<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Please help with ASA5505 configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931823#M5434</link>
    <description>&lt;P&gt;Guys, I added ACL rules to the ASA config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;access-group dmz_acl in interface dmz&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I still cannot connect from 10.17.20.3 (dmz) to&amp;nbsp; 10.17.19.1 (inside)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trace log:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Lucky(cfg-call-home)# packet-tracer input dmz tcp 10.17.19.1 123 10.17.20.3 443 detailed&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ROUTE-LOOKUP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: input&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in 10.17.20.0 255.255.255.0 inside&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ACCESS-LIST&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: log&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-group dmz_acl in interface dmz&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit ip any any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in id=0xcb3ea578, priority=13, domain=permit, deny=false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=809, user_data=0xc94fb030, cs_id=0x0, use_real_addr, flags=0x0, pro&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;tocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=any&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: IP-OPTIONS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in id=0xcb3e0e80, priority=0, domain=inspect-ip-options, deny=true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=1219, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=any&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: NAT&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: rpf-check&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;object network inside-subnet&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;nat (inside,dmz) dynamic interface&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;out id=0xcb3c0da8, priority=6, domain=nat-reverse, deny=false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=87, user_data=0xc85f9e98, cs_id=0x0, use_real_addr, flags=0x0, prot&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=10.17.20.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=inside&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Result:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-interface: dmz&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-interface: inside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Action: drop&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Full config from ASA&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;interface Ethernet0/0&lt;BR /&gt;description WANPORT&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description DMZPORT&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;description INSIDEPORT03&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;description INSIDEPORT04&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;description INSIDEPORT05&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;description INSIDEPORT06&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;description INSIDEPORT07&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.84 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.17.19.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.17.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name blablabla.com&lt;BR /&gt;object network GW-PC&lt;BR /&gt;host 10.17.19 .1&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;subnet 10.17.20.0 255.255.255.0&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt;subnet 10.17.19.0 255.255.255.0&lt;BR /&gt;access-list inside_acl extended permit tcp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit icmp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit udp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit ip any object dmz-subnet&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list dmz_acl extended permit tcp any any&lt;BR /&gt;access-list dmz_acl extended permit udp any any&lt;BR /&gt;access-list dmz_acl extended permit icmp any any&lt;BR /&gt;access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list rdp_acl extended permit tcp any object GW-PC&lt;BR /&gt;!&lt;BR /&gt;object network GW-PC&lt;BR /&gt;nat (dmz,outside) static interface service tcp https https&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;nat (inside,dmz) dynamic interface&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group rdp_acl in interface outside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 28 Sep 2019 08:26:56 GMT</pubDate>
    <dc:creator>alimovdenis34450</dc:creator>
    <dc:date>2019-09-28T08:26:56Z</dc:date>
    <item>
      <title>Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931467#M5413</link>
      <description>&lt;P&gt;Hi guys!&lt;/P&gt;&lt;P&gt;I have ASA 5505. My configuration is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description WANPORT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description DMZPORT&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;shutdown&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description INSIDEPORT03&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/4&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description INSIDEPORT04&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/5&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description INSIDEPORT05&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/6&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description INSIDEPORT06&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Ethernet0/7&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;description INSIDEPORT07&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;switchport access vlan 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Vlan1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 10.10.10.84 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Vlan2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif dmz&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 50&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 10.17.19.254 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface Vlan3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nameif inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ip address 10.17.20.254 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dns domain-lookup outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;dns server-group DefaultDNS&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;domain-name blablabla.com&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network GW-PC&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; host 10.17.19.1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network inside-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; subnet 10.17.20.