<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212231#M391852</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not configured yet.&amp;nbsp;&amp;nbsp; I played around with it and it would not come up.&amp;nbsp;&amp;nbsp; I know it's a different paradigm but I was hoping for someone to show me a configuration they had done which allows the device in the diagram to build it's VPN connectivity using the ASA with only&amp;nbsp; a single outside IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 12 May 2013 18:41:16 GMT</pubDate>
    <dc:creator>patrick.hurley</dc:creator>
    <dc:date>2013-05-12T18:41:16Z</dc:date>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - Only one Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212227#M391848</link>
      <description>&lt;P&gt;I am using a Cisco E4200 router today but I am moving to a ASA5505.&amp;nbsp;&amp;nbsp; I have a device that sets up a VPN tunnel that I want to put in my DMZ.&amp;nbsp;&amp;nbsp; It's called the ATT Gateway.&amp;nbsp; I have attached the diagram.&amp;nbsp;&amp;nbsp; When I use a Cisco E4200 all I do is put the outside private ip address of 192.168.0.99 of the ATT Gateway into the DMZ of the E4200 and the VPN tunnel of the ATT Gateway comes right up.&amp;nbsp;&amp;nbsp; I cannot configure the DMZ to do the same with the ASA.&amp;nbsp;&amp;nbsp; I also need to have the laptop behind the gateway access the printers in the inside network.&amp;nbsp;&amp;nbsp; Any document or advice that anyone has that addresses similar situations?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212227#M391848</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2019-03-12T01:42:06Z</dc:date>
    </item>
    <item>
      <title>DMZ Configuration Question ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212228#M391849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not completely sure about the setup and the configurations of the ASA5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally if you have setting up some VPN connection from a device behind ASA I would configure a dedicated public IP address for the VPN device through the use of Static NAT on the ASA5505. Ofcourse if the public address space gives the chance then even better choice is to have the public subnet directly configured between the ASA DMZ and the actual VPN device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing that concerns me is that fact that we are using an ASA5505. What license do you have on it? Because the Base License only allows for 3 Vlan interfaces and one of those interfaces has to be limited to be able to initiate connections to ONLY ONE of the other 2 interfaces. (This by itself might make the above setup impossible, depending what kind of VPN setup you are doing and how the public IP addresses is done on the ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 11:02:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212228#M391849</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T11:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Configuration Question ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212229#M391850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only have one public IP address.&amp;nbsp; I have security plus license.&amp;nbsp;&amp;nbsp; This is a small home office.&amp;nbsp; I am just trying to recreate the DMZ capability I have with my Cisco E4200 on the ASA 5505.&amp;nbsp;&amp;nbsp; Were you able to review the diagram?&amp;nbsp; Are you familar with Cisco Linksys DMZ configurations?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 17:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212229#M391850</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T17:30:18Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212230#M391851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not used the Linksys devices. I guess they are Ciscos devices aimed at consumers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that the ATT Gateway automatically forms a VPN connection to the some device on the Internet as soon as it has connectivity to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would probably be best to check your ASA configuration for any possible problems with the basic configurations. Can you share the ASA configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 18:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212230#M391851</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T18:06:49Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212231#M391852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not configured yet.&amp;nbsp;&amp;nbsp; I played around with it and it would not come up.&amp;nbsp;&amp;nbsp; I know it's a different paradigm but I was hoping for someone to show me a configuration they had done which allows the device in the diagram to build it's VPN connectivity using the ASA with only&amp;nbsp; a single outside IP address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 18:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212231#M391852</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T18:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212232#M391853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt; Can you please paste the configuration on the ASA?&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 18:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212232#M391853</guid>
      <dc:creator>Ionut.Hristea</dc:creator>
      <dc:date>2013-05-12T18:51:30Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - O</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212233#M391854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The very basic configurations to get Internet connections working for all users would for example be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Interfaces / Routing&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip add 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address &lt;IP&gt; &lt;MASK&gt; (with static ip)&lt;/MASK&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt; ip address dhcp setroute (with dhcp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip add 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description DMZ - ATT Gateway&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;IP&gt; (if static ip on interface "outside")&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;route dmz 172.20.20.20.0 255.255.255.0 192.168.5.2 (if the network behind ATT should be visible to the rest of the network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT Rules&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If using software 8.2 or below&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat-ctonrol&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 remark NAT0 between local networks&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.0.0 255.255.255.0 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 permit ip 192.168.0.0 255.255.255.0 172.