<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic asa configuration with dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196515#M358335</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a couple of quick questions for a start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the "dmz-owa" interface a totally new interface thats not yet in use? Is these the first configurations for that interface.&lt;/LI&gt;&lt;LI&gt;Do you have any need to NAT traffic between the whole "dmz-owa" and "inside" networks? Or should both of the network be visible to eachother with their original IP addresses?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Atleast one thing that stands out in the above configuration is that on the "dmz-owa" interface you have actually attached the NAT0 ACL as the interface ACL instead of the other ACL created to be the interface ACL, atleast this is what I assume.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Apr 2013 15:58:41 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-12T15:58:41Z</dc:date>
    <item>
      <title>asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196514#M358334</link>
      <description>&lt;P&gt;I have ASA &lt;SPAN id="yui_3_7_2_1_1365714734322_17980" style="font-weight: bold;"&gt;Version 8.0(5)&lt;/SPAN&gt; and&amp;nbsp; its configure &lt;SPAN style="font-weight: bold;"&gt;nat-control&lt;/SPAN&gt;&lt;BR /&gt;But sometimes i confuse with the a lot of infomacion of how configure a dmz that i found on the web.&lt;BR /&gt;So&amp;nbsp; i wrote the configuracion i want to use, and i&amp;nbsp; really appreciate your&amp;nbsp; advise.&amp;nbsp; for example if i hace to change or add some parameters .&amp;nbsp; &lt;BR /&gt;As you will read i separated the configuracion&amp;nbsp;&amp;nbsp; by traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the configuration i want to implement on the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-weight: bold;"&gt;Trafic from inside to dmz&lt;/SPAN&gt;: i just want thar form inside i can access to specific servers&lt;BR /&gt;access-list INSIDE extended permit tcp host 10.117.210.55 host 192.168.69.11 object-group PUERTOS-OWA&lt;BR /&gt;access-list INSIDE extended permit tcp host 10.117.210.56 host 192.168.69.11&amp;nbsp; object-group PUERTOS-OWA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NO-NAT-0 extended permit ip host 10.117.210.56 host 192.168.69.11&lt;BR /&gt;access-list NO-NAT-0 extended permit ip host 10.117.210.55 host 192.168.69.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.56 object-group PUERTOS-OWA&lt;BR /&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.55 object-group PUERTOS-OWA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NO-NAT-0&lt;BR /&gt;accces-group in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***************************************************************************************&lt;BR /&gt;&lt;SPAN style="font-weight: bold;"&gt;Traffic from outside to dmz&lt;/SPAN&gt; &lt;/P&gt;&lt;DIV&gt;&lt;SPAN&gt;static (DMZ-owa , outside) 186.x.x.x 192.168.69.10 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;access-list OUTSIDE EX PERMIT TCP ANY HOST &lt;SPAN&gt;186.x.x.x EQ 25&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;access-group OUTSIDE in interface outside&lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt; &lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;***************************************************************************************&lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN style="font-weight: bold;"&gt;Trafic from dmz to inside:just want from dmz access to specific inside host.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;&lt;BR /&gt;&lt;SPAN style="font-weight: bold;"&gt; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17998" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.61 EQ 53&lt;BR /&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.62 EQ 53&lt;BR /&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 HOST 10.117.210.44&amp;nbsp; EQ 123&lt;BR /&gt;ACCESS-LIST DMZ EX PERMIT UDP HOST 192.168.69.11 HOST 10.117.210.44&amp;nbsp; EQ 123&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17997" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt; &lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17996" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;ACCESS-LIST DMZ-NAT0 EX PERMIT IP HOST 192.168.69.11 host&amp;nbsp; 10.117.210.62&lt;BR /&gt;ACCESS-LIST DMZ-NAT0 EX PERMIT IP HOST 192.168.69.11 host 10.117.210.61&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17995" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;ACCESS-LIST DMZ-NAT0 EX PERMIT IP HOST 192.168.69.11 host 10.117.210.44&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17994" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt; &lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17993" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;nat (dmz-owa) 0 access-list DMZ-NAT0&lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17991" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;&lt;SPAN id="yui_3_7_2_1_1365714734322_17990"&gt;access-group DMZ-NAT0 in interface DMZ-OWA&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV id="yui_3_7_2_1_1365714734322_17989" style="color: #000000; font-size: 16px; font-family: times new roman, new york, times, serif; background-color: transparent; font-style: normal;"&gt;&lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;Regards..&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:27:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196514#M358334</guid>
      <dc:creator>BENJAMIN FUERTES</dc:creator>
      <dc:date>2019-03-12T01:27:35Z</dc:date>
    </item>
    <item>
      <title>asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196515#M358335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a couple of quick questions for a start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the "dmz-owa" interface a totally new interface thats not yet in use? Is these the first configurations for that interface.&lt;/LI&gt;&lt;LI&gt;Do you have any need to NAT traffic between the whole "dmz-owa" and "inside" networks? Or should both of the network be visible to eachother with their original IP addresses?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Atleast one thing that stands out in the above configuration is that on the "dmz-owa" interface you have actually attached the NAT0 ACL as the interface ACL instead of the other ACL created to be the interface ACL, atleast this is what I assume.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 15:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196515#M358335</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T15:58:41Z</dc:date>
    </item>
    <item>
      <title>asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196516#M358336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&amp;nbsp; dmz-owa is&amp;nbsp; a new interface that want to configure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ servers receive incoming traffic from the outside.&lt;/P&gt;&lt;P&gt; those same dmz-servers need to communicate with some servers on the internal network.&lt;/P&gt;&lt;P&gt;I would like to know which is correct and safe way not to compromise internal servers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 16:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196516#M358336</guid>
      <dc:creator>BENJAMIN FUERTES</dc:creator>
