<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 DMZ creation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788963#M493434</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are your answers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) is traffic from inside to DMZ is permit by default?&lt;/P&gt;&lt;P&gt;Yes, from higher security to lower, traffic is permitted by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What about DMZ to Inside traffic ?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; No, you would need to allow the traffic through ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Is it necessary to do a NAT from inside to DMZ with the same IP as of inside&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; If you have no nat-control enabled, then no need, if nat-cpontrol enabled, you would need it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) What is the use of " static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 ? is it a no nat statement?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; Yes, it is self-static and sort of a no nat statement. If going from DMZ to inside, the destination shoudl not be natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Is it necessary to permit traffic from DMZ to inside?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; Yes, definitely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Suppose i have a web server in DMZ, for inside host whether it will take path through ASA or path through internet?&lt;/P&gt;&lt;P&gt; Depends on your nat translation, if you want users to access the DMZ servers on public ip or private ip. In both the cases the request would go through ASA only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Nov 2011 07:17:36 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-11-14T07:17:36Z</dc:date>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788962#M493433</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to implement a DMZ in my office. Before talking about the configuration , i would like to know best practises of implementing DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My questions are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) is traffic from inside to DMZ is permit by default?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What about DMZ to Inside traffic ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Is it necessary to do a NAT from inside to DMZ with the same IP as of inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) What is the use of " static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 ? is it a no nat statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Is it necessary to permit traffic from DMZ to inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Suppose i have a web server in DMZ, for inside host whether it will take path through ASA or path through internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share your advices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788962#M493433</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2019-03-11T21:49:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788963#M493434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are your answers:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) is traffic from inside to DMZ is permit by default?&lt;/P&gt;&lt;P&gt;Yes, from higher security to lower, traffic is permitted by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What about DMZ to Inside traffic ?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; No, you would need to allow the traffic through ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Is it necessary to do a NAT from inside to DMZ with the same IP as of inside&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; If you have no nat-control enabled, then no need, if nat-cpontrol enabled, you would need it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) What is the use of " static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 ? is it a no nat statement?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; Yes, it is self-static and sort of a no nat statement. If going from DMZ to inside, the destination shoudl not be natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Is it necessary to permit traffic from DMZ to inside?&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt; Yes, definitely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Suppose i have a web server in DMZ, for inside host whether it will take path through ASA or path through internet?&lt;/P&gt;&lt;P&gt; Depends on your nat translation, if you want users to access the DMZ servers on public ip or private ip. In both the cases the request would go through ASA only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 07:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788963#M493434</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-14T07:17:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788964#M493435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Is it necessary to do a NAT from inside to DMZ with the same IP as of inside&lt;/P&gt;&lt;P&gt;If you have no nat-control enabled, then no need, if nat-cpontrol enabled, you would need it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Is it necessary to permit traffic from DMZ to inside?&lt;/P&gt;&lt;P&gt;Yes, definitely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6) Suppose i have a web server in DMZ, for inside host whether it will take path through ASA or path through internet?&lt;/P&gt;&lt;P&gt;Depends on your nat translation, if you want users to access the DMZ servers on public ip or private ip. In both the cases the request would go through ASA only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have doubts on the above points. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) What exactly is Nat-control?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) What is the need to permit traffic from DMZ to inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) &lt;STRONG&gt; "&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Depends on your nat translation, if you want users to access the DMZ servers on public ip or private ip. In both the cases the request would go through ASA only."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Webserver is publiching a webpage right? Also it is having a public IP address. So whenever we try to access that webpage it should go through internet, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If something like RDP it will go to through inside interface--ASA--DMZ interface -- webserver, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is my concept is clear? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am asking this because i need to get it clarified before implementaion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 08:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788964#M493435</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-14T08:12:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788965#M493436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat-control is a feature which when enabled on the ASA, would need transalation for every traffic on the ASA, if it is not enabled, you can just allow traffic through ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a reference guide for it:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1746857&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ to inside access depends upon your requirement, if you don't need it, don't allow traffic. If you want traffic from inside to DMZ, that woudl be allowed by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow access to webpage on inside interface as well as from the internet, you would need to add two static commands:&lt;/P&gt;&lt;P&gt; lets say server public ip is 1.1.1.1 and private ip is 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then:&lt;/P&gt;&lt;P&gt;static (dmz,outside) 1.1.1.1 10.1.1.1&lt;/P&gt;&lt;P&gt;static (dmz,inside) 1.1.1.1 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from inside interafce would go through the ASA only, and from outside it would come from internet and then go to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats all you should need as far as Nat is concerned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 08:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788965#M493436</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-14T08:22:13Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788966#M493439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My requirement is as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) configure DMZ with a server.( this serve is used to&amp;nbsp; download data from other locations. i know the IP address of the other servers. they are publically available.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Now this server is connected directly to a modem. So after DMZ creation also this will as this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Need to access DMZ server from inside. By deault it is there right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will tell my plan. please suggest if it has any errors?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) put the server in to DMZ interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Configure a new network for DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Configure static NAT for the server using static (dmz,outside) coammand&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Permit rule for access this server from other servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5) Permit static (inside,dmz) 192.168.1.0 192.168.1.0 for accessing DMZ server from inside host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did i miss anything?