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;If using software 8.3 or above&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ICMP Inspection&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol icmp&lt;/P&gt;&lt;P&gt;fixup protocol icmp error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those are some very basic configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 18:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212233#M391854</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T18:58:17Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - O</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212234#M391856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jouni.&amp;nbsp;&amp;nbsp;&amp;nbsp; That's what I need to get me started for sure.&amp;nbsp; How do I expose 192.168.5.2 ports (all of them as that is&amp;nbsp; the configuration they recommend) as if it was the public IP address of the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 19:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212234#M391856</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T19:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212235#M391858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest if we configured the public IP address on the "outside" interface of the ASA to be used only by the ATT device (Static NAT) then we would not have anything to NAT/PAT the LAN devices to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 8.2 or below software as an alternative we would have to forward port by port to my understanding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the 8.3 or above software as an alternative we could forward ranges of ports to the DMZ device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above NAT configuration only enable the ATT device to open connections to the Internet. It doesnt enable any connections from the Internet towards that device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 19:40:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212235#M391858</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T19:40:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212236#M391860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the configuration now.&amp;nbsp; I can't get the tunnel to come up.&amp;nbsp; will my other device that I have the outside interface pulled into ignore the vlan tag for vlan 2?&amp;nbsp;&amp;nbsp; I think I might have an issue there too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.05.12 12:52:32 =~=~=~=~=~=~=~=~=~=~=~=&lt;BR /&gt;sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(3) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;speed 100&lt;BR /&gt;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;speed 100&lt;BR /&gt;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.0.99 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa843-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Netgate&lt;BR /&gt;host 192.168.5.2&lt;BR /&gt;object network A_192.168.0.1&lt;BR /&gt;host 192.168.0.1&lt;BR /&gt;access-list outside_access_in extended permit ip any object Netgate &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any interface inside &lt;BR /&gt;access-list dmz_access_in extended permit ip any interface outside &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-712.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network Netgate&lt;BR /&gt;nat (dmz,outside) static A_192.168.0.1&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;BR /&gt;route dmz 172.20.20.0 255.255.255.0 192.168.5.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.5.0 255.255.255.0 dmz&lt;BR /&gt;http 172.20.20.0 255.255.255.0 dmz&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.5.0 255.255.255.0 dmz&lt;BR /&gt;ssh 172.20.20.0 255.255.255.0 dmz&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 12&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ph1819 password Jw8sD68tfrYmonI4 encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:ed8c7f20fb793c3500a71d442812e377&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 19:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212236#M391860</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T19:55:04Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - O</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212237#M391862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ ACL doesnt really allow traffic through the ASA at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the current configuration doesnt seem to match the PDF document. There to my understanding the network 192.168.0.0/24 was the "inside" network and the ASA "outside" had the public IP address directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 20:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212237#M391862</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T20:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212238#M391863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are right on the 2nd paragraph.&amp;nbsp; I was afraid to tear apart my network to install the ASA only to find out it couldn't do the DMZ piece correctly.&amp;nbsp;&amp;nbsp; I am trying to get the ATT Gateway to work before I tear it a part.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I fix the DMZ ACL that you mention in the first paragraph?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 20:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212238#M391863</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T20:08:37Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - O</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212239#M391865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To have the ASA allow traffic from behind the DMZ interface you would need something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip 192.168.5.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in extended permit ip 172.20.20.