<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DMZ to other DMZ cannot discuss in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048088#M403333</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I v do now but cannot arrive to ping from 172.16.254.1 to 172.30.20.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Oct 2012 12:14:07 GMT</pubDate>
    <dc:creator>o.fulbert</dc:creator>
    <dc:date>2012-10-16T12:14:07Z</dc:date>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048076#M403321</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I try to find a solution but got some problem ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I got Two DMZ, one name "Dmz" and other "service" I can have the same security level but not a problem. I want that traffic from Dmz to service works in some TCP port to some IP and from service to Dmz same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I v do access-list in interface service but when I apply it, the traffic outbound doesn't works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Some one have idea ? I dont want to user NAT for traffic for traffic to/from Dmz inside and service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5510&lt;/P&gt;&lt;P&gt;domain-name xxxx.com&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxxxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Connection to Fiber Internet / Public IP&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xx.xx.xx.xx 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Connection DMZ; &lt;/P&gt;&lt;P&gt; nameif Dmz&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.16.254.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif service&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.30.20.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name ocea.net&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 172.16.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object 172.16.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_5&lt;/P&gt;&lt;P&gt; network-object 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.201 eq 3389 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.202 eq 3389 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq 8080 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq ftp &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq gopher &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq 63 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq 11438 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq https &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq www &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.203 eq smtp &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.210 eq https &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.210 eq www &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.211 eq https &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.211 eq www &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.202 eq ftp &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.231 eq 27000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.231 eq 28001 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.232 eq 2800 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list Enter extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list Enter extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list Enter extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.231 eq https &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq 8080 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq ftp &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq gopher &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq 63 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq 11438 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq https &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq www &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq pop3 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.204 eq smtp &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.232 eq 27000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.233 eq 27000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.234 eq 27000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.235 eq 27000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.232 eq 29000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.233 eq 29000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.234 eq 29000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.235 eq 29000 &lt;/P&gt;&lt;P&gt;access-list Enter extended permit tcp any host xx.xx.xx.231 eq 29000 &lt;/P&gt;&lt;P&gt;access-list ocea-groupe_splitTunnelAcl standard permit 172.16.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ocea-groupe_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ocea-groupe_splitTunnelAcl standard permit 172.30.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside-nat0 extended permit ip object-group DM_INLINE_NETWORK_1 10.254.254.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list inside-nat0 extended permit ip object-group DM_INLINE_NETWORK_2 192.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside-nat0 extended permit ip object-group DM_INLINE_NETWORK_3 192.168.105.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside-nat0 extended permit ip 192.168.100.0 255.255.255.0 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz-nat0 extended permit ip 172.16.254.0 255.255.255.0 10.254.254.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list dmz-nat0 extended permit ip 172.16.254.0 255.255.255.0 10.253.253.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list dmz-nat0 extended permit ip 172.16.254.0 255.255.255.0 192.168.182.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz-nat0 extended permit ip 172.16.254.0 255.255.255.0 192.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz-nat0 extended permit ip 172.16.254.0 255.255.255.0 192.168.105.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list dmz-groupe_splitTunnelAcl standard permit 172.16.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip object-group DM_INLINE_NETWORK_2 192.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip object-group DM_INLINE_NETWORK_3 192.168.105.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 172.16.254.0 255.255.255.0 192.168.182.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Enter-DMZ extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list Enter-DMZ extended permit icmp any any source-quench &lt;/P&gt;&lt;P&gt;access-list Enter-DMZ extended permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list Enter-DMZ extended permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;access-list service-Enter extended permit ip 172.30.20.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list service-Enter extended permit ip 172.30.20.0 255.255.255.0 172.16.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_4_cryptomap extended permit ip object-group DM_INLINE_NETWORK_4 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list service-nat0 extended permit ip 172.30.20.0 255.255.255.0 10.254.254.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list service-nat0 extended permit ip 172.30.20.0 255.255.255.0 10.253.253.0 255.255.255.192 &lt;/P&gt;&lt;P&gt;access-list service-nat0 extended permit ip 172.30.20.0 255.255.255.0 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list UMCPG-CRYPTOMAP extended permit ip object-group DM_INLINE_NETWORK_5 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list UMCPG-CRYPTOMAP extended permit ip 192.168.100.0 255.255.255.0 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool pool1remoteuser 10.254.254.1-10.254.254.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool pool2remoteuser 10.253.253.1-10.253.253.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 2 xx.xx.xx.254&lt;/P&gt;&lt;P&gt;global (outside) 1 xx.xx.xx.253&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside-nat0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Dmz) 0 access-list dmz-nat0&lt;/P&gt;&lt;P&gt;nat (Dmz) 2 172.16.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (service) 0 access-list service-nat0&lt;/P&gt;&lt;P&gt;nat (service) 2 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,Dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (Dmz,outside) xx.xx.xx.201 172.16.254.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Dmz,outside) xx.xx.xx.xx 172.16.254.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.210 192.168.100.200 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.211 192.168.100.201 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,service) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.232 172.30.20.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.231 172.30.20.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.233 172.30.20.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.234 172.30.20.4 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.235 172.30.20.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) xx.xx.xx.203 192.168.100.45 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Dmz,outside) xx.xx.xx.204 172.16.254.246 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (Dmz,service) 172.16.254.0 172.16.254.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group Enter in interface outside&lt;/P&gt;&lt;P&gt;access-group service-Enter in interface service&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.193 1&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048076#M403321</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2019-03-12T00:09:49Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048077#M403322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would also need to configure:&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048077#M403322</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T10:23:44Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048078#M403323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ve apply this but not works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048078#M403323</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T10:29:55Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048079#M403324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you pls advise what exactly you are testing with?