<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.1 Inside To DMZ Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146568#M361216</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So i tryied adding the rules mentioned above and managed to lock myself out of the asa and it started acting very weird.&amp;nbsp; Sometimes i could ping the asa gateway and sometimes i couldn't.&amp;nbsp; Also, ASDM would not load anymore so I consoled in and did a write erase. I redid the config with NO ACLS and the config is now back to what is posted.&amp;nbsp; I still have NO DMZ access from internal network.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Mar 2013 16:36:49 GMT</pubDate>
    <dc:creator>mthomas1999</dc:creator>
    <dc:date>2013-03-01T16:36:49Z</dc:date>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146555#M361203</link>
      <description>&lt;P&gt;Hello, I recently upgraded my asa from 8.2 to 9.1 (reconfigured from scratch - didnot convert old config) and everything seems to be working fine except for communication between my INTERNAL network and my DMZ.&amp;nbsp; Any help would be greatly appreciated.&amp;nbsp; Here's my config below -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ZEPPELIN&lt;/P&gt;&lt;P&gt;domain-name MIWEBPORTAL.com&lt;/P&gt;&lt;P&gt;enable password XXXXX&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd FClk4V74ruL1dFGo encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description ISP-MODEM&lt;/P&gt;&lt;P&gt; switchport access vlan 20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description INTERNAL-NET&lt;/P&gt;&lt;P&gt; switchport access vlan 19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description INTERNAL-NET&lt;/P&gt;&lt;P&gt; switchport access vlan 19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; description INTERNAL-NET&lt;/P&gt;&lt;P&gt; switchport access vlan 19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; description INTERNAL-NET&lt;/P&gt;&lt;P&gt; switchport access vlan 19&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; switchport access vlan 99&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; switchport access vlan 99&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan19&lt;/P&gt;&lt;P&gt; description INTERNAL-NET&lt;/P&gt;&lt;P&gt; nameif MYNETWORK&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.19.19.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;/P&gt;&lt;P&gt; description DHCP-MODEM-INTERNET&lt;/P&gt;&lt;P&gt; mac-address XXX&lt;/P&gt;&lt;P&gt; nameif INTERNET&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan99&lt;/P&gt;&lt;P&gt; description DMZ-NET&lt;/P&gt;&lt;P&gt; no forward interface Vlan19&lt;/P&gt;&lt;P&gt; nameif MYDMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.99.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name MIWEBPORTAL.com&lt;/P&gt;&lt;P&gt;object network MYNETWORK&lt;/P&gt;&lt;P&gt; subnet 172.19.19.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network MYDMZ&lt;/P&gt;&lt;P&gt; subnet 192.168.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu MYNETWORK 1500&lt;/P&gt;&lt;P&gt;mtu INTERNET 1500&lt;/P&gt;&lt;P&gt;mtu MYDMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-712.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network MYNETWORK&lt;/P&gt;&lt;P&gt; nat (MYNETWORK,INTERNET) dynamic interface&lt;/P&gt;&lt;P&gt;object network MYDMZ&lt;/P&gt;&lt;P&gt; nat (MYDMZ,INTERNET) dynamic interface&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable 1999&lt;/P&gt;&lt;P&gt;http 172.19.19.0 255.255.255.0 MYNETWORK&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.19.19.0 255.255.255.0 MYNETWORK&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt;dhcpd lease 691200&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.19.19.18-172.19.19.28 MYNETWORK&lt;/P&gt;&lt;P&gt;dhcpd enable MYNETWORK&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.99.9-192.168.99.19 MYDMZ&lt;/P&gt;&lt;P&gt;dhcpd enable MYDMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username XXXX password xxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; message-length maximum client auto&lt;/P&gt;&lt;P&gt; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; inspect ftp&lt;/P&gt;&lt;P&gt; inspect h323 h225&lt;/P&gt;&lt;P&gt; inspect h323 ras&lt;/P&gt;&lt;P&gt; inspect ip-options&lt;/P&gt;&lt;P&gt; inspect netbios&lt;/P&gt;&lt;P&gt; inspect rsh&lt;/P&gt;&lt;P&gt; inspect rtsp&lt;/P&gt;&lt;P&gt; inspect skinny&lt;/P&gt;&lt;P&gt; inspect esmtp&lt;/P&gt;&lt;P&gt; inspect sqlnet&lt;/P&gt;&lt;P&gt; inspect sunrpc&lt;/P&gt;&lt;P&gt; inspect tftp&lt;/P&gt;&lt;P&gt; inspect sip&lt;/P&gt;&lt;P&gt; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt; destination transport-method http&lt;/P&gt;&lt;P&gt; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:5c772fc57a4aaf9546d3a28527c1ca06&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146555#M361203</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2019-03-12T01:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146556#M361204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which direction are we talking about? Who is initiating the connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the other direction there is an obvious reason (bolded command)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="position: absolute; top: -1999px; left: -1988px;"&gt;no forward interface Vlan19&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan99&lt;/P&gt;&lt;P&gt; description DMZ-NET&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;no forward interface Vlan19&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; nameif MYDMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.99.