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided you want to allow all TCP/UDP traffic from the DMZ networks to anywhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 20:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212239#M391865</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T20:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212240#M391866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; is there a brief book that you'd recommend that explains basic operations of the asa?&amp;nbsp;&amp;nbsp; I have two from 2005 and 2006 and they are both old and 800 pages long.&amp;nbsp; LOL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the new configuration.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.05.12 13:17:48 =~=~=~=~=~=~=~=~=~=~=~=&lt;BR /&gt;sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(3) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.0.99 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa843-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Netgate&lt;BR /&gt; host 192.168.5.2&lt;BR /&gt;object network A_192.168.0.1&lt;BR /&gt; host 192.168.0.1&lt;BR /&gt;access-list outside_access_in extended permit ip any object Netgate &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any interface inside &lt;BR /&gt;access-list dmz_access_in extended permit ip any interface outside &lt;BR /&gt;access-list dmz_access_in extended permit ip 192.168.5.0 255.255.255.0 any &lt;BR /&gt;access-list dmz_access_in extended permit ip 172.20.20.0 255.255.255.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-712.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Netgate&lt;BR /&gt; nat (dmz,outside) static A_192.168.0.1&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;BR /&gt;route dmz 172.20.20.0 255.255.255.0 192.168.5.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.5.0 255.255.255.0 dmz&lt;BR /&gt;http 172.20.20.0 255.255.255.0 dmz&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.5.0 255.255.255.0 dmz&lt;BR /&gt;ssh 172.20.20.0 255.255.255.0 dmz&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 12&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username ph1819 password Jw8sD68tfrYmonI4 encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:095d696ddb6c7913583dfc0f0534b16f&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 20:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212240#M391866</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-12T20:21:17Z</dc:date>
    </item>
    <item>
      <title>ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration - O</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212241#M391867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest I started with Cisco firewalls without knowing anything about them and without having as much as a single course about them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did my final work at school about a small business network with Cisco PIX firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used the graphical configuration tool to configure the basic settings and then used the CLI to change the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I finally got my current job I basically had to start going through existing configurations and eventually learn how everything works. Every problem that I faced always teached my something new. Eventually I started regularly using the Configuration Guide and Command Reference documents found for every software level of the firewalls. These are a great supporting document when configuring the firewall. But to be honest I wish sometimes that they went more into the subject that they currently do OR that Cisco would release some thorough documents which I am sure they must have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I cant really suggest a book for you since I have never read one related to firewalls. Currently I am reading myself a couple of 700 pages books related to routing for my certification exams that I decided to start. Though they arent really required from my employers perspective but though I might as well get some of them now that I have several years of expirience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to check the different Configuration Guides and Command References, check these links&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration Guide&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_installation_and_configuration_guides_list.html"&gt;http://www.cisco.com/en/US/products/ps6120/products_installation_and_configuration_guides_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command Reference&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/prod_command_reference_list.html"&gt;http://www.cisco.com/en/US/products/ps6120/prod_command_reference_list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is also a wealth of information online that can be found just Googling around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally this forum is also a good place. But related to this situation we would really need to know exactly what the configuration should do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem for me is that I am not sure how your Linksys is actually handling the traffic and with 1 public IP address. By the things you say it would almost seem that there should be some Port Forward / Static PAT configurations but that would also be something that you should remember configuring and I dont know how the device would automate that simple configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have some screen captures of the Linksys configurations? I imagine its configured through some graphical interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 May 2013 21:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212241#M391867</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-12T21:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 DMZ Configuration vs Linksys E4200 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212242#M391868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Let me put some screen shots together but basically I have been using Linksys for home networking forever and you can put one private IP address in what is called the DMZ but it's not really.&amp;nbsp;&amp;nbsp; They then allow all ports open from the public side to that private IP address without blocking anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 May 2013 01:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-dmz-configuration-vs-linksys-e4200-dmz-configuration/m-p/2212242#M391868</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2013-05-13T01:16:01Z</dc:date>
    </item>
  </channel>
</rss>

