<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure Dmz on ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850517#M490529</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah that was what i was thinking but not fully understanding &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; so what i need then is this ??&lt;/P&gt;&lt;P&gt;If webserver runs on 10.40.97.200 and sqlserver runs on 10.40.96.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.40.97.200 10.40.96.2&lt;/P&gt;&lt;P&gt;static (inside, dmz) tcp 10.40.96.250 6677 10.40.97.2 6677&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would this solve it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should static(dmz,inside) 10.40.97.200 10.40.96.2&lt;/P&gt;&lt;P&gt;be static(dmz,inside) tcp 10.40.97.200 6677 10.40.96.2 6677&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Dec 2011 21:30:37 GMT</pubDate>
    <dc:creator>Thomas_Madsen</dc:creator>
    <dc:date>2011-12-21T21:30:37Z</dc:date>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850511#M490523</link>
      <description>&lt;P&gt;I've been doing a quick search without finding the correct answere to my problem, might be that i should done some more searching but here it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a asa 5505 Sec plus with 3vlan, inside, outside and dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the outside i have 5 ip's for my use, and in the dmz i have a webserver that need to communicate with one sql server on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "sql" also needs to be accessible from outside and thus has a static nat with a dynamic nat so it replies from same ip as on nat ie 72.72.72.5&lt;/P&gt;&lt;P&gt;webserver is natted with 72.72.72.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sql inside ip is 192.168.1.2, gw 192.168.1.1&lt;/P&gt;&lt;P&gt;webserver ip is 192.168.2.100 gw 192.168.2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sec lvl on inside is 100 and on dmz 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with a dynamic policy&amp;nbsp; running inside-net/24 to dmz-network/24 translagt to dmz 192.168.2.2 i can get it to ping 1 way from inside to dmz, but not the other way around...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i need is to open 1 port&amp;nbsp; ie 6677 both ways for this communication to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not very familiar with the CLI and do most stuf in GUI&amp;nbsp; (know i should learn CLI, but time doesnt let me)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any tips on what i need to do ???&lt;/P&gt;&lt;P&gt;on access rules i have just added everything from any to any using , ip, icmp, tcp and udp just to be sure...&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy for any pointers...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850511#M490523</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2019-03-11T22:04:42Z</dc:date>
    </item>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850512#M490524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You want to mantain communication between the DMZ an inside right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need an ACL on the DMZ permitting the traffic to the Inside&lt;/P&gt;&lt;P&gt;Also you will need a static (inside,dmz).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your configuration, also the IP address of the host on the dmz that needs to talk with a host on the Inside( Host IP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 16:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850512#M490524</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T16:17:03Z</dc:date>
    </item>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850513#M490525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "show conf"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;: Written by hm-k at 12:21:10.213 UTC Mon Dec 19 2011&lt;BR /&gt;!&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname cisco&lt;BR /&gt;domain-name friends.local&lt;BR /&gt;enable password ********* encrypted&lt;BR /&gt;passwd ********** encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.40.96.250 SQL-Server_Innside&lt;BR /&gt;name 217.111.111.108 Utside-Ekte_IP_108&lt;BR /&gt;name 217.111.111.242 Utside-Ekte-IP-242&lt;BR /&gt;name 217.111.111.243 Utside-Ekte-IP-243&lt;BR /&gt;name 217.111.111.244 Utside-Ekte-IP-244&lt;BR /&gt;name 217.111.111.245 Utside-Ekte-IP-245&lt;BR /&gt;name 217.111.111.246 Utside-Ekte-IP-246&lt;BR /&gt;name 10.40.97.254 Inside-Webserver&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.40.96.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address Utside-Ekte-IP-242 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.40.97.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;boot system disk0:/asa804-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name friends.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service Giant-Leap tcp&lt;BR /&gt; port-object eq 2077&lt;BR /&gt; port-object eq 2020&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq 2040 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-244 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 object-group Giant-Leap &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-244 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-246 eq www &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.40.96.128 255.255.255.192 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;ip local pool IP-VPN-Pool 10.40.96.150-10.40.96.175 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-623.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 Utside-Ekte-IP-246 netmask 255.0.0.0&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 2 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,outside) tcp Utside-Ekte-IP-246 www Inside-Webserver www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2040 10.40.96.27 2040 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 https 10.40.96.252 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2077 SQL-Server_Innside 2077 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2020 SQL-Server_Innside 2020 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 www SQL-Server_Innside www netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 217.111.111.241 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server VPN-Friends protocol radius&lt;BR /&gt;aaa-server VPN-Friends (inside) host 10.40.96.254&lt;BR /&gt; timeout 5&lt;BR /&gt; key xxxxxxxxx&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 DMZ&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy VPN_Friends internal&lt;BR /&gt;group-policy VPN_Friends attributes&lt;BR /&gt; dns-server value 10.40.96.254&lt;BR /&gt; default-domain value friends.local&lt;BR /&gt; address-pools value IP-VPN-Pool&lt;BR /&gt;username hm-k password xxxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group VPN_Friends type remote-access&lt;BR /&gt;tunnel-group VPN_Friends general-attributes&lt;BR /&gt; address-pool (outside) IP-VPN-Pool&lt;BR /&gt; authentication-server-group VPN-Friends LOCAL&lt;BR /&gt; authentication-server-group (outside) VPN-Friends LOCAL&lt;BR /&gt; default-group-policy VPN_Friends&lt;BR /&gt;tunnel-group VPN_Friends ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group VPN_Friends ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've changed the outside ip's just in case, and removed i think all passwords and stuff &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 20:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850513#M490525</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-21T20:34:00Z</dc:date>
