<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038090#M398595</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ok.. in that case that nat has to be constructed a sbelow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,outside) tcp interface http &lt;PRIVATE ip="" of="" dmz="" server=""&gt; http netmask 255.255.55.255&lt;/PRIVATE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any interface outside eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;but I think this is not possible if you have multiple servers with same service but possible with multiple servers with different service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example 192.168.100.1 - FTP,&amp;nbsp; 192.168.100.2 - SMTP etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Sep 2012 06:43:57 GMT</pubDate>
    <dc:creator>Harish Balakrishnan</dc:creator>
    <dc:date>2012-09-28T06:43:57Z</dc:date>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring dual ISP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038084#M398589</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I add the below configuration in our ASA config so I can use the ISP2 to browse the internet using port 80 &amp;amp; 443 only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route ISP1 0 0 1.1.1.2 // Default route pointing to ISP1&lt;/P&gt;&lt;P&gt;route ISP2 0 0 2.2.2.2 2&amp;nbsp; // Default route with Metric 2 via ISP2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (ISP2,inside) tcp 0.0.0.0 80 0.0.0.0 80&lt;/P&gt;&lt;P&gt;static (ISP2,inside) tcp 0.0.0.0 443 0.0.0.0 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (ISP1) 1 interface&lt;/P&gt;&lt;P&gt;global (ISP2) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above config works well BUT I have some problem, the USERS cannot access anymore the application servers in DMZ using port 80 &amp;amp; 443. Could it be the static NAT? Or do I need to add a new ACL for ISP 2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any feedback. Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038084#M398589</guid>
      <dc:creator>rgbatucan</dc:creator>
      <dc:date>2019-03-12T00:00:44Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038085#M398590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be definitely to play with NAT andf ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a seperate public IP address to NAT the DMZ server, then you can do following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,ISP2) tcp &lt;PUBLIC ip=""&gt;&amp;nbsp; http &lt;PRIVATE ip="" of="" dmz="" server=""&gt;&amp;nbsp; http&amp;nbsp; netmask 255.255.55.255&lt;/PRIVATE&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any host &lt;PUBLIC ip=""&gt; eq 80&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now If you dont have seperate public IP and you do want to use ISP2 interface IP to forward the packet to inside then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface http&amp;nbsp; &lt;PRIVATE ip="" of="" dmz="" server=""&gt; http netmask 255.255.55.255&lt;/PRIVATE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any interface outside eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do the same for port 443 as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate all helpful posts&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 05:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038085#M398590</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T05:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access DMZ port 80 &amp; 443 from INSIDE after configurin</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038086#M398591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At least you need a translation-rule from the inside to the DMZ because you have a nat-statement on the inside interface. Have you tried to configure NAT-exemption for the insede-&amp;gt;DMZ-traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 06:03:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038086#M398591</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-09-28T06:03:23Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038087#M398592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Harish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;I don't have a separate public IP for the DMZ servers.&lt;/P&gt;&lt;P&gt;For your second recommendation, it didn't work. We have multiple servers with different IP's that needs http and https.&lt;/P&gt;&lt;P&gt;The &lt;EM&gt;static&lt;/EM&gt; nat limits only to 1 server, but still didn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still trying to figure out here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Restie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 06:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038087#M398592</guid>
      <dc:creator>rgbatucan</dc:creator>
      <dc:date>2012-09-28T06:07:00Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038088#M398593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are your sevrs in DMZ or inside ? I was under imression that the servers are in inside, could you post the ASA configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 06:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038088#M398593</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T06:16:04Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038089#M398594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;all the servers are in DMZ. please see attched diagram in attachments.&lt;/P&gt;&lt;P&gt;I'm trying NAT exemption now as per Karsten.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 06:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038089#M398594</guid>
      <dc:creator>rgbatucan</dc:creator>
      <dc:date>2012-09-28T06:38:01Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038090#M398595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ok.. in that case that nat has to be constructed a sbelow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,outside) tcp interface http &lt;PRIVATE ip="" of="" dmz="" server=""&gt; http netmask 255.255.55.255&lt;/PRIVATE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any interface outside eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;but I think this is not possible if you have multiple servers with same service but possible with multiple servers with different service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example 192.168.100.1 - FTP,&amp;nbsp; 192.168.100.2 - SMTP etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harish.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 06:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038090#M398595</guid>
      <dc:creator>Harish Balakrishnan</dc:creator>
      <dc:date>2012-09-28T06:43:57Z</dc:date>
    </item>
    <item>
      <title>Cannot access DMZ port 80 &amp; 443 from INSIDE after configuring du</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038091#M398596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Karsten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I added the below command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 110&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/3/1/106134-Firewall.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;But still i can't access the servers port 80 &amp;amp; 443.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 05:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-dmz-port-80-443-from-inside-after-configuring-dual/m-p/2038091#M398596</guid>
      <dc:creator>rgbatucan</dc:creator>
      <dc:date>2012-10-02T05:58:43Z</dc:date>
    </item>
  </channel>
</rss>

