<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic https access from DMZ to Inside on ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861161#M489283</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the NAT0 might be messing with the NAT configuration you have added since "packet-tracer" fails when doing rpf-check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste the whole "packet-tracer" command and its output here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT0 rules should be pretty easy to clean up but ofcourse the more VPN connections and networks you have, the more configurations are needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 09 Feb 2013 00:34:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-02-09T00:34:40Z</dc:date>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861150#M489257</link>
      <description>&lt;P&gt;We have an ASA5505 UL bundel, updated with this license "&lt;SPAN style="font-size: 8pt; font-family: Sabon-Roman; "&gt;L-ASA5505-SEC-PL="&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt; to enable traffic from DMZ to Inside. No NAT or rules deployed for that yet.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;On the Inside we have Exchange 2007 in a single server installation. The public url for smtp, ActiveSync, OWA and Outlook Anywhere is mail.company.se. There is a static NAT for outside traffic to access above mentioned services on inside. Now, on DMZ there is the WLAN for guests to access the Internet. How ever, our Smart Phones with WLAN turned on, cannot sync to the Exchange Server on the Inside! The DMZ gets IP-addressen from ASA on DMZ Interface with external DNS configured.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;How can I configure the ASA to achieve the function of ActiveSync from DMZ to Inside with the public URL from the phones?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;Thanks in advace&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif; "&gt;/Peter&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Sabon-Roman; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Sabon-Roman; "&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861150#M489257</guid>
      <dc:creator>Peters</dc:creator>
      <dc:date>2019-03-11T22:10:58Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861151#M489258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to create a static nat for the DMZ to inside traffic as well, something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) &lt;PUBLIC ip="" of="" server=""&gt; &lt;PRIVATE ip="" of="" server=""&gt;&lt;/PRIVATE&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you would also need to permit the traffic on dmz interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit tcp any host &lt;PUBLIC ip="" of="" server=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 12:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861151#M489258</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-01-06T12:46:10Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861152#M489262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; It workt like dream! Thanks alot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jan 2012 14:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861152#M489262</guid>
      <dc:creator>Peters</dc:creator>
      <dc:date>2012-01-07T14:59:44Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861153#M489265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey that gr8 &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You can mark the thread as answered, if it is resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jan 2012 15:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861153#M489265</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-01-07T15:40:20Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861154#M489268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to do the same thing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wireless clients on a lower privileged "Public Wireless" interface need to access email server on inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,Public_Wireless) Public_email_server Private_email_server netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Public_Wireless) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group Public_Wireless_access_in in interface Public_Wireless&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I allowed ping, http, https, and smtp but cannot do any of those from the public wireless client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer says,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Public_Wireless) PUBLIC PRIVATE netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host PRIVATE Public_Wireless any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to PUBLIC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 34&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x72ff74b8, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt; hits=3, user_data=0x71f2a038, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip=PRIVATE, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Public_Wireless&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 23:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861154#M489268</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-08T23:23:22Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861155#M489270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There might be some conflicting NAT rule perhaps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share you whole NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In cases like the orignal post in this topic the solution might even be configuring the "dns" parameter to the actual "inside" to "outside" Static NAT configurations. But this requires that the servers public IP address has an attached DNS name in the public DNS servers and hosts on the DMZ are using public DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 23:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861155#M489270</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-08T23:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861156#M489272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (2nd_ISP) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Public_Wireless) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Email works from the outside interface,&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp PUBLIC smtp&amp;nbsp; EMAIL_SERVER smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp PUBLIC https EMAIL_SERVER https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp PUBLIC www&amp;nbsp;&amp;nbsp; EMAIL_SERVER www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,Public_Wireless) PUBLIC PRIVATE_EMAIL_SERVER netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you need to see any more config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 23:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861156#M489272</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-08T23:40:33Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861157#M489274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At least need to know the configuration of the ACL "inside_nat0_outbound" and what the networks contained there are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 23:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861157#M489274</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-08T23:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861158#M489277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.252.0 192.168.255.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_1 10.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_2 10.17.