    </item>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850514#M490526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok lets say the IP address of the host on the inside ( SQL server) is 10.40.97.2 and the Web server on the DMZ is 10.40.96.2.&lt;/P&gt;&lt;P&gt;You need to have communication between those two servers on port 6677.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here is the commands you need:&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.40.96.2 10.46.96.2&lt;/P&gt;&lt;P&gt;static (inside, dmz)&amp;nbsp; tcp 72.72.72.6 6677&amp;nbsp; 10.40.97.2 6677&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give it a try and let me know the result!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 20:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850514#M490526</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T20:45:06Z</dc:date>
    </item>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850515#M490527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; if sql uses 10.40.96.100 and webserver uses 10.40.97.200&lt;/P&gt;&lt;P&gt;should i then use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.40.97.200 10.40.96.100&lt;/P&gt;&lt;P&gt;static (inside, dmz) tcp 10.40.96.100 6677 10.40.97.200 6677&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 20:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850515#M490527</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-21T20:52:02Z</dc:date>
    </item>
    <item>
      <title>Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850516#M490528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, They got to be natted to different ip address ( available ip addresses not the ones for the servers on each interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You got to know this first?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the web-server wants to go to the SQL server what IP address do you want as destination (SQL server)&lt;/P&gt;&lt;P&gt;When the SQL server wants to go to the Inside Web-server what ip address do you want as the destination (Web-server)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create the Static translation based on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you understand my point here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 21:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850516#M490528</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T21:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850517#M490529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah that was what i was thinking but not fully understanding &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; so what i need then is this ??&lt;/P&gt;&lt;P&gt;If webserver runs on 10.40.97.200 and sqlserver runs on 10.40.96.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.40.97.200 10.40.96.2&lt;/P&gt;&lt;P&gt;static (inside, dmz) tcp 10.40.96.250 6677 10.40.97.2 6677&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would this solve it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should static(dmz,inside) 10.40.97.200 10.40.96.2&lt;/P&gt;&lt;P&gt;be static(dmz,inside) tcp 10.40.97.200 6677 10.40.96.2 6677&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 21:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850517#M490529</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-21T21:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850518#M490530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that should do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding the second question:Should static(dmz,inside) 10.40.97.200 10.40.96.2&lt;/P&gt;&lt;P&gt;be static(dmz,inside) tcp 10.40.97.200 6677 10.40.96.2 6677?&lt;/P&gt;&lt;P&gt;R/ You can use both of them, I think you will go for the Port forwarding, because that is what you are looking for.&lt;/P&gt;&lt;P&gt;So (dmz,inside) tcp 10.40.97.200 6677 10.40.96.2 6677 will work as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 21:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850518#M490530</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T21:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850519#M490531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if i need them to reach eachoter on the actual ip adr of the servers, can i do this by setting same securitylvl ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 22:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850519#M490531</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-21T22:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850520#M490532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No that cannot be done with the command same-security command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have connectivity between them using the same ip address just by configuring identity nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) tcp 10.40.96.2 6677 10.40.96.2 6677&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do please rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 23:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850520#M490532</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T23:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850521#M490533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if I want the webserver to use the sql internal ip adress and same with webserver to be reached from webserver using the webservers dmz ip i have to do this ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.40.97.200 6677 10.40.97.200 6677&lt;/P&gt;&lt;P&gt;static (inside, dmz) tcp 10.40.96.250 6677 10.40.97.250 6677&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this command correct if the webserver ip in dmz is 10.40.97.200 and sql server on inside is 10.40.96.250 ?&lt;/P&gt;&lt;P&gt;Will the ASA do the subnet or does the subnet has to be changed from /29 to /28 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this affect any other NAT settings ?? &lt;/P&gt;&lt;P&gt;Can i still have inside on lvl 100 and dmz on lvl50 or do i have to have them on lvl 100 ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 07:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850521#M490533</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-22T07:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850522#M490534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the exact nat statement you need to acomplish a identity nat, witch seems like what you are looking for, it will not affect something else, just that if a host on the other interface wants to access one of those servers will need to to go the real ip address instead of one natted as usual.