<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Bridged DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745008#M422111</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can ping from the inside interface to the inside DMZ interface now, but can't do it in reverse. the same-security-traffic permit inter-interface didn't seem to help anything .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jun 2007 19:20:09 GMT</pubDate>
    <dc:creator>iroccorp.com</dc:creator>
    <dc:date>2007-06-08T19:20:09Z</dc:date>
    <item>
      <title>Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745000#M422099</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;I am trying to setup a Cisco ASA 5510 (with plus) to act as our main firewall as well as offer us DMZ services, for webserver/SSL  Concentrators (Citrix and Cisco CVPN3015). What we would like to do is a dual homed DMZ, where one link is for the inside-DMZ and one link is for the outside-DMZ, where the SSL concentrators and webservers can act as their own gateways. The problem is on the outside / public DMZ, we would like to have this setup as a bridged network, between the outside interface and the outside-dmz interface. We still want to be able to filter on the outside-dmz interface, for security reasons. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to do this? Do i need to setup a virtual outside interface to which the outside-DMZ interface is bridged? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is, when reading the documentation on transparent firewalling, it seems to apply to the entire ASA, thus could be causing some problems since we are nat'ing the inside network to the outside and utilizing the CSC-SSM module for some data filtering for the inside network. &lt;/P&gt;&lt;P&gt;Actually we are using PAT as defined on the asa, not like ios router with nat overload statement. If someone knows a better way to do nat like in ios on a ASA , where we nat many inside addresses to one outside address, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So anyone have any suggestions on implementing a bridged DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745000#M422099</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2020-02-21T09:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745001#M422102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only have inside and outside interfaces in transparent mode, and NAT isn't allowed, so it sounds like transparent mode won't work for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a00806370bb.html#wp1201980" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a00806370bb.html#wp1201980&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to offer DMZ services, NAT, etc, than I'd stick with normal (routed) mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Andrew.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 15:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745001#M422102</guid>
      <dc:creator>andrew.burns</dc:creator>
      <dc:date>2007-06-08T15:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745002#M422104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew, &lt;/P&gt;&lt;P&gt;This is the conclusion i have come to aswell. I am trying to figure out how to get the routed mode to work right now and it seems there is something i am doing wrong, as data just wont route across the interfaces, even when setting the access lists. &lt;/P&gt;&lt;P&gt;See the post:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.1ddebeb0" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.1ddebeb0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745002#M422104</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2007-06-08T16:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745003#M422106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From you other post you said you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"be able to let network traffic, between the inside network and the inside DMZ to pass freely ."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that you should need something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,INSIDE-DMZ) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does that help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also, to initiate from the INSIDE-DMZ to the inside you would need to have an acl in interface INSIDE-DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745003#M422106</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T16:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745004#M422107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You also want...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;" to be able to route the public address space across the ASA, between the E0 and E1 interfaces"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (OUTSIDE-DMZ,outside) 72.13.113.0 72.13.113.0 netmask 255.255.255.128&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745004#M422107</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T16:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745005#M422108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;does the static command mean access list permissions / routing permissions, or does it have something to do with NAT. I don't want to use NAT on the DMZ .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745005#M422108</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2007-06-08T16:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745006#M422109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It has to do with nat, but when it's written how it, it will not nat. There needs to be a translation in the ASA for communication from higher to lower security interface. You could also do this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatdmz extended permit ip any 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonatdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745006#M422109</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T16:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745007#M422110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also just noticed that your security levels for inside and inside-dmz are both 100. You will need this command as well for communication between same security level interfaces OR change the security level on inside-dmz to something between 100 and 10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 16:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745007#M422110</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T16:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745008#M422111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can ping from the inside interface to the inside DMZ interface now, but can't do it in reverse. the same-security-traffic permit inter-interface didn't seem to help anything .