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; No host from DMZ can initiate connections to INTERNAL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERNAL however should be able to initiate connections to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you have a Base License ASA5505 since it has the limitation that if you want to configure a 3rd interface it will be a DMZ interface from which you have to limit traffic to one of the other two Vlan interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146556#M361204</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-27T19:22:10Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146557#M361205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your topic says its "inside" to "dmz"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I cant see a reason why INTERNAL to DMZ initiated connections wouldnt work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the "packet-tracer" command to simulate some connection though and see what firewall rules it hits and if the connection will pass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input MYNETWORK tcp 172.19.19.100 1234 192.168.99.100 80 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146557#M361205</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-27T19:28:05Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146558#M361206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;okay thanks, couldn't see why it wouldn't work either.&amp;nbsp; I will try a packet trace when i get home and post the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146558#M361206</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-27T19:35:10Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146559#M361207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you think this config would allow DMZ access from Internal (suggested from another site) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network INTERNAL2DMZ&lt;BR /&gt; subnet 172.19.19.0 255.255.255.0&lt;BR /&gt; &lt;BR /&gt; &lt;/P&gt;&lt;P&gt; object network INDMZ&lt;/P&gt;&lt;P&gt; 172.19.19.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (MYNETWORK,MYDMZ) static INTERNAL2DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 19:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146559#M361207</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-27T19:42:03Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146560#M361208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need to configure NAT between 2 local interfaces/networks of the ASA if you specifically dont want any translations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both of your existing NAT configurations are for both INTERNAL and DMZ to INTERNET so they shouldnt affect the traffic between INTERNAL and DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 20:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146560#M361208</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-27T20:18:39Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146561#M361209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the results of the packet trace from my asa 5505 (9.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZEPPELIN# packet-tracer input MYNETWORK tcp 172.19.19.29 1234 192.168.99.9 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.99.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; MYDMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group MYNETWORK_access_in in interface MYNETWORK&lt;/P&gt;&lt;P&gt;access-list MYNETWORK_access_in extended deny ip object Media-PC any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: MYNETWORK&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: MYDMZ&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZEPPELIN#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 19:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146561#M361209</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-28T19:39:16Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146562#M361210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration you copy/pasted in the original post doesnt have any mention of ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" in this case says clearly that this traffic is blocked by an interface ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically a ACL rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="position: absolute; top: -1999px; left: -1988px;"&gt;&lt;SPAN&gt;access-list&amp;nbsp; MYNETWORK_access_in extended deny ip object Media-PC any - See more at:&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2202200"&gt;https://supportforums.cisco.com/thread/2202200?tstart=0#sthash.UoROadCV.dpuf&lt;/A&gt;&lt;/DIV&gt;&lt;DIV style="position: absolute; top: -1999px; left: -1988px;"&gt;&lt;SPAN&gt;access-list&amp;nbsp; MYNETWORK_access_in extended deny ip object Media-PC any - See more at:&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2202200"&gt;https://supportforums.cisco.com/thread/2202200?tstart=0#sthash.UoROadCV.dpuf&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;&lt;STRONG&gt;access-list MYNETWORK_access_in extended deny ip object Media-PC any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And its attached to the MYNETWORK interface with command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group MYNETWORK_access_in in interface MYNETWORK &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 19:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146562#M361210</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-28T19:44:10Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146563#M361211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay i added that ACL to block internet from my Media-PC. If i remove that rule it should allow access to MYDMZ?