&lt;/P&gt;&lt;P&gt;Do not worry for the security level, you configured the ACLs to allow the communication with them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate helpful posts.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 17:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850522#M490534</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-22T17:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850523#M490535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;might be me beeing stupid here but i did the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 10.40.96.250 10.40.97.250&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;skipped the protocol and port to be sure to get it up'n running, then i can add the ports later &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping from both sides now, but the program i'm trying to use doesnt work so i have to go to the customer tomorrow and set the servers on same network to be sure it's not the firewall messing with my head...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if i got it right thoose settings should do what i need it to do..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;all other machines are on inside vlan and can access the server as usual, and the webserver are only to be reached from outside or from sql server. The webserver on dmz vlan are aslo only to be able to reach the sql server on the inside vlan on given ports when i've got the communication up'n running &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnks for all help....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 18:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850523#M490535</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-22T18:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850524#M490536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pleasure, glad to hear that you can ping from both sides now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any other problem just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 18:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850524#M490536</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-22T18:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850525#M490537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any other things that can stop the communication between the dmz and inside ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 10.40.96.250 10.40.96.250&lt;/P&gt;&lt;P&gt;static (dmz, inside) 10.40.97.254 10.40.97.254&lt;/P&gt;&lt;P&gt;access-list dmz_to_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz_to_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i try unc it works, i can type &lt;A&gt;\\ip&lt;/A&gt; and get shares, i can ping, i can access the webservice on both sides but the program i need working does not communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the ip of the "webserver" and tried the webservice once more and then it connects to 10.40.96.250 without problem. Move the webserver back to dmz and nothing.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea ?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would the identity nat work just as well if i just did &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 10.40.96.250 10.40.96.250&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i got this right i can then access the 96.250 ip from all ip's on the dmz, but only 96.250 can access ip's from the dmz ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if i just did &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz, inside) 10.40.97.254 10.40.97.254 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i can access all ip's in the inside lan can access 97.254 but only 97.254 can access ip's in the insizde vlan ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 13:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850525#M490537</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-23T13:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850526#M490539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a packet tracer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 10.40.96.249&amp;nbsp; 8 0 10.40.97.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 17:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850526#M490539</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-23T17:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850527#M490540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "packet-tracer input inside icmp 10.40.96.250&amp;nbsp; 8 0 10.40.97.254"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.40.97.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any log disable &lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object icmp&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map global-class&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) SQL-Server_Innside SQL-Server_Innside netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host SQL-Server_Innside DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to SQL-Server_Innside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5, untranslate_hits = 59&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate SQL-Server_Innside/0 to SQL-Server_Innside/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2077 SQL-Server_Innside 2077 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match tcp inside host SQL-Server_Innside eq 2077 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Utside-Ekte-IP-243/2077&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 168&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ) 2 10.40.97.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip DMZ 10.40.97.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (Utside-Ekte-IP-246)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 279, untranslate_hits = 14&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1238768, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 19:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850527#M490540</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-23T19:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850528#M490542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "packet-tracer input dmz icmp 10.40.97.254&amp;nbsp; 8 0 10.40.96.250"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) SQL-Server_Innside SQL-Server_Innside netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host SQL-Server_Innside DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to SQL-Server_Innside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5, untranslate_hits = 60&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate SQL-Server_Innside/0 to SQL-Server_Innside/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz_to_in in interface DMZ&lt;BR /&gt;access-list dmz_to_in extended permit ip any any log debugging &lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map global-class&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ) 2 10.40.97.