<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 DMZ Setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202705#M360289</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to Cisco firewalls and am attempting to setup a DMZ on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have managed to create the interface and vlan and ip address settings etc. But im a bit lost with the NAT settings and rules i need to create for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- RDP access from inside network to the DMZ servers&lt;/P&gt;&lt;P&gt;- Internet access for the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also setting up Active Directory Federation and requirre HTTPS traffic from the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- DMZ HTTPS to outside (Office 365 Services)&lt;/P&gt;&lt;P&gt;- Outside HTTPS to DMZ (ADFS Servers on DMZ only)&lt;/P&gt;&lt;P&gt;- DMZ HTTPS to inside (ADFS Servers Only)&lt;/P&gt;&lt;P&gt;-&amp;nbsp; Inside HTTPS to DMZ (ADFS Servers Only)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address ccl-sua-asa 255.255.255.0 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 172.16.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan100&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 77.107.90.202 255.255.255.248 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 100&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;description Connected to CCL-SUA-SW1 port 16&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 87.86.204.100 host 77.107.90.203 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound ACT for Ruth Edmonds Only&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any interface outside eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any interface outside eq 5022 inactive &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rules for OWA 30/06/09 MD&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.203 eq https log &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound access for LDAP and SMTP from mimecast 02/07/09 MD&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast interface outside eq ldap &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast host 77.107.90.203 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound remark change request MET 56030 inbound POP3 for mimecast&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast host 77.107.90.203 eq pop3 &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rule for helpdesk 10/07/2012 ML&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.205 eq https &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rule for survey 011012 ML&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.205 eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.40.0 255.255.255.0 192.168.245.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.40.0 255.255.255.0 192.168.252.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list vpn-met-bir extended permit ip 192.168.40.0 255.255.255.0 192.168.252.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip object-group servers 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip 192.168.40.0 255.255.255.0 192.168.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny udp any 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.41.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5022 192.168.41.1 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (outside,outside) tcp interface ssh 192.168.41.1 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www WEB www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ldap FILESERVER ldap netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 77.107.90.203 MAILSERVER netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 77.107.90.205 helpdesk netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 77.107.90.206 172.16.0.7 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 77.107.90.201 1&lt;/P&gt;&lt;P&gt;route inside 192.168.41.0 255.255.255.0 ccl-sua-sw1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like i mentioned I have already setup the DMZ itself but its just the NAT and rules im struggling to get working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;James&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:13:36 GMT</pubDate>
    <dc:creator>jpdalton1</dc:creator>
    <dc:date>2019-03-12T01:13:36Z</dc:date>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202705#M360289</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to Cisco firewalls and am attempting to setup a DMZ on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have managed to create the interface and vlan and ip address settings etc. But im a bit lost with the NAT settings and rules i need to create for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- RDP access from inside network to the DMZ servers&lt;/P&gt;&lt;P&gt;- Internet access for the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also setting up Active Directory Federation and requirre HTTPS traffic from the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- DMZ HTTPS to outside (Office 365 Services)&lt;/P&gt;&lt;P&gt;- Outside HTTPS to DMZ (ADFS Servers on DMZ only)&lt;/P&gt;&lt;P&gt;- DMZ HTTPS to inside (ADFS Servers Only)&lt;/P&gt;&lt;P&gt;-&amp;nbsp; Inside HTTPS to DMZ (ADFS Servers Only)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running Config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address ccl-sua-asa 255.255.255.0 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 172.16.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan100&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 77.107.90.202 255.255.255.248 &lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 100&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;description Connected to CCL-SUA-SW1 port 16&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp host 87.86.204.100 host 77.107.90.203 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound ACT for Ruth Edmonds Only&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any interface outside eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any interface outside eq 5022 inactive &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rules for OWA 30/06/09 MD&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.203 eq https log &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound access for LDAP and SMTP from mimecast 02/07/09 MD&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast interface outside eq ldap &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast host 77.107.90.203 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound remark change request MET 56030 inbound POP3 for mimecast&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp object-group mimecast host 77.107.90.203 eq pop3 &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rule for helpdesk 10/07/2012 ML&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.205 eq https &lt;/P&gt;&lt;P&gt;access-list inbound remark Inbound rule for survey 011012 ML&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 77.107.90.205 eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.40.0 255.255.255.0 192.168.245.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.40.0 255.255.255.0 192.168.252.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list vpn-met-bir extended permit ip 192.168.40.0 255.255.255.0 192.168.252.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip object-group servers 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip 192.168.40.0 255.255.255.0 192.168.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny udp any 192.168.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended deny ip any 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list outbound extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.41.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5022 192.168.41.1 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (outside,outside) tcp interface ssh 192.168.41.1 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www WEB www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ldap FILESERVER ldap netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 77.107.90.203 MAILSERVER netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 77.107.90.205 helpdesk netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 77.107.90.206 172.16.0.7 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 77.107.90.201 1&lt;/P&gt;&lt;P&gt;route inside 192.168.41.0 255.255.255.0 ccl-sua-sw1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like i mentioned I have already setup the DMZ itself but its just the NAT and rules im struggling to get working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;James&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202705#M360289</guid>