&amp;nbsp; I pretty sure i tested access to my dmz before i added that rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146563#M361211</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-28T20:23:49Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146564#M361212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you block traffic with "deny ip object &lt;OBJECT name=""&gt; any" it will block any TCP/UDP traffic to anywhere no matter what the destination IP address.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you dont have any rule before that rule to allow traffic from MYNETWORK to MYDMZ then that rule will block any traffic the host initiates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to have the following rule to first allow traffic to DMZ and then block all other traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list MYNETWORK_access_in remark Allow traffic from Media-PC to MYDMZ&lt;/P&gt;&lt;DIV style="position: absolute; top: -1999px; left: -1988px;"&gt;&lt;SPAN&gt;access-list&amp;nbsp; MYNETWORK_access_in extended deny ip object Media-PC any&amp;nbsp; - See more&amp;nbsp; at:&amp;nbsp; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2202200"&gt;https://supportforums.cisco.com/thread/2202200?tstart=0#sthash.OwNkb23t.dpuf&lt;/A&gt;&lt;/DIV&gt;&lt;P&gt;access-list MYNETWORK_access_in extended permit ip object Media-PC 192.168.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list MYNETWORK_access_in remark Deny all other traffic from Media-PC&lt;/P&gt;&lt;P&gt;access-list MYNETWORK_access_in extended deny ip object Media-PC any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146564#M361212</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-28T20:29:23Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146565#M361213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do i keep that ACL in place and allow access to the DMZ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146565#M361213</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-28T20:29:40Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146566#M361214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you add the rules I mentioned in the earlier reply to the top of the ACL mentioned then Media-PC could access DMZ but nothing else past the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:31:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146566#M361214</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-28T20:31:34Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146567#M361215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay thank you very much, i will give it a try when i get home and post the results. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146567#M361215</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-02-28T20:33:45Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146568#M361216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So i tryied adding the rules mentioned above and managed to lock myself out of the asa and it started acting very weird.&amp;nbsp; Sometimes i could ping the asa gateway and sometimes i couldn't.&amp;nbsp; Also, ASDM would not load anymore so I consoled in and did a write erase. I redid the config with NO ACLS and the config is now back to what is posted.&amp;nbsp; I still have NO DMZ access from internal network.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 16:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146568#M361216</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-03-01T16:36:49Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146569#M361217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have the configuration from the original post with no ACLs configured to the interfaces then you should be able to connect from MYNETWORK hosts to MYDMZ hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using ICMP/PING to test traffic between hosts I would suggest configuring the following setting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically the "inspect icmp" which allows ICMP Echo replys back automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 16:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146569#M361217</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-01T16:45:35Z</dc:date>
    </item>
    <item>
      <title>ASA 9.1 Inside To DMZ Access</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146570#M361218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;okay will do.&amp;nbsp; I was testing it via ping to the only computer i have in the DMZ (192.168.99.9) but have also tried disabling the local firewall on the PC and accessing it through a share.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2013 16:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-inside-to-dmz-access/m-p/2146570#M361218</guid>
      <dc:creator>mthomas1999</dc:creator>
      <dc:date>2013-03-01T16:48:54Z</dc:date>
    </item>
  </channel>
</rss>