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; match ip DMZ 10.40.97.0 255.255.255.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (Utside-Ekte-IP-246)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 279, untranslate_hits = 14&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) SQL-Server_Innside SQL-Server_Innside netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match ip inside host SQL-Server_Innside DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to SQL-Server_Innside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5, untranslate_hits = 60&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2077 SQL-Server_Innside 2077 netmask 255.255.255.255 &lt;BR /&gt;&amp;nbsp; match tcp inside host SQL-Server_Innside eq 2077 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Utside-Ekte-IP-243/2077&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4, untranslate_hits = 168&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1249622, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 20:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850528#M490542</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-23T20:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850529#M490543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Thomas, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok so lets focus on this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to be able to access the DMZ server 10.40.97.254 from all the inside users.&lt;/P&gt;&lt;P&gt;For that all you will need is&lt;/P&gt;&lt;P&gt;nat (inside) 1 &lt;/P&gt;&lt;P&gt;Global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove the following statement &lt;/P&gt;&lt;P&gt;no static (dmz, inside) 10.40.97.254 10.40.97.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now can you give it a try please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this changes please post the running-config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 20:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850529#M490543</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-23T20:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configure Dmz on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850530#M490544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most important i believe is that the zspider program on the webserver in dmz can communicate with the sql server on the inside &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Gone remove the VPN before next post...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;: Written by hm-kontor at 03:08:40.846 UTC Fri Dec 23 2011&lt;BR /&gt;!&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname cisco&lt;BR /&gt;domain-name xxx.local&lt;BR /&gt;enable password xxxxxxxxxxxxxxx&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;names&lt;BR /&gt;name 10.40.96.250 SQL-Server_Innside&lt;BR /&gt;name xxxxxxxxxxx.242 Utside-Ekte-IP-242&lt;BR /&gt;name xxxxxxxxxxx.243 Utside-Ekte-IP-243&lt;BR /&gt;name xxxxxxxxxxx.244 Utside-Ekte-IP-244&lt;BR /&gt;name xxxxxxxxxxx.245 Utside-Ekte-IP-245&lt;BR /&gt;name xxxxxxxxxxx.246 Utside-Ekte-IP-246&lt;BR /&gt;name 10.40.97.249 Inside-Webserver&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.40.96.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address Utside-Ekte-IP-242 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.40.97.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;boot system disk0:/asa804-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name xxxxx.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service Giant-Leap tcp&lt;BR /&gt;port-object eq 2077&lt;BR /&gt;port-object eq 2020&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object icmp&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object icmp&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 any any log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq https log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq 2040 log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-244 eq www log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 object-group Giant-Leap log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-243 eq www log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-244 eq https log disable &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Utside-Ekte-IP-246 eq www log disable &lt;BR /&gt;access-list dmz_to_in extended permit ip any any log debugging &lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm alerts&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;ip local pool IP-VPN-Pool 10.40.96.150-10.40.96.175 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-623.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 3 10.40.96.2 netmask 255.0.0.0&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 Utside-Ekte-IP-246 netmask 255.0.0.0&lt;BR /&gt;global (DMZ) 4 10.40.97.2 netmask 255.0.0.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 2 10.40.97.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2040 10.40.96.27 2040 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 https 10.40.96.252 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2077 SQL-Server_Innside 2077 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 2020 SQL-Server_Innside 2020 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Utside-Ekte-IP-243 www SQL-Server_Innside www netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) SQL-Server_Innside SQL-Server_Innside netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,inside) Inside-Webserver Inside-Webserver netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_to_in in interface DMZ&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 Router-IP&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server VPN-nds protocol radius&lt;BR /&gt;aaa-server VPN-nds (inside) host 10.40.96.254&lt;BR /&gt;timeout 5&lt;BR /&gt;key xxxxxxxxxx&lt;/P&gt;&lt;P&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 DMZ&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy VPN_nds internal&lt;BR /&gt;group-policy VPN_nds attributes&lt;BR /&gt;dns-server value 10.40.96.254&lt;BR /&gt;default-domain value nds.local&lt;BR /&gt;address-pools value IP-VPN-Pool&lt;BR /&gt;username hmk password xxxxxxxxxxxxxxxencrypted privilege 15&lt;BR /&gt;tunnel-group VPN_nds type remote-access&lt;BR /&gt;tunnel-group VPN_nds general-attributes&lt;BR /&gt;address-pool (outside) IP-VPN-Pool&lt;BR /&gt;authentication-server-group VPN-nds LOCAL&lt;BR /&gt;authentication-server-group (outside) VPN-nds LOCAL&lt;BR /&gt;default-group-policy VPN_Friends&lt;BR /&gt;tunnel-group VPN_nds ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;tunnel-group VPN_nds ppp-attributes&lt;BR /&gt;authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 21:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-on-asa5505/m-p/1850530#M490544</guid>
      <dc:creator>Thomas_Madsen</dc:creator>
      <dc:date>2011-12-23T21:17:10Z</dc:date>
    </item>
  </channel>
</rss>

