<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with firewall rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033202#M398653</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, slightly more complicated in 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-172.21.20.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; subnet 172.21.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-172.16.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; subnet 172.16.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Inside,data) source static obj-172.21.20.0 obj-172.21.20.0 destination static obj-172.16.0.0 obj-172.16.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" after the above changes. The inside hosts would be able to access the hosts in data network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, your dmz doesn't have any ip address yet, so i am not sure what subnet it is. But the configuration would be similar to the above with the correct dmz subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Sep 2012 05:51:06 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-09-28T05:51:06Z</dc:date>
    <item>
      <title>Help with firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033200#M398650</link>
      <description>&lt;P&gt;This is my 1st time working with post 8.3 IOS and I am having trouble with the configuration.&amp;nbsp; I would like all computers in the inside network to access lower security zones (data and dmz) via all protocols.&amp;nbsp; I would have done this with a nat 0 and global command in previous versions.&amp;nbsp;&amp;nbsp; Below is my config&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname TOR1PLXSD01&lt;/P&gt;&lt;P&gt;enable password sxZETAvnsVuPSnUc encrypted&lt;/P&gt;&lt;P&gt;passwd FomDbcd6ujnk.spR encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description Management&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif Inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.21.20.1 255.255.255.0 standby 172.21.20.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.20&lt;/P&gt;&lt;P&gt;description Plexxus Data&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;nameif data&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 172.16.18.1 255.255.255.0 standby 172.16.18.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.25&lt;/P&gt;&lt;P&gt;description DMZ&lt;/P&gt;&lt;P&gt;vlan 25&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 25&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address yyyyyyyy 255.255.255.224 standby xxxxxx&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa861-2-smp-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup data&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server 172.16.18.21&lt;/P&gt;&lt;P&gt;name-server 172.16.18.22&lt;/P&gt;&lt;P&gt;object network OBJ_INSIDE-HOSTS_172.21.20.0&lt;/P&gt;&lt;P&gt;subnet 172.21.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network OBJ_DATA-HOSTS_172.16.18.0&lt;/P&gt;&lt;P&gt;subnet 172.16.18.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network OBJ_VPN_SUBNETS_172.16.22.0-172.16.23.255&lt;/P&gt;&lt;P&gt;range 172.16.22.0 172.16.23.255&lt;/P&gt;&lt;P&gt;object network OBJ_TOR1PLXEX01_172.16.18.26&lt;/P&gt;&lt;P&gt;host 172.16.18.26&lt;/P&gt;&lt;P&gt;object network OBJ_TOR1PLXFTP01_172.16.18.28&lt;/P&gt;&lt;P&gt;host 172.16.18.28&lt;/P&gt;&lt;P&gt;access-list acl_outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl_SplitTunnel_VPN standard permit 172.21.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list acl_SplitTunnel_VPN standard permit 172.16.18.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list acl_dmz extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu data 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool1 172.16.22.5-172.16.22.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool2 172.16.23.5-172.16.23.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface Failover GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;failover link Failover GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;failover interface ip Failover 4.4.4.1 255.255.255.0 standby 4.4.4.2&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any data&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;icmp permit any Outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-66114.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (data,Outside) source static OBJ_DATA-HOSTS_172.16.18.0 OBJ_DATA-HOSTS_172.16.18.0 destination static OBJ_VPN_SUBNETS_172.16.22.0-172.16.23.255 OBJ_VPN_SUBNETS_172.16.22.0-172.16.23.255&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) source static OBJ_INSIDE-HOSTS_172.21.20.0 OBJ_INSIDE-HOSTS_172.21.20.0 destination static OBJ_VPN_SUBNETS_172.16.22.0-172.16.23.255 OBJ_VPN_SUBNETS_172.16.22.0-172.16.23.255 route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network OBJ_INSIDE-HOSTS_172.21.20.0&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) dynamic 68.71.198.102&lt;/P&gt;&lt;P&gt;object network OBJ_DATA-HOSTS_172.16.18.0&lt;/P&gt;&lt;P&gt;nat (data,Outside) dynamic 68.71.198.102&lt;/P&gt;&lt;P&gt;access-group acl_dmz in interface DMZ&lt;/P&gt;&lt;P&gt;access-group acl_outside in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 68.71.198.97 1&lt;/P&gt;&lt;P&gt;route data 10.1.1.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;route data 172.16.1.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;route data 172.16.5.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;route data 172.16.10.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;route data 172.16.13.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;route data 172.16.14.0 255.255.255.0 172.16.18.3 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.21.20.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.21.20.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable Outside&lt;/P&gt;&lt;P&gt;anyconnect-essentials&lt;/P&gt;&lt;P&gt;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt;anyconnect enable&lt;/P&gt;&lt;P&gt;tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy AnyConnectClientPolicy internal&lt;/P&gt;&lt;P&gt;group-policy AnyConnectClientPolicy attributes&lt;/P&gt;&lt;P&gt;wins-server none&lt;/P&gt;&lt;P&gt;dns-server value 172.16.18.21 172.16.18.22&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value acl_SplitTunnel_VPN&lt;/P&gt;&lt;P&gt;default-domain value plexxus.ca&lt;/P&gt;&lt;P&gt;address-pools value vpn_pool1 vpn_pool2&lt;/P&gt;&lt;P&gt;username dmradmin password 1ZwOzoVS5TWIvR0h encrypted&lt;/P&gt;&lt;P&gt;tunnel-group AnyConnectClientProfile type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group AnyConnectClientProfile general-attributes&lt;/P&gt;&lt;P&gt;address-pool vpn_pool1&lt;/P&gt;&lt;P&gt;address-pool vpn_pool2&lt;/P&gt;&lt;P&gt;default-group-policy AnyConnectClientPolicy&lt;/P&gt;&lt;P&gt;tunnel-group AnyConnectClientProfile webvpn-attributes&lt;/P&gt;&lt;P&gt;group-alias AnyConnect enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:8539b4736e97023e17a76de6284a537a&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033200#M398650</guid>
      <dc:creator>support</dc:creator>
      <dc:date>2019-03-12T00:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Help with firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033201#M398651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems I can remote desktop to a server in the data network but not ping it..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 16:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033201#M398651</guid>
      <dc:creator>support</dc:creator>
      <dc:date>2012-09-27T16:16:00Z</dc:date>
    </item>
    <item>
      <title>Help with firewall rules</title>
      <link>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033202#M398653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, slightly more complicated in 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-172.21.20.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; subnet 172.21.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-172.16.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; subnet 172.16.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Inside,data) source static obj-172.21.20.0 obj-172.21.20.0 destination static obj-172.16.0.0 obj-172.16.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" after the above changes. The inside hosts would be able to access the hosts in data network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, your dmz doesn't have any ip address yet, so i am not sure what subnet it is. But the configuration would be similar to the above with the correct dmz subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2012 05:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-firewall-rules/m-p/2033202#M398653</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-09-28T05:51:06Z</dc:date>
    </item>
  </channel>
</rss>

