<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to Permit traffic from Outside to DMZ on ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123364#M392286</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change your "public" ACL to use the DMZ R1 actual IP address instead of the NAT IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In ASA software 8.2 and ealier you use the NAT IP address in the ACL statements&lt;/LI&gt;&lt;LI&gt;In ASA software 8.3 and after you use the Actual/Local IP address in the ACL statements&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words replace 7.7.7.7 in the ACL with 172.16.0.2 and you should be able to ping R1 from outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Jan 2013 22:08:42 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-23T22:08:42Z</dc:date>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123363#M392283</link>
      <description>&lt;P&gt;Hello, everyone, i am writing you for help me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have this Topology: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/5/1/126159-Topologia%20de%20ASA.jpg" alt="Topologia de ASA.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;R1 is as server and i want to public that server in INTERNET using public IP 7.7.7.7, but i can not do that. I tried to do a NAT but it just translate from DMZ to Outside, however i can not to ping to 7.7.7.7 from Outside (R2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a route in R2&lt;/P&gt;&lt;P&gt;7.7.7.7 [1/0] via 200.200.200.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On R2 i can´t ping to 7.7.7.7&lt;/P&gt;&lt;P&gt;On R2 i can´t ping to 172.16.0.2&lt;/P&gt;&lt;P&gt;On R1 i can ping to 200.200.200.2&lt;/P&gt;&lt;P&gt;On Inside i can ping to 172.16.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;when i try to ping from DMZ to Outside (200.200.200.2) the debug, and show nat details, show me:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)# nat: translation - dmz:172.16.0.2/26 to outside:7.7.7.7/26&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/26 to dmz:172.16.0.2/26&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/26 to dmz:172.16.0.2/26&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/26 to dmz:172.16.0.2/26&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh nat detail&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;1 (dmz) to (outside) source static obj-172.16.0.2 7.7.7.7&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;&amp;nbsp; translate_hits = 2, untranslate_hits = 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.16.0.2/32, Translated: 7.7.7.7/32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;When i try to ping from Outside to DMZ using public IP (7.7.7.7) the debug and show nat detail, show me:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# nat&lt;STRONG&gt;: untranslation&lt;/STRONG&gt; - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt;nat: untranslation - outside:7.7.7.7/0 to dmz:172.16.0.2/0&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh nat det&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Auto NAT Policies (Section 2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;1 (dmz) to (outside) source static obj-172.16.0.2 7.7.7.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, &lt;STRONG&gt;untranslate_hits = 7&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 172.16.0.2/32, Translated: 7.7.7.7/32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;In ASA my configuration is this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 200.200.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network obj-172.16.0.2&lt;/P&gt;&lt;P&gt; host 172.16.0.2&lt;/P&gt;&lt;P&gt;access-list pingc extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list pingc extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list pingc extended permit tcp any host 200.200.200.2 eq www&lt;/P&gt;&lt;P&gt;access-list pingc extended permit icmp any host 200.200.200.2&lt;/P&gt;&lt;P&gt;access-list pingc extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list webicmp extended permit tcp 192.168.1.0 255.255.255.0 host 172.16.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list webicmp extended permit icmp 192.168.1.0 255.255.255.0 host 172.16.0.2&lt;/P&gt;&lt;P&gt;access-list webicmp extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list public extended permit tcp any host 7.7.7.7 eq www&lt;/P&gt;&lt;P&gt;access-list public extended permit icmp any host 7.7.7.7&lt;/P&gt;&lt;P&gt;access-list public extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list public extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list public extended deny ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-172.16.0.2&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static 7.7.7.7&lt;/P&gt;&lt;P&gt;access-group webicmp in interface inside&lt;/P&gt;&lt;P&gt;access-group pingc in interface dmz&lt;/P&gt;&lt;P&gt;access-group public in interface outside&lt;/P&gt;&lt;P&gt;route dmz 7.7.7.7 255.255.255.255 172.16.0.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;crashinfo save disable&lt;/P&gt;&lt;P&gt;Cryptochecksum:5d5522548310b4842b3b21003cc3470a&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot, I hope that you help me.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123363#M392283</guid>
      <dc:creator>diegoleyes</dc:creator>
      <dc:date>2019-03-12T00:51:27Z</dc:date>
    </item>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123364#M392286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change your "public" ACL to use the DMZ R1 actual IP address instead of the NAT IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In ASA software 8.2 and ealier you use the NAT IP address in the ACL statements&lt;/LI&gt;&lt;LI&gt;In ASA software 8.3 and after you use the Actual/Local IP address in the ACL statements&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words replace 7.7.7.7 in the ACL with 172.16.0.2 and you should be able to ping R1 from outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 22:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123364#M392286</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-23T22:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123365#M392289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And in addition to the ACL-change that Jouni told you, you should also enable ICMP-inspection:&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect icmp&lt;BR /&gt;&lt;BR /&gt;With that you don't need to allow the echo-reply statically in your ACLs.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 06:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123365#M392289</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-01-24T06:50:30Z</dc:date>
    </item>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123366#M392292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, thank you so much for answer!!!!!!!!!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed that, and it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R2#ping 7.7.7.7&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Type escape sequence to abort.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 7.7.7.7, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 16:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123366#M392292</guid>
      <dc:creator>diegoleyes</dc:creator>
      <dc:date>2013-01-24T16:02:05Z</dc:date>
    </item>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123367#M392295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to know its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate any answers you have found helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as Karsten stated earlier. The "inspect icmp" is good to have on the firewall so you dont have to allow ICMP return traffic on an ACL because the inspect handles that automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 16:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123367#M392295</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-24T16:09:28Z</dc:date>
    </item>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123368#M392298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, i already did that. All pings works. Now my access lists are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list pingc extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list pingc extended permit tcp any host 200.200.200.2 eq www&lt;/P&gt;&lt;P&gt;access-list pingc extended permit icmp any host 200.200.200.2&lt;/P&gt;&lt;P&gt;access-list pingc extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list webicmp extended permit tcp 192.168.1.0 255.255.255.0 host 172.16.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list webicmp extended permit icmp 192.168.1.0 255.255.255.0 host 172.16.0.2&lt;/P&gt;&lt;P&gt;access-list webicmp extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list public extended permit tcp any host 172.16.0.2 eq www&lt;/P&gt;&lt;P&gt;access-list public extended permit icmp any host 172.16.0.2&lt;/P&gt;&lt;P&gt;access-list public extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list public extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is already everything ok?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 16:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123368#M392298</guid>
      <dc:creator>diegoleyes</dc:creator>
      <dc:date>2013-01-24T16:22:18Z</dc:date>
    </item>
    <item>
      <title>How to Permit traffic from Outside to DMZ on ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123369#M392300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess if the ICMP is going through now then your original problem has been solved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there something else thats not working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you are running this ASA Configuration on GNS3 (Though I havent really used it myself)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some usual configuration that you are missing are&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default PAT configuration&lt;/LI&gt;&lt;LI&gt;Default route&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the route for "dmz" is not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you are just testing things the above dont really matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2013 16:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-permit-traffic-from-outside-to-dmz-on-asa-8-4/m-p/2123369#M392300</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-24T16:32:46Z</dc:date>
    </item>
  </channel>
</rss>