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; subnet 10.17.19.0 255.255.255.0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit tcp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit icmp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit udp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit ip any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list dmz_acl extended permit ip any any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list dmz_acl extended permit tcp any any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list dmz_acl extended permit udp any any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list dmz_acl extended permit icmp any any&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list rdp_acl extended permit tcp any object GW-PC&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network GW-PC&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; nat (dmz,outside) static interface service tcp https https&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;object network dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp;nat (dmz,outside) dynamic interface&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group rdp_acl in interface outside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group dmz_acl in interface dmz&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group inside_acl in interface inside&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dmz-Outside connection works good. But In dmz-subnet located server GW-PC with ip address 10.17.99.1 and I need to open access to this server from PC 10.17.20.3 which located in inside-subnet. So, I created access list for this connection:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_acl extended permit tcp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit icmp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit udp any object dmz-subnet&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list inside_acl extended permit ip any object dmz-subnet&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group inside_acl in interface inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also access list for dmz-subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list dmz_acl extended permit tcp any any&lt;BR /&gt;access-list dmz_acl extended permit udp any any&lt;BR /&gt;access-list dmz_acl extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group dmz_acl in interface dmz&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I still can not ping&amp;nbsp;GW-PC 10.17.99.1 from inside-subnet from this PC. Please help. Thank you!&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931467#M5413</guid>
      <dc:creator>alimovdenis34450</dc:creator>
      <dc:date>2020-02-21T17:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931522#M5420</link>
      <description>I think there is a typo in your last sentence, You mean to say 10.17.19.1. Based on that ....&lt;BR /&gt;&lt;BR /&gt;ASA by default allow High Security Level to Low security level traffic. So in your case Inside (100) to DMZ (50) should be allowed by default. No ACL required for the traffic. By default ASA does not inspect ICMP, hence ping will not work for traffic going through firewall. If you want to enable ICMP you need to inspect the ICMP protocol. To do so you need below command.&lt;BR /&gt;&lt;BR /&gt;FIXUP PROTOCOL ICMP.&lt;BR /&gt;&lt;BR /&gt;However, as you mentioned your TCP/UDP traffic should not have any problem as they are inspected by default. Have you tried RDP/HTTP/HTTPS to the GW-PC?&lt;BR /&gt;&lt;BR /&gt;Can you post output of the packet tracer.&lt;BR /&gt;&lt;BR /&gt;packet-tracer input INSIDE tcp 10.17.20.1 80 10.17.19.1 443 detailed&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Sep 2019 14:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931522#M5420</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-27T14:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931575#M5423</link>
      <description>&lt;P&gt;You probably need NAT(inside,dmz) to communicate between Inside &amp;lt;-&amp;gt; DMZ .&lt;/P&gt;&lt;P&gt;Use packet-tracer to troubleshoot.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 16:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931575#M5423</guid>
      <dc:creator>ivanzrv200</dc:creator>
      <dc:date>2019-09-27T16:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931587#M5424</link>
      <description>With all due respect, just to clarify your understanding. NAT is not mandatory but optional configuration for this scenario as inside and dmz subnet are directly connected.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Fri, 27 Sep 2019 16:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931587#M5424</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-27T16:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931676#M5426</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 19:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931676#M5426</guid>
      <dc:creator>alimovdenis34450</dc:creator>
      <dc:date>2019-09-27T19:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931689#M5427</link>
      <description>&lt;P&gt;Hi! You was right, I just added to the network adapter on my PC GATEWAY=10.17.20.254 (it was empty before) and now I can ping from PC (10.17.20.3/.255.255.0.0/10.17.20.254)&amp;nbsp; the GW-PC (10.17.19.1/255.255.0.0/10.17.19.254). It is no need to add special ACL for connection&amp;nbsp; inside -&amp;gt; dmz.&lt;/P&gt;&lt;P&gt;But now I have new problem. I cannot ping from GW_PC (10.17.19.1/255.255.0.0/10.17.19.254) in dmz _subnet the PC (10.17.20.3/.255.255.0.0/10.17.20.254) in inside_subnet. I have to connect&amp;nbsp; GW-PC -&amp;gt; PC by RPD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guys how to allow RDP, TCP, UDP traffic from dmz_subnet to inside_subnet?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 19:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931689#M5427</guid>
      <dc:creator>alimovdenis34450</dc:creator>
      <dc:date>2019-09-27T19:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931704#M5429</link>
      <description>&lt;P&gt;Troubleshoot with packet tracer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz _subnet tcp 10.17.19.1 123 10.17.20.1 443 detailed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;post the output of the packet tracer&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 20:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931704#M5429</guid>
      <dc:creator>ivanzrv200</dc:creator>
      <dc:date>2019-09-27T20:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931771#M5431</link>
      <description>According to you first post the subnet mask was /24 and here you mentioned /16 which i think is typo. And the answer is based on /24.&lt;BR /&gt;&lt;BR /&gt;As i already stated that high to low security level traffic is allowed but to allow traffic from low to high security level you need to configure ACLs.&lt;BR /&gt;Just an example&lt;BR /&gt;&lt;BR /&gt;access-list DMZ_in extended permit ip host 10.17.19.1 host 10.17.20.1&lt;BR /&gt;Access-group DMZ_IN in interface DMZ&lt;BR /&gt;&lt;BR /&gt;You should modify the ACL according to your need for TCP and UDP ports you want to allow.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Sat, 28 Sep 2019 02:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931771#M5431</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-28T02:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931772#M5432</link>