      <dc:date>2013-04-12T16:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196517#M358337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am just wondering about the NAT part of your setup. I personally try to keep the NAT setup as simple as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you for example wanted to configure NAT0 for all traffic between the "inside" and "dmz-owa" I would do it in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT0 Configurations for INSIDE and DMZ-OWA&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Presuming the networks are&lt;UL&gt;&lt;LI&gt;inside = 10.117.210.0/24&lt;/LI&gt;&lt;LI&gt;dmz-owa = 192.168.69.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NO NAT for INSIDE to DMZ-OWA Traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 10.117.210.0 255.255.255.0 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-OWA-NAT0 remark NO NAT for DMZ-OWA to INSIDE Traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-OWA-NAT0 permit ip 192.168.69.0 255.255.255.0 10.117.210.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz-owa) 0 access-list DMZ-OWA-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would make it so that both networks could reach eachother with their original IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would still the ACLs you mention to control what traffic is allowed on the firewall interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think there is anything wrong with the above configurations but I would just consider doing the NAT0 configuration more broadly by doing it for the whole networks and leaving the traffic controlling to the interface ACLs instead of NAT / nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if the above NAT0 configuration is possible naturally depends also on the existing configurations on the firewall which I have not seen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 16:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196517#M358337</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T16:26:02Z</dc:date>
    </item>
    <item>
      <title>asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196518#M358338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your help , &lt;/P&gt;&lt;P&gt;i read on a link that if i want to pass traffic from lower security level to a high security level i have to use static nat if i use nat-control. and if i not use nat-control i just have to use acclist.&amp;nbsp; it is correct what i read? can you explain me that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by the other hand what you told me that is correct the configuration that i want to do but will be better if i do this change in the acl:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Trafic from inside to dmz: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE extended permit tcp host 10.117.210.55 host 192.168.69.11 object-group PUERTOS-OWA&lt;/P&gt;&lt;P&gt;access-list INSIDE extended permit tcp host 10.117.210.56 host 192.168.69.11&amp;nbsp; object-group PUERTOS-OWA&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NO NAT for INSIDE to DMZ-OWA Traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 10.117.210.0 255.255.255.0 192.168.69.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Trafic from dmz to inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.61 EQ 53&lt;/P&gt;&lt;P&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 host 10.117.210.62 EQ 53&lt;/P&gt;&lt;P&gt;ACCESS-LIST DMZ EX PERMIT TCP HOST 192.168.69.11 HOST 10.117.210.44&amp;nbsp; EQ 123&lt;/P&gt;&lt;P&gt;ACCESS-LIST DMZ EX PERMIT UDP HOST 192.168.69.11 HOST 10.117.210.44&amp;nbsp; EQ 123&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-OWA-NAT0 remark NO NAT for DMZ-OWA to INSIDE Traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-OWA-NAT0 permit ip 192.168.69.0 255.255.255.0 10.117.210.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and with the access-list&amp;nbsp; that are applied on the interface i control what servers could enter , so if i want in the future add a new server i just have to add a new accls on the ACL applied in the interface. is correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i just wondering something else that i found on the web.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in the part that show the example of &lt;STRONG&gt;dmz to inside&lt;/STRONG&gt; i dont understand why in the configuration used in the stactic configuration the ip &lt;STRONG&gt;&lt;TT&gt;192.168.2.20&lt;/TT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;if the ip of the dmz-server is 192.168.1.10 , i think that should be &lt;/P&gt;&lt;P&gt;&lt;TT&gt;static (inside,DMZ)&lt;/TT&gt;192.168.1.10&lt;TT&gt; 172.20.1.5 netmask 255.255.255.255&lt;/TT&gt;&amp;nbsp; and replace the ip &lt;STRONG&gt;&lt;TT&gt;192.168.2.20 for 192.168.1.10 in the acces-list. but if i am wrong please explainn to me.&lt;/TT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 16:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196518#M358338</guid>
      <dc:creator>BENJAMIN FUERTES</dc:creator>
      <dc:date>2013-04-12T16:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196519#M358339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea of the configuration I mentioned is to simply make sure that NO NAT is done between the 2 local networks you have. And as you say you could now just use the interface ACLs to control which traffic should pass the interface ACL to the other network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the linked example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont really understand why would I for example want to NAT my local network addresses. To me it seems just as something that isnt needed and which would result in more complexity to the network. I am not sure what the purpose of the NAT is in the documents situation. Maybe its just an example of the Static NAT configuration but I dont see to NAT the IP address from the INSIDE to DMZ in that situation. Then again I havent read the whole document through. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; I guess the point of the Static NAT configuration in the document is that "nat-control" is enabled and therefore every connection going through the firewall requires a NAT configuration. So you would for example need a "static" statement between your local interfaces/networks for the traffic to be allowed through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How you configure your setup is naturally up to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the NAT0 configuration between the whole networks and control the traffic with ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have also the option to configure Identity NAT which would enable the networks to form connection using the original IP addressing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That configuration would probably look something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,dmz-owa) 10.117.210.0 10.117.210.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 17:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196519#M358339</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T17:13:09Z</dc:date>
    </item>
    <item>
      <title>asa configuration with dmz</title>
      <link>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196520#M358340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you very much, i appreciate your assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is no confuse know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 17:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-configuration-with-dmz/m-p/2196520#M358340</guid>
      <dc:creator>BENJAMIN FUERTES</dc:creator>
      <dc:date>2013-04-12T17:18:44Z</dc:date>
    </item>
  </channel>
</rss>

