<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing DMZ &amp;lt;-&amp;gt; INSIDE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126849#M392727</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought i have to add the last line of the dmz_inside acl to allow the reverse traffic from inside ip addresses to dmz addresses. &lt;/P&gt;&lt;P&gt;Here is the output of the packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input dmz tcp 10.0.254.70 55555 10.0.1.70 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group dmz_inside in interface dmz&lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit tcp host 10.0.254.70 host 10.0.1.70 eq www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: dmz&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It seems to be fine but I cannot open a website from 10.0.254.70 on 10.0.1.70.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Jan 2013 15:56:58 GMT</pubDate>
    <dc:creator>Stephan-Wild</dc:creator>
    <dc:date>2013-01-16T15:56:58Z</dc:date>
    <item>
      <title>Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126845#M392712</link>
      <description>&lt;P&gt;Hey together,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a little problem creating a network infrastucture with an "inside", "dmz" and an "outside" network on my ASA5512-x 8.6(1).&lt;/P&gt;&lt;P&gt;I have have clients and servers with the networks 10.0.1.0/24, 10.0.2.0/24 until 10.0.12.0/24 on my inside interface. Then I have two servers 10.0.254.50/24 for SMTP and 10.0.254.70/24 for HTTPS in my dmz network. The outside interface is one static IP to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the interfaces with the security-levels 0 (outside), 50 (dmz) and 100 (inside).&lt;/P&gt;&lt;P&gt;There are object-groups for the inside networks, an object for inside_mail_server,dmz_mail_server and the same for the webservers and objects for the PAT services.&lt;/P&gt;&lt;P&gt;The nat configuration at the time is very simple (the nat exemption for l2l vpn and RA vpn are not in the following listing). I do a forwarding from outside to dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (outside,dmz) source static any any destination static interface dmz_web_server service pat_https pat_https&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (outside,dmz) source static any any destination static interface dmz_mail_server service pat_smtp pat_smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (inside,outside) source dynamic inside_net interface&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (dmz,outside) source dynamic dmz_net interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list for the forwarding is:&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in extended permit tcp any any eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This works very fine but now I want to allow access from the dmz-servers to inside-servers. I tried an access-list "permit tcp host dmz_web_server host inside_web_server eq https" and I bound it to "in interface dmz" &lt;/P&gt;&lt;P&gt;I cannot access the dmz servers from my inside network and from dmz to inside. &lt;/P&gt;&lt;P&gt;If it is possible, I don't want to use translation between inside and dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126845#M392712</guid>
      <dc:creator>Stephan-Wild</dc:creator>
      <dc:date>2019-03-12T00:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126846#M392716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the newer softwares dont require any NAT configurations from you for the traffic between your own private networks if you dont specifically need/want a NAT for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would personally suggest a different NAT to accomplish the above mentioned configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give examples below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Static PAT / Port Forwarding&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DMZ-HTTPS&lt;/P&gt;&lt;P&gt; host 10.10.20.10&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static interface service tcp 443 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DMZ-SMTP&lt;/P&gt;&lt;P&gt; host 10.10.20.20&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static interface service tcp 25 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10.10.20.10 and 10.10.20.20 = Example IP addresses&lt;/LI&gt;&lt;LI&gt;"dmz" and "outside" = example interface names&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT for both LAN and DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;nat (dmz,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DEFAULT-PAT-SOURCE = Defines the source addresses for the PAT translations&lt;/LI&gt;&lt;LI&gt;"after-auto" = Moves the Default PAT rules to the Section 3 of the ASAs NAT rules &lt;UL&gt;&lt;LI&gt;They will be matched the last if no other Section 1 and Section 2 rule match them&lt;/LI&gt;&lt;LI&gt;Section 1 = Twice NAT and Section 2 = Object NAT&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a slight chance that the NAT0 type configuration might be also messing with the LAN - DMZ traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally I would avoid using "any" either as defining the "source"/"destination" address or the interfaces in the NAT configurations. They can cause problems with traffic passing through the ASA because they can match traffic they arent supposed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull and/or ask more questions if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 14:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126846#M392716</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T14:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126847#M392720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I reconfigured my test ASA with the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 15:04:40.849 UTC Wed Jan 16 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.170 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.0.254.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network DMZ-HTTPS&lt;/P&gt;&lt;P&gt; host 10.0.254.70&lt;/P&gt;&lt;P&gt;object network DMZ-SMTP&lt;/P&gt;&lt;P&gt; host 10.0.254.50&lt;/P&gt;&lt;P&gt;object-group network INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt; network-object 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.0.