      <description>My typo mistake&lt;BR /&gt;&lt;BR /&gt;access-list DMZ_in extended permit ip host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;Access-group DMZ_IN in interface DMZ&lt;BR /&gt;&lt;BR /&gt;Please update this</description>
      <pubDate>Sat, 28 Sep 2019 02:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931772#M5432</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-28T02:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931823#M5434</link>
      <description>&lt;P&gt;Guys, I added ACL rules to the ASA config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;access-group dmz_acl in interface dmz&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I still cannot connect from 10.17.20.3 (dmz) to&amp;nbsp; 10.17.19.1 (inside)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trace log:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Lucky(cfg-call-home)# packet-tracer input dmz tcp 10.17.19.1 123 10.17.20.3 443 detailed&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ROUTE-LOOKUP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: input&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in 10.17.20.0 255.255.255.0 inside&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 2&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: ACCESS-LIST&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: log&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-group dmz_acl in interface dmz&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;access-list dmz_acl extended permit ip any any&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in id=0xcb3ea578, priority=13, domain=permit, deny=false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=809, user_data=0xc94fb030, cs_id=0x0, use_real_addr, flags=0x0, pro&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;tocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=any&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: IP-OPTIONS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: ALLOW&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;in id=0xcb3e0e80, priority=0, domain=inspect-ip-options, deny=true&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=1219, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=any&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Phase: 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Type: NAT&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Subtype: rpf-check&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Result: DROP&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Config:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;object network inside-subnet&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;nat (inside,dmz) dynamic interface&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Additional Information:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Forward Flow based lookup yields rule:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;out id=0xcb3c0da8, priority=6, domain=nat-reverse, deny=false&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;hits=87, user_data=0xc85f9e98, cs_id=0x0, use_real_addr, flags=0x0, prot&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;ocol=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;dst ip/id=10.17.20.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input_ifc=dmz, output_ifc=inside&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Result:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-interface: dmz&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;input-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-interface: inside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;output-line-status: up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Action: drop&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Full config from ASA&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;interface Ethernet0/0&lt;BR /&gt;description WANPORT&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;description DMZPORT&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;description INSIDEPORT03&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;description INSIDEPORT04&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;description INSIDEPORT05&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;description INSIDEPORT06&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;description INSIDEPORT07&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.84 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.17.19.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.17.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name blablabla.com&lt;BR /&gt;object network GW-PC&lt;BR /&gt;host 10.17.19 .1&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;subnet 10.17.20.0 255.255.255.0&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt;subnet 10.17.19.0 255.255.255.0&lt;BR /&gt;access-list inside_acl extended permit tcp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit icmp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit udp any object dmz-subnet&lt;BR /&gt;access-list inside_acl extended permit ip any object dmz-subnet&lt;BR /&gt;access-list dmz_acl extended permit ip any any&lt;BR /&gt;access-list dmz_acl extended permit tcp any any&lt;BR /&gt;access-list dmz_acl extended permit udp any any&lt;BR /&gt;access-list dmz_acl extended permit icmp any any&lt;BR /&gt;access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3&lt;BR /&gt;access-list rdp_acl extended permit tcp any object GW-PC&lt;BR /&gt;!&lt;BR /&gt;object network GW-PC&lt;BR /&gt;nat (dmz,outside) static interface service tcp https https&lt;BR /&gt;object network inside-subnet&lt;BR /&gt;nat (inside,dmz) dynamic interface&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group rdp_acl in interface outside&lt;BR /&gt;access-group dmz_acl in interface dmz&lt;BR /&gt;access-group inside_acl in interface inside&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Sep 2019 08:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931823#M5434</guid>
      <dc:creator>alimovdenis34450</dc:creator>
      <dc:date>2019-09-28T08:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with ASA5505 configuration</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931888#M5436</link>
      <description>You don't need NAT for traffic going from DMZ to INSIDE.&lt;BR /&gt;Remove below&lt;BR /&gt;&lt;BR /&gt;nat (inside,dmz) dynamic interface&lt;BR /&gt;&lt;BR /&gt;Sorry i can not go through full configuration as i am on mobile but from your trace output i can say this.&lt;BR /&gt;If you have problems please post new packet tracer output.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Sat, 28 Sep 2019 14:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-asa5505-configuration/m-p/3931888#M5436</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-28T14:39:08Z</dc:date>
    </item>
  </channel>
</rss>