&lt;/P&gt;&lt;P&gt;source IP, destination IP and protocol and ports would be a good start.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also try with packet tracer to see if that works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that without access-list applied to the service interface, the traffic flow is OK?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048079#M403324</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T10:32:36Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048080#M403325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I try to ping or access http&amp;nbsp; from 172.16.254.1 to 172.30.20.1. after I need to access from 172.30.20.1 to 172.16.254.1 to tcp port 26001.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I get out access-list service, I just can have access to outside webserver and inside to service. But cannot have service to inside ping and have access to specify port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048080#M403325</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T10:39:13Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048081#M403326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Can you pls share the whole config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For ping, do you have "inspect icmp" under the global policy-map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that both hosts have default gateway configured to be the respective ASA interfaces, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the host only have 1 NIC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, is there any firewall on the host that might prevent inbound access from different subnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048081#M403326</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T10:42:31Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048082#M403327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes One Gw on all host. No Fw between and 1 nic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes for inspect icmp on global policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048082#M403327</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T10:46:26Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048083#M403328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fw on the host itself i mean. What OS is the host?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 10:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048083#M403328</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T10:47:47Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048084#M403329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No Firewall. Just Windows 2003 Srv.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 11:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048084#M403329</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T11:50:43Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048085#M403330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, just want to be sure, what about the default Windows Firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, have you tried packet tracer on the ASA to simulate your traffic and see if it passes through OK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 11:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048085#M403330</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T11:53:13Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048086#M403331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ve re check. Fw is disable on two host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I discover this command !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510# packet-tracer input service tcp 172.30.20.1 www 172.16.254.1$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd9194760, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=109622866, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (Dmz,service) 172.16.254.0 172.16.254.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Dmz 172.16.254.0 255.255.255.0 service any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 172.16.254.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 21, untranslate_hits = 68&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface Dmz&lt;/P&gt;&lt;P&gt;Untranslate 172.16.254.0/0 to 172.16.254.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group service-Enter in interface service&lt;/P&gt;&lt;P&gt;access-list service-Enter extended permit ip 172.30.20.0 255.255.255.0 172.16.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd9b21ba0, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd67d6800, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=172.30.20.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=172.16.254.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd9010368, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=100675, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (service,outside) xx.xx.xx.xx 172.30.20.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip service host 172.30.20.1 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1554, untranslate_hits = 24401&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd9a1a430, priority=5, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=115779, user_data=0xd7ad1318, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=172.30.20.1, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (service) 2 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip service 172.30.20.0 255.255.255.0 Dmz any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd9b21568, priority=1, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xd9b214a8, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=172.30.20.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: service&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: Dmz&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510#&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048086#M403331</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T12:01:33Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048087#M403332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you "clear xlate" after the static NAT configuration?&lt;/P&gt;&lt;P&gt;Can you please issue "clear xlate" and test again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048087#M403332</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T12:11:33Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048088#M403333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I v do now but cannot arrive to ping from 172.16.254.1 to 172.30.20.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:14:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048088#M403333</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T12:14:07Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048089#M403334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does it work the other way round?&lt;/P&gt;&lt;P&gt;Can you ping from 172.30.20.1 to 172.16.254.1? &lt;/P&gt;&lt;P&gt;Can you try to ping other hosts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048089#M403334</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T12:17:23Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048090#M403335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doesn t works. I ve try with my own laptop.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048090#M403335</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T12:23:19Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048091#M403336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check if your laptop have windows FW enabled.&lt;/P&gt;&lt;P&gt;Run "debug icmp trace" and see where it's failing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048091#M403336</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T12:24:38Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048092#M403337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nothing on the trace ... I ve check firewall on my laptop&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048092#M403337</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T12:38:40Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048093#M403338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nothing on the trace meaning the ping doesn't even get to the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you try to ping the firewall interface itself, do you see anything in the trace? and does the ping work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048093#M403338</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T12:40:21Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048094#M403339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So ... I don' t understand.&amp;nbsp; I see other ping when I m on inside ping. When I ping interface I see trace but when I try to pass through the fw to dmz to service It fall ... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048094#M403339</guid>
      <dc:creator>o.fulbert</dc:creator>
      <dc:date>2012-10-16T12:52:54Z</dc:date>
    </item>
    <item>
      <title>DMZ to other DMZ cannot discuss</title>
      <link>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048095#M403340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just wondering, does it work when you have different security level on the 2 interfaces?&lt;/P&gt;&lt;P&gt;Try to configure security level of 45 on the "service" interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Oct 2012 12:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-to-other-dmz-cannot-discuss/m-p/2048095#M403340</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-16T12:55:21Z</dc:date>
    </item>
  </channel>
</rss>