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.0.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.0.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.0.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DMZ_NETWORKS&lt;/P&gt;&lt;P&gt; network-object 10.0.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DEFAULT_PAT_SOURCE&lt;/P&gt;&lt;P&gt; group-object INSIDE_NETWORKS&lt;/P&gt;&lt;P&gt; group-object DMZ_NETWORKS&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit tcp host 10.0.254.50 host 10.0.1.50 eq smtp &lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit tcp host 10.0.254.70 host 10.0.1.70 eq www &lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit tcp host 10.0.254.70 host 10.0.1.70 eq https &lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit ip object-group INSIDE_NETWORKS object-group DMZ_NETWORKS &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network DMZ-HTTPS&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static interface service tcp www www &lt;/P&gt;&lt;P&gt;object network DMZ-SMTP&lt;/P&gt;&lt;P&gt; nat (dmz,outside) static interface service tcp smtp smtp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT_PAT_SOURCE interface&lt;/P&gt;&lt;P&gt;nat (dmz,outside) after-auto source dynamic DEFAULT_PAT_SOURCE interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_inside in interface dmz&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.169 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the https to www for testing. I can access from inside, dmz to outside from outside to dmz from inside to dmz but not from dmz to inside. What is my fault?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 15:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126847#M392720</guid>
      <dc:creator>Stephan-Wild</dc:creator>
      <dc:date>2013-01-16T15:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126848#M392723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration seems fine to me for the most part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I did notice that you have configured your INSIDE networks as the source and DMZ as the destination in your "dmz" ACL. I presume you were meaning to configure it the other way around?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe the traffic is getting blocked by the ACL still?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try the following command to confirm what the ASA does to your traffic (even though I can see your configuration but I cant be sure on the source and destination IP address you are using for tests)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input dmz tcp &lt;DMZ source="" ip=""&gt; &lt;RANDOM source="" port=""&gt; &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/RANDOM&gt;&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the command with the correct IPs and Ports you want and copy/paste the output from CLI to here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 15:46:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126848#M392723</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T15:46:13Z</dc:date>
    </item>
    <item>
      <title>Re: Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126849#M392727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought i have to add the last line of the dmz_inside acl to allow the reverse traffic from inside ip addresses to dmz addresses. &lt;/P&gt;&lt;P&gt;Here is the output of the packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input dmz tcp 10.0.254.70 55555 10.0.1.70 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group dmz_inside in interface dmz&lt;/P&gt;&lt;P&gt;access-list dmz_inside extended permit tcp host 10.0.254.70 host 10.0.1.70 eq www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: dmz&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; It seems to be fine but I cannot open a website from 10.0.254.70 on 10.0.1.70.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 15:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126849#M392727</guid>
      <dc:creator>Stephan-Wild</dc:creator>
      <dc:date>2013-01-16T15:56:58Z</dc:date>
    </item>
    <item>
      <title>Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126850#M392731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything seems to be fine regarding the firewall on the basis of that output atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you check the firewall logs through ASDM or the CLI when you are attempting the actual HTTP connection between the 2 hosts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The logging level would need to be atleast "informational"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you would be looking for log messages starting with "Built outbound/inbound TCP connection" and "Teardown TCP connection"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the Teardown message reason is SYN Timeout the inside host is not responding to the connection forming attempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 16:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126850#M392731</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T16:13:39Z</dc:date>
    </item>
    <item>
      <title>Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126851#M392735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm so sorry. After a long time configuring a firewall and servers... &lt;/P&gt;&lt;P&gt;I had an error in my inside webserver ip address. Everything is working fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very very much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry again for my mistake.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 16:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126851#M392735</guid>
      <dc:creator>Stephan-Wild</dc:creator>
      <dc:date>2013-01-16T16:31:07Z</dc:date>
    </item>
    <item>
      <title>Routing DMZ &lt;-&gt; INSIDE</title>
      <link>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126852#M392739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem Stephan. Main thing is that its working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 16:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-dmz-lt-gt-inside/m-p/2126852#M392739</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-16T16:32:33Z</dc:date>
    </item>
  </channel>
</rss>