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 19:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745008#M422111</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2007-06-08T19:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745009#M422112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post a clean config? Is your outside-dmz working as you wish?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, should the inside-dmz really be the same security level? I would assume it is less secure than your inside. I would recommend to lower the security on it. Leave the existing static (inside,inside-dmz)... then write an access-list that applies in interface inside-dmz to allow that traffic into your inside network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 19:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745009#M422112</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T19:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745010#M422113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;seem to be having a issue with pinging anything outside (aka ICMP traffic seems to be denied right now). Anyways, here we go. PS: we also are using OSPF on the inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname firewall&lt;/P&gt;&lt;P&gt;domain-name example.com&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 72.13.113.129 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description DMZ Outside Interface&lt;/P&gt;&lt;P&gt; nameif dmz-outside&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 72.13.113.1 255.255.255.128&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description DMZ Inside Interface&lt;/P&gt;&lt;P&gt; nameif dmz-inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.50.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ospf network point-to-point non-broadcast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ospf network point-to-point non-broadcast&lt;/P&gt;&lt;P&gt; ospf message-digest-key 1 md5 &lt;REMOVED&gt;&lt;/REMOVED&gt;&lt;/P&gt;&lt;P&gt; ospf authentication message-digest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;clock summer-time MDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt; domain-name example.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list nonatdmz extended permit ip any 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz-outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz-inside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm512-k8.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonatdmz&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,dmz-inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz-outside,outside) 72.13.113.0 72.13.113.0 netmask 255.255.255.128&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 72.13.113.129 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt; network 192.168.50.0 255.255.255.0 area 0&lt;/P&gt;&lt;P&gt; network 192.168.100.0 255.255.255.0 area 0&lt;/P&gt;&lt;P&gt; area 0 authentication message-digest&lt;/P&gt;&lt;P&gt; log-adj-changes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.100.25-192.168.100.35 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.100.25 &lt;/P&gt;&lt;P&gt;dhcpd wins 192.168.100.25&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd domain example.com&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map HTTP&lt;/P&gt;&lt;P&gt; match port tcp eq www&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map outside-class&lt;/P&gt;&lt;P&gt; match access-list outside_mpc_in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;policy-map outside-policy&lt;/P&gt;&lt;P&gt; class outside-class&lt;/P&gt;&lt;P&gt;  csc fail-open&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt; class HTTP&lt;/P&gt;&lt;P&gt;  csc fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy outside-policy interface outside&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 19:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745010#M422113</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2007-06-08T19:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745011#M422114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added to my last post above in case you didn't see it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't need both of these, you can get rid of one or the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz-inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatdmz extended permit ip any 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonatdmz &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow ping in from outside,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 19:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745011#M422114</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T19:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745012#M422115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems to work for the pings. Thanks. &lt;/P&gt;&lt;P&gt;What would the access-list / group look like to allow for traffic from the dmz-inside to the inside interface ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 19:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745012#M422115</guid>
      <dc:creator>iroccorp.com</dc:creator>
      <dc:date>2007-06-08T19:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Bridged DMZ</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745013#M422116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It depends on what you wanted to allow but it would look like this, what you are doing here is writing statements to allow traffic from dmz-inside to inside, then you are denying everything else from dmz-inside to inside, then you are allowing the dmz-inside to go everywhere else(outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list insidedmz_to_inside extended permit &lt;WHAT you="" want="" to="" allow="" here=""&gt;&lt;/WHAT&gt;&lt;/P&gt;&lt;P&gt;access-list insidedmz_to_inside extended permit &lt;WHAT you="" want="" to="" allow="" here=""&gt;&lt;/WHAT&gt;&lt;/P&gt;&lt;P&gt;access-list insidedmz_to_inside extended permit &lt;WHAT you="" want="" to="" allow="" here=""&gt;&lt;/WHAT&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list insidedmz_to_inside extended deny ip any 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list insidedmz_to_inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group insidedmz_to_inside in interface dmz-inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 21:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-bridged-dmz/m-p/745013#M422116</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-08T21:13:37Z</dc:date>
    </item>
  </channel>
</rss>

