<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 DMZ Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874209#M490076</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mscha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, that is correct, the thing is that as soon as the traffic traverses the ASA you will not be able to do it because the ASA does not support Police-based routing, so you cannot send one specific traffic to one ISP.&lt;/P&gt;&lt;P&gt;You will need to use a device that supports PBR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the document I promissed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Dec 2011 21:49:45 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-12-27T21:49:45Z</dc:date>
    <item>
      <title>ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874204#M490067</link>
      <description>&lt;P&gt;Hello, any help or insight into why I can't get this working properly would be extremely helpful. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco ASA 5510 connected to 2 private lans (1 for my HQ pc's{inside} and 1 for the worldwide mpls{outside}) &lt;/P&gt;&lt;P&gt;It is also connected to the public internet at interface "public" and my dmz at "dmz" interface.&amp;nbsp; I suspect I have a routing issue because packet-trace yields allow, the nat looks ok and the objects look ok at least to me but I'm the one with the non working config so.... Help, please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically this is the desired flow:&amp;nbsp; &lt;/P&gt;&lt;P&gt;1. I need all traffic from the inside to be able to flow to the outside unimpeded as they are both trusted networks. (this is ok right now as I allow everything via access-list 101.)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. I need any host on the public internet to be able to reach a server on the dmz via the pat which I set up from the "public" interface to the "DMZ" interface.&amp;nbsp; The desired flow would be that the person on the internet types in &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://webserver.company.com" target="_blank"&gt;https://webserver.company.com&lt;/A&gt;&lt;SPAN&gt; and this is directed to the public interface ip which forwards to the webserver object on the dmz. (I cannot get this working any which way) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;3. I need the dmz to be able to communicate with another server on the mpls via the "outside" interface when it recieves the request from the public it then checks with this other server on the outside via nat(translating the dmz range into the ip of the outside interface on the firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a default route that points to the mpls or outside interface for 0.0.0.0 0.0.0.0 via 10.x.x.1 - (and although I'm not sure I suspect this could be conflicting with traffic that needs to be sent to the "public" interface .... meaning that the firewall should dump packets bound for 0.0.0.0 0.0.0.0 to the public interface - 184.x.x.194 but I'm very reluctant to change the default route as this is in production and I'm not sure how it will affect traffic).&lt;/P&gt;&lt;P&gt;However, I do suspect that if I changed the route from default to static as such:&lt;/P&gt;&lt;P&gt; route 10.0.0.0 255.0.0.0 10.x.x.1 (this would get all lan and mpls traffic to the mpls gateway)&lt;/P&gt;&lt;P&gt; route 0.0.0.0 0.0.0.0 184.x.x.193 (this would send everything else from public to the public internet gateway)&lt;/P&gt;&lt;P&gt;I think this is accurate but then I would bypassing my corporate internet proxy which is behind the mpls gateway at 10.x.x.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone else think this is a routing issue? Is there a way to get http traffic originating from the lan (10.x.x.x) to use the mpls gateway and http traffic for the dmz to use the public internet gateway at 184.x.x.193.&amp;nbsp; I don't want to start causing a flow problem for the internet nor do I want to bypass my corp internet proxy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way I cannot get this to work, eventhough the logic checks out, I cannot get even a ping response when I allow icmp any any for testing. &lt;/P&gt;&lt;P&gt;Note: I can ping resources on each network from the firewall, not only it's own ports in the associated network but other resources on those networks as well.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the running-config:&lt;/P&gt;&lt;P&gt;ciscoasa# sho run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name marcjacobs.lvmh&lt;/P&gt;&lt;P&gt;enable password wrblOSAyPeeKhvhL encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.x.x.2 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.x.x.8 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif public&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 184.x.x.194 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.x.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.x.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa841.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name marcjacobs.lvmh&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network webserver&lt;/P&gt;&lt;P&gt; host 192.168.x.26&lt;/P&gt;&lt;P&gt;object network dmz_range&lt;/P&gt;&lt;P&gt; range 192.168.x.1 192.168.x.254&lt;/P&gt;&lt;P&gt;object network OUTSIDE&lt;/P&gt;&lt;P&gt; subnet 10.x.y.0 255.255.255.240&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit udp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit gre any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit esp any any&lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list dmz_outside extended permit ip any 10.98.9.0 255.255.255.240&lt;/P&gt;&lt;P&gt;access-list test_ping extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list webserver_insidehost extended permit tcp host 192.168.x.26 host 10.x.x.45 eq https&lt;/P&gt;&lt;P&gt;access-list public_in extended permit tcp any host 192.168.x.26 eq https&lt;/P&gt;&lt;P&gt;access-list ping_test extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list ping_test extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu public 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (outside,DMZ) source static OUTSIDE OUTSIDE&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network webserver&lt;/P&gt;&lt;P&gt; nat (DMZ,public) static interface service tcp https https&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-group test_ping in interface public&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.x.x.1 1&lt;/P&gt;&lt;P&gt;route outside 10.x.x.91 255.255.255.255 10.x.x.1 1&lt;/P&gt;&lt;P&gt;route inside 10.x.x.0 255.255.255.0 10.x.x.6 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 100&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username cseiber password 2kzsrDh0SvZ/CKV0 encrypted&lt;/P&gt;&lt;P&gt;username admin password eY/fQXw7Ure8Qrz7 encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:16a704ae3f98ae986d7bc1c594c97f48&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874204#M490067</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2019-03-11T22:06:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874205#M490068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats correct.