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 08:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788966#M493439</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-14T08:41:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788967#M493440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you are absolutely correct, as per your requirement, but just one thing, if your DMZ server is in the network 192.168.1.0 network, then you would need the following static:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.0 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rest everything is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 08:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788967#M493440</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-14T08:51:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788968#M493441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 is this required? my inside is in the range of 192.168.1.0. DMZ will be in the range of 192.168.2.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please Advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 08:57:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788968#M493441</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-14T08:57:32Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788969#M493443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, Nat would not be required for Inside, you would just need nat for DMZ;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.2.0 192.168.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For inside, you would need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it and let me know, it shoudl work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 09:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788969#M493443</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-14T09:14:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788970#M493445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check the below scenario and configuration and let me know whether it will work or not&lt;/P&gt;&lt;P&gt;Assume my inside network is 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside network is 199.199.7.64/29&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ network is 192.168.2.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; DMZ server IP address --&amp;gt; 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;please see the below configuration which i am planning to implement&lt;/P&gt;&lt;P&gt;===================================&lt;BR /&gt;1) Confiure interfaces,IP addresses&lt;BR /&gt;===================================&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; description "Connection to LAN"&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description "Connection to outside"&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 199.199.7.66 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description "DMZ"&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;=====================================&lt;BR /&gt;2)Configuring PAT for inside and default route&lt;BR /&gt;=====================================&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 199.199.7.65 1&lt;/P&gt;&lt;P&gt;=====================================&lt;BR /&gt;3) Configure static NAT for DMZ server&lt;BR /&gt;=====================================&lt;BR /&gt; &lt;BR /&gt;static (inside,outside) 199.199.7.67 192.168.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;=====================================&lt;BR /&gt;4)RUle to permit traffic from outside to DMZ server&lt;BR /&gt;=====================================&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_INSIDE extended permit Ip any host 199.199.7.67 &lt;BR /&gt;access-group OUTSIDE_INSIDE in interface outside&lt;/P&gt;&lt;P&gt;====================================&lt;BR /&gt;5)RUle to permit traffic from DMZ server to outside&lt;BR /&gt;====================================&lt;/P&gt;&lt;P&gt;access-list DMZ_OUTSIDE extended permit ip host 192.168.2.2 any&lt;BR /&gt;access-group DMZ_OUTSIDE in interface DMZ&lt;/P&gt;&lt;P&gt;====================================&lt;BR /&gt;6)No NAT from inside to DMZ and DMZ to inside&lt;BR /&gt;====================================&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;static (inside,DMZ) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;BR /&gt;static (DMZ,inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;====================================================================================&lt;/P&gt;&lt;P&gt;I am having some questions also. &lt;/P&gt;&lt;P&gt;1) is this configurations are right?&lt;/P&gt;&lt;P&gt;2) Is there anything wrong in the title 5 and title 6 ( i mean configuration i mentioned above)&lt;/P&gt;&lt;P&gt;3) is there anything i need to configure ?&lt;/P&gt;&lt;P&gt;please advice........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788970#M493445</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-15T03:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788971#M493446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not find anything wrong in 6, but you need not configure 5, since by default traffic from higher security to lower security is permitted, even if you remove it, DMZ would be able to access internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover this is not correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=====================================&lt;/P&gt;&lt;P&gt;3) Configure static NAT for DMZ server&lt;/P&gt;&lt;P&gt;=====================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 199.199.7.67 192.168.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it shoudl be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 199.199.7.67 192.168.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In 2, you would also need this global statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rest everything is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788971#M493446</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-15T03:24:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788972#M493448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, i got it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it will work right? Also are you aware of the port numbers used for signature update of trend micro antivirus?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do please specify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788972#M493448</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-15T03:28:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788973#M493450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you talking about CSC module or IPS module, in both the cases updates atre done through port 80 and 443.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788973#M493450</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-15T03:35:05Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788974#M493453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not aware of these modules.&amp;nbsp; it would be great if you can share some information regarding these modules. in a normal case which will be the port numbers for virus signature update. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also searching for the portnumbers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788974#M493453</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-15T03:39:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788975#M493455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vipin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These modules use port 80 mand 443 for signature updates and other anti-virus updates. CSC updates from the Trendmicro servers and IPS from Cisco sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSC - Content Security Module.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is used for filtering and blocking web traffic like smtp,ftp,https,http and pop3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPS - Intrusion Prevention module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is used to detect any intrusion based upon specific patterns defined in signatures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the docs for the 2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSC:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6823/index.html"&gt;http://www.cisco.com/en/US/products/ps6823/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPS:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ips/6.1/configuration/guide/cli/cliguide.html"&gt;http://www.cisco.com/en/US/docs/security/ips/6.1/configuration/guide/cli/cliguide.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 03:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788975#M493455</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-15T03:49:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788976#M493458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No No Not this. I am having a seperate antivirus server. It is from Trend Micro.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 04:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788976#M493458</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-15T04:03:03Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788977#M493460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure about Trend Micro, but if it has to go to some other server on the internet for updates, then it woudl use the ports mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 04:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788977#M493460</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-15T04:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788978#M493463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks I will check and update. thanks for your help.....................&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vipin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 04:13:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788978#M493463</guid>
      <dc:creator>vipinrajrc</dc:creator>
      <dc:date>2011-11-15T04:13:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 DMZ creation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788979#M493468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure let me know if you face any issues &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Nov 2011 05:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-dmz-creation/m-p/1788979#M493468</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-11-15T05:09:34Z</dc:date>
    </item>
  </channel>
</rss>

