcp www www &lt;/P&gt;&lt;P&gt;object network TEST2&lt;/P&gt;&lt;P&gt; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network Wan_to_SSH&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static external-172 service tcp ssh ssh &lt;/P&gt;&lt;P&gt;access-group OutsidetoDMZ in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.20.20.0 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;http 10.20.20.0 255.255.255.224 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.20.20.0 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.20.20.0 255.255.255.224 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;vpdn group Acanac request dialout pppoe&lt;/P&gt;&lt;P&gt;vpdn group Acanac localname xxxxxxxxx@xxxxxxxxxx&lt;/P&gt;&lt;P&gt;vpdn group Acanac ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username xxxxxxxxx@xxxxxxxxxx password ***** store-local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.20.21.1-172.20.21.128 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 67.55.0.11 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.3055-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-linux-2.5.3055-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_PrimaryAnyConnectVPN internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_PrimaryAnyConnectVPN attributes&lt;/P&gt;&lt;P&gt; banner value You are now connected via VPN, all activities will be logged.&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 67.55.0.11 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Tunnel_list&lt;/P&gt;&lt;P&gt; default-domain value xxxxxx.LOCAL&lt;/P&gt;&lt;P&gt;username bwood password xxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;tunnel-group PrimaryAnyConnectVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group PrimaryAnyConnectVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool AnyConnectVPNPool&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_PrimaryAnyConnectVPN&lt;/P&gt;&lt;P&gt;tunnel-group PrimaryAnyConnectVPN webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias PrimaryAnyConnectVPN enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 20:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238987#M348431</guid>
      <dc:creator>Brendan Wood</dc:creator>
      <dc:date>2013-06-08T20:01:12Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238988#M348432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to add this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.20.20.0 255.255.255.224&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 172.21.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz,outside) source static DMZ DMZ destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see your current NAT rule for the VPN (the top most) only handles &lt;STRONG&gt;"inside" &amp;lt;-&amp;gt; "outside"&lt;/STRONG&gt; traffic. You need the above that handles the NAT for &lt;STRONG&gt;"dmz" &amp;lt;-&amp;gt; "outside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 20:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238988#M348432</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-08T20:18:22Z</dc:date>
    </item>
    <item>
      <title>Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238989#M348433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your suggestion worked.&amp;nbsp; Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 23:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/2238989#M348433</guid>
      <dc:creator>Brendan Wood</dc:creator>
      <dc:date>2013-06-08T23:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access DMZ from VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/4714798#M1094711</link>
      <description>&lt;P&gt;Perfect solution &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 11:02:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-dmz-from-vpn/m-p/4714798#M1094711</guid>
      <dc:creator>robsim</dc:creator>
      <dc:date>2022-11-02T11:02:54Z</dc:date>
    </item>
  </channel>
</rss>