&lt;/P&gt;&lt;P&gt;If you have internet connected on public then your default route should point to public internet. For MPLS you can have that private&amp;nbsp; network route poinint outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port translation rule for-webserver looks good .It should work once route is added.&lt;/P&gt;&lt;P&gt;object network webserver&lt;/P&gt;&lt;P&gt;host 192.168.x.26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far proxy is concern if you mean to say thats fall in Corp network then for proxy traffic should go via this firewall. Then add one more static or dynamic nat entry for that IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Dec 2011 20:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874205#M490068</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-12-26T20:31:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874206#M490070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ajay, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for your support.&amp;nbsp; I just want to make it clear so that you may answer the question if you know the solution. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 internet connections - &lt;/P&gt;&lt;P&gt; 1. goes via the lan to the core switch (which has the firewall as the default gateway) which is on 10.x.2.0 (a separate private vlan for the mpls connection)&lt;/P&gt;&lt;P&gt;2. This one is for dmz only and guest wireless network at my HQ - the problem here is that the dmz has no route to the public internet through this guest\dmz internet connection.&amp;nbsp; The firewall is using 10.x.2.1 as it's default gateway and if I change that route all traffic will change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only want the dmz traffic destined for the internet to go to the internet via the 184.x.x.193 gateway and I want all other internet bound traffic originating on the lan to go through the mpls internet via the 10.x.2.1 gateway.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to use a route map or am I making this more complicated than it needs to be?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 04:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874206#M490070</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2011-12-27T04:50:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874207#M490072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mscha2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what you are looking for is to do Police based routing, witch is one of the features that is not yet supported on an ASA.&lt;/P&gt;&lt;P&gt;There are some work-arounds availables but CISCO does not support it as a processure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is one document that might provide you a better explanation of this, even though I think the scenario you want to create is not supported and will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 05:24:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874207#M490072</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-27T05:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874208#M490074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;     Thanks again for your support.  The asa is connected to a 6506-E which uses the firewall for its default gateway which causes all traffic to traverse the firewall.  If I could figure out a different way to set up the routing I may find a work around.  &lt;/P&gt;&lt;P&gt;Its only the dmz that I want to go out the public internet.  I might be able to do something with vlans.&lt;/P&gt;&lt;P&gt;Sent from my Verizon Wireless BlackBerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 21:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874208#M490074</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2011-12-27T21:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874209#M490076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mscha,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, that is correct, the thing is that as soon as the traffic traverses the ASA you will not be able to do it because the ASA does not support Police-based routing, so you cannot send one specific traffic to one ISP.&lt;/P&gt;&lt;P&gt;You will need to use a device that supports PBR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the document I promissed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Dec 2011 21:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874209#M490076</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-27T21:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874210#M490078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;    I cannot find the attachment.  Is there a link to this document?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Tue, Dec 27, 2011 at 4:49 PM, jcarvaja &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874210#M490078</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2011-12-28T21:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874211#M490082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-13015"&gt;https://supportforums.cisco.com/docs/DOC-13015&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Dec 2011 21:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874211#M490082</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-28T21:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874212#M490085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;     Thank you for the document.  I was trying to avoid adding router to&lt;/P&gt;&lt;P&gt;the scenario for simplification reasons.  I don't think I will go this&lt;/P&gt;&lt;P&gt;route, it just seems to be too complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will definitely give a high rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me ask you, I have a cisco asa 5505 that I can use specifically for the&lt;/P&gt;&lt;P&gt;dmz.  Keeping in mind my network topology:&lt;/P&gt;&lt;P&gt; - 2 private networks (1 lan (connected at Inside interface) and 1 to the&lt;/P&gt;&lt;P&gt;mpls(connected at outside interface - this is also where my corp internet&lt;/P&gt;&lt;P&gt;access goes through).&lt;/P&gt;&lt;P&gt;- 1 interface for public internet access&lt;/P&gt;&lt;P&gt;- 1 DMZ interface&lt;/P&gt;&lt;P&gt;The problem is the default route which is pointed at the mpls by design and&lt;/P&gt;&lt;P&gt;since there's no pbr in the 5510 I am left with no choice but to add&lt;/P&gt;&lt;P&gt;additional equipment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; do you think I can achieve what I want with the addition of the 5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would make it possible to have a default route on the asa to the&lt;/P&gt;&lt;P&gt;public network which would solve my routing issue above.  