      <dc:creator>jpdalton1</dc:creator>
      <dc:date>2019-03-12T01:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202706#M360290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have only a ASA5505 Base License then you can initiate/open connections from the DMZ to INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can confirm the License level with "show version" command. It should read at the end of the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Base License you only have a restricted DMZ/3rd interface on the ASA. You can connect to it from anywhere BUT you have to limit it from connecting towards one of the other 2 intefaces. You have already done this with the command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which to my understanding is required to get the 3rd interface active when you only have Base License on ASA5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTSIDE -&amp;gt; DMZ&lt;/P&gt;&lt;P&gt;INSIDE -&amp;gt; DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connection initiating should be possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems to me that you already have one problem that will limit connectivity and not just the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already seem to have the Default PAT configuration for DMZ Internet traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont have the NAT for DMZ &amp;lt;-&amp;gt; INSIDE traffic but as mentioned above it might already be limited by something else even though your configurations were fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The corrent NAT configuration to enable that traffic would be to use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,dmz) &lt;INSIDE network=""&gt; &lt;INSIDE network=""&gt; netmask &lt;MASK&gt;&lt;/MASK&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Repeat for all &lt;STRONG&gt;&lt;INSIDE network=""&gt;&lt;/INSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Naturally you would also need an ACL on the DMZ interface for DMZ -&amp;gt; INSIDE traffic since the INSIDE is of higher "security-level". But as soon as you add the ACL to the DMZ interface you would also have to use it to allow Internet bound traffic since the "security-level" looses its meaning after an ACL is attached to the interface.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 10:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202706#M360290</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-13T10:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202707#M360291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The license is a Base License.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added a 'static' nat for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original ---&lt;/P&gt;&lt;P&gt;Interface: Inside&lt;/P&gt;&lt;P&gt;Source: inside-network/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Translated ---&lt;/P&gt;&lt;P&gt;Interface: dmz&lt;/P&gt;&lt;P&gt;Use IP Address: inside-network/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that all i need to do? What rules do i need to put in to perform the tasks i mentioned?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202707#M360291</guid>
      <dc:creator>jpdalton1</dc:creator>
      <dc:date>2013-03-13T11:22:42Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202708#M360292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I mentioned,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You wont be able to connect from DMZ to INSIDE with Base License.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So even if you made rules you could only&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Connect from DMZ to OUTSIDE&lt;/LI&gt;&lt;LI&gt;Connect from OUTSIDE to DMZ&lt;/LI&gt;&lt;LI&gt;Connect from INSIDE to DMZ&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And considering one of your requirements was to&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Connect from DMZ to INSIDE, which isnt possible at the moment with regards to the Base License&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from DMZ to OUTSIDE should already work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no point making ACLs for DMZ to INSIDE traffic as it wont work anyway on your current Base License&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202708#M360292</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-13T11:34:40Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202709#M360293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have managed to get RDP working to the DMZ servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot get the internet working on the DMZ servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202709#M360293</guid>
      <dc:creator>jpdalton1</dc:creator>
      <dc:date>2013-03-13T11:37:24Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202710#M360294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following configuration should already enable PAT translation from DMZ to OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (dmz) 1 172.16.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ Internet should work UNLESS its somehow dependant on connections to INSIDE. For example if you are using DNS servers on the DMZ hosts that are located behind INSIDE interface. This is because of the above mentioned limitation with your ASA license. DMZ cant initiate connections towards INSIDE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" command should confirm if all the ASA configuration are correct to enable Internet traffic for the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example command to simulate and DMZ connection could be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz tcp 172.16.0.100 12345 8.8.8.8 80 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202710#M360294</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-13T11:42:47Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202711#M360295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This is an error i have in the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Deny udp src dmz:vm-fedprx-01/60022 dst outside:85.159.128.20/53 by access-group "dmz_access_in" [0x0, 0x0]&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Deny udp src dmz:vm-fedprx-01/52428 dst outside:85.159.128.20/53 by access-group "dmz_access_in" [0x0, 0x0]&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202711#M360295</guid>
      <dc:creator>jpdalton1</dc:creator>
      <dc:date>2013-03-13T11:51:07Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202712#M360296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you have created an ACL for the "dmz" interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to allow UDP/53 which is DNS service through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in permit udp &lt;DMZ network=""&gt; &lt;MASK&gt; &lt;DNS server="" ip=""&gt; eq 53&lt;/DNS&gt;&lt;/MASK&gt;&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if you want to allow DNS querys to any DNS server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in permit udp &lt;DMZ network=""&gt; &lt;MASK&gt; any eq 53&lt;/MASK&gt;&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 11:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202712#M360296</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-13T11:54:14Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 DMZ Setup</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202713#M360297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That has all worked!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 12:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202713#M360297</guid>
      <dc:creator>jpdalton1</dc:creator>
      <dc:date>2013-03-13T12:04:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202714#M360298</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i have similar problem. I need to to do also www-server in dmz-area, that need to get connect to local area database server. i do have two&amp;nbsp;public internet ip-address bouth&amp;nbsp;has targeted ssl-certificate, we have cisco asa 5505 firewall unlimited security plus (this is outsourced service),&amp;nbsp;my question is it possible&amp;nbsp; to do that by using this one firewall or do i need to have two firewall?&amp;nbsp;can anyone give me hint about solution?&lt;/P&gt;
&lt;P&gt;thanks for helping me&amp;nbsp;with this.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Janne&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 05:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-dmz-setup/m-p/2202714#M360298</guid>
      <dc:creator>janne.mattila1</dc:creator>
      <dc:date>2016-06-08T05:02:51Z</dc:date>
    </item>
  </channel>
</rss>