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group VPN1 object-group VPN1_INSIDE&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group VPN2 object-group VPN2_INSIDE&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group VPN3 object-group VPN3_INSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! public wireless network is 10.0.168.0 /21&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 23:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861158#M489277</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-08T23:50:55Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861159#M489280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does any of the "object-group" contain this network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL seems a bit messy. There are alot of really big networks used (whole private ranges)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some cases these might cause problems with the operation of NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally try to keep the NAT as specific as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2013 00:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861159#M489280</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-09T00:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861160#M489281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yah almost all of the object-groups contain the big 10.0 network,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object 10.0.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.11.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.12.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.13.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.15.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 10.16.0.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config was there before I got here, I'd also like to make it more specific but if I alter the object groups, the vpn tunnels will come down.&amp;nbsp; It is messy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2013 00:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861160#M489281</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-09T00:18:26Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861161#M489283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the NAT0 might be messing with the NAT configuration you have added since "packet-tracer" fails when doing rpf-check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste the whole "packet-tracer" command and its output here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT0 rules should be pretty easy to clean up but ofcourse the more VPN connections and networks you have, the more configurations are needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2013 00:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861161#M489283</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-09T00:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861162#M489285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MC-FW# packet-tracer input Public_Wireless icmp WIRELESS_CLIENT 0 8 INSIDE_EMAIL_SERVER d$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x71c2de08, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=325666775, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.252.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group Public_Wireless_access_in in interface Public_Wireless&lt;/P&gt;&lt;P&gt;access-list Public_Wireless_access_in extended permit object-group DM_INLINE_SERVICE_2 any host INSIDE_EMAIL_IP&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object icmp&lt;/P&gt;&lt;P&gt; service-object tcp eq www&lt;/P&gt;&lt;P&gt; service-object tcp eq https&lt;/P&gt;&lt;P&gt; service-object tcp eq smtp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x72517f40, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0x6d447d00, cs_id=0x0, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=INSIDE_EMAIL_IP, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x71c2ea80, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=17052497, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x71c2e950, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=817139, user_data=0x71534348, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type:&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x74427260, priority=17, domain=flow-export, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5343930, user_data=0x72c59c00, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Public_Wireless) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip Public_Wireless any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (OUTSIDE_IP [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 17445576, untranslate_hits = 2434626&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x71c8e4d0, priority=1, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=18502567, user_data=0x71c8e0b8, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Public_Wireless) OUTSIDE_EMAIL_IP INSIDE_EMAIL_IP netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host INSIDE_EMAIL_IP Public_Wireless any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to OUTSIDE_EMAIL_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 363&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x72ff74b8, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0x71f2a038, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=INSIDE_EMAIL_IP, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Public_Wireless&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2013 00:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861162#M489285</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-09T00:50:20Z</dc:date>
    </item>
    <item>
      <title>https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861163#M489286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to make sure, you are using the the PUBLIC IP ADDRESS as the destination IP address of the "packet-tracer" command right? NOT the actual local IP address of the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Feb 2013 00:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861163#M489286</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-09T00:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861164#M489287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was using the local ip address for the server.&amp;nbsp; When I use the public ip of the server the packet is denied&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x71c2de08, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=327503290, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,Public_Wireless) PUBLIC_SERVER_IP PRIVATE_SERVER_IP netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host PRIVATE_SERVER_IP Public_Wireless any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to PUBLIC_SERVER_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2397&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate PUBLIC_SERVER_IP/0 to PRIVATE_SERVER_IP/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x729aab00, priority=11, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1894218, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Public_Wireless&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2013 16:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861164#M489287</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-11T16:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: https access from DMZ to Inside on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861165#M489289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's working now thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I corrected my Nat rules so the packet was allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One problem is the public wireless client I was testing with could not connect to the email server.&amp;nbsp; I was looking for a way to view the current connections "show local-host"&amp;nbsp;&amp;nbsp; It said it had a connection but mail didn't work.&amp;nbsp; I had a few instances where one ping would go through and the next 3 timed out.&amp;nbsp; I switched to another laptop and mail worked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2013 18:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/https-access-from-dmz-to-inside-on-asa-5505/m-p/1861165#M489289</guid>
      <dc:creator>netdood</dc:creator>
      <dc:date>2013-02-11T18:05:25Z</dc:date>
    </item>
  </channel>
</rss>