I'm just not sure&lt;/P&gt;&lt;P&gt;how to configure the 5505 as it's a bit different than the 5510.  Is all&lt;/P&gt;&lt;P&gt;the nat and routing the same?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have a couple of questions:&lt;/P&gt;&lt;P&gt;1. I would need to connect this firewall to my core switch (in a separate&lt;/P&gt;&lt;P&gt;vlan of course) for communication to the inside application - will there be&lt;/P&gt;&lt;P&gt;a conflict with both firewalls connected? Is this a foolish thing to do?&lt;/P&gt;&lt;P&gt;2. How would I set up the nat\routing to the mpls "outside" network from&lt;/P&gt;&lt;P&gt;the dmz network on this additional security device?&lt;/P&gt;&lt;P&gt;3. How would you accomplish what I think you know I'm trying to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Wed, Dec 28, 2011 at 4:21 PM, jcarvaja &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 16:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874212#M490085</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2012-01-09T16:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874213#M490086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mscha 2000,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try to create a diagram of the network set-up you want to use with the ASA 5505. This will help me answering your questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 17:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874213#M490086</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-09T17:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874214#M490088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I've inserted a picture explaining what I am proposing to see if this makes sense and could solve my problem. Please let me know what you think.&amp;nbsp; I have only 4 days left now to complete this implementation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the jpeg came out too small so I'll attach it to the email thread as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your continued support,&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/0/1/1/72110-ASA_5505_Proposed.JPG" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 19:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874214#M490088</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2012-01-09T19:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874215#M490090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;     I replied on the forums but my pic came out small.  I'm trying to get&lt;/P&gt;&lt;P&gt;you a more readable version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Mon, Jan 9, 2012 at 12:57 PM, jcarvaja &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 19:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874215#M490090</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2012-01-09T19:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874216#M490092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont get it! It would be the same thing as you will also need 2 routes on the ASA 5510. Right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 19:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874216#M490092</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-09T19:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874217#M490095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;     I understand what you mean but I would be disconnecting the asa 5510&lt;/P&gt;&lt;P&gt;from the public internet and from the dmz and replacing it with the 5505.&lt;/P&gt;&lt;P&gt; Basically, just adding another firewall to the topology strictly for dmz&lt;/P&gt;&lt;P&gt;purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem before was that I could not change the default route of the&lt;/P&gt;&lt;P&gt;5510 because I need internet traffic to still pass through the mpls gateway&lt;/P&gt;&lt;P&gt;to our corporate proxy.  If I did not have this requirement I would be fine&lt;/P&gt;&lt;P&gt;with a simple route change - 0.0.0.0 0.0.0.0 10.x.9.x would be replaced by&lt;/P&gt;&lt;P&gt;0.0.0.0 0.0.0.0 184.x.x.194.  So, what I am saying is to add the 5505 and&lt;/P&gt;&lt;P&gt;give it the default route 0.0.0.0 0.0.0.0 184.x.x.194 leaving the 5510 out&lt;/P&gt;&lt;P&gt;of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be a pretty standard dmz setup where:&lt;/P&gt;&lt;P&gt;184.x.x.194 is the "outside" network&lt;/P&gt;&lt;P&gt;192.168.x.x is the "Inside" network&lt;/P&gt;&lt;P&gt;default route 0.0.0.0 0.0.0.0 184.x.x.194 gets all internet traffic to and&lt;/P&gt;&lt;P&gt;from the dmz only throught the outside network as desired.&lt;/P&gt;&lt;P&gt;10.x.4.x is given a static route something like route mpls 10.0.0.0&lt;/P&gt;&lt;P&gt;255.0.0.0 10.x.9.x&lt;/P&gt;&lt;P&gt;which makes it 3 networks connected to the asa 5505 but the default route&lt;/P&gt;&lt;P&gt;is as desired...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Mon, Jan 9, 2012 at 2:38 PM, jcarvaja &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 20:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874217#M490095</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2012-01-09T20:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874218#M490097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct, that does make sense,in that way you will be able to acomplish what you are looking for, as each ASA will provide internet connectivity to one security zone using a different interface( 5505 internet interface and 5510 MPLS interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jan 2012 20:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874218#M490097</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-09T20:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874219#M490099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, good.&lt;/P&gt;&lt;P&gt;So I would configure the 5505 as I said with 3 interfaces:&lt;/P&gt;&lt;P&gt;Inside (192) connected to dmz switch&lt;/P&gt;&lt;P&gt;Outside (184) connected to internet&lt;/P&gt;&lt;P&gt;MPLS (10) connected to core switch vlan dedicated to dmz traffic.&lt;/P&gt;&lt;P&gt;Default route 0 0 184...&lt;/P&gt;&lt;P&gt;Route mpls 10...&lt;/P&gt;&lt;P&gt;Nat for dmz to public &lt;/P&gt;&lt;P&gt;Nat for dmz to mpls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the appropriate access lists for both flows is this right?&lt;/P&gt;&lt;P&gt;Sent from my Verizon Wireless BlackBerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 00:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874219#M490099</guid>
      <dc:creator>mscha2000</dc:creator>
      <dc:date>2012-01-10T00:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874220#M490101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 00:49:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-configuration/m-p/1874220#M490101</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-10T00:49:11Z</dc:date>
    </item>
  </channel>
</rss>

