<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with routing Inside and outside traffic to DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708309#M557238</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem got resolved after i implimented the PAT to DMZ Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kiran Kumar CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Apr 2011 10:37:49 GMT</pubDate>
    <dc:creator>kiran kumar Chamakura</dc:creator>
    <dc:date>2011-04-28T10:37:49Z</dc:date>
    <item>
      <title>Issue with routing Inside and outside traffic to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708305#M557232</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured DMZ on cisco ASA 5510 with an subnet 10.10.10.x, I need all the Inside users i.e. all the VLAN Users behind the firewall who are connected to L3 switch need an access to DMZ Servers and also Outeside user to connect the server in DMZ.I have assigned one of the public IP to the server in DMZ and created the access list that allow only 80 port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having problem with routing the Inside and Outside user to connect an test server using port 80.Please find the configuration as bellow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i execute sh route on the ASA i could see any routes for DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me ..............&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.x 255.255.255.x &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description UP-Link to L3 Switch&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.40.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.11.252 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone IST 5 30&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 61.12.21.34&lt;BR /&gt; name-server 203.196.128.4&lt;BR /&gt; name-server 192.168.6.22&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq pop3&lt;BR /&gt; port-object eq smtp&lt;BR /&gt;object-group network group-inside-vpnclient&lt;BR /&gt; description all inside accessible network&lt;BR /&gt; network-object 192.168.15.0 255.255.255.0&lt;BR /&gt; network-object 192.168.6.0 255.255.255.0&lt;BR /&gt; network-object 192.168.8.0 255.255.255.0&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;access-list outside_mpc remark testing&lt;BR /&gt;access-list outside_mpc extended permit tcp x.x.x.x 255.255.255.x any object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list 101 extended permit icmp any any echo-reply &lt;BR /&gt;access-list 101 extended permit icmp any any source-quench &lt;BR /&gt;access-list 101 extended permit icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any any time-exceeded &lt;BR /&gt;access-list 101 extended permit tcp any any eq www &lt;BR /&gt;access-list acl-vpnclient extended permit ip object-group group-inside-vpnclient 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list acl-vpnclient extended permit tcp object-group group-inside-vpnclient object-group DM_INLINE_TCP_3 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list Split_Tunnelspecified_List standard permit 192.168.6.0 255.255.255.0 &lt;BR /&gt;access-list Split_Tunnelspecified_List standard permit 192.168.15.0 255.255.255.0 &lt;BR /&gt;access-list Split_Tunnelspecified_List standard permit 192.168.8.0 255.255.255.0 &lt;BR /&gt;access-list OUTSIDE_TO_DMZ_SERVER extended permit tcp any host x.x.x.x eq www log &lt;BR /&gt;access-list IN_TO_DMZ_SERVER extended permit tcp any host 10.10.10.2 eq www log &lt;BR /&gt; &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool testpool 192.168.20.10-192.168.20.15 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list acl-vpnclient&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,outside) x.x.x.x 10.10.10.2 netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) 172.16.40.0 172.16.40.0 netmask 255.255.255.0 &lt;BR /&gt; &lt;BR /&gt;access-group OUTSIDE_TO_DMZ_SERVER in interface outside&lt;BR /&gt;access-group IN_TO_DMZ_SERVER in interface DMZ&lt;BR /&gt;!&lt;BR /&gt;router rip&lt;BR /&gt; network 10.0.0.0&lt;BR /&gt; network 172.16.0.0&lt;BR /&gt; default-information originate&lt;BR /&gt; version 2&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 203.196.150.161 1&lt;BR /&gt;route inside 192.168.6.0 255.255.255.0 172.16.40.2 1&lt;BR /&gt;route inside 192.168.8.0 255.255.255.0 172.16.40.2 1&lt;BR /&gt;route inside 192.168.15.0 255.255.255.0 172.16.40.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.40.1 255.255.255.255 inside&lt;BR /&gt;http 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.11.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set FirstSet esp-3des esp-md5-hmac &lt;BR /&gt;crypto dynamic-map dyn1 1 set transform-set FirstSet&lt;BR /&gt;crypto dynamic-map dyn1 1 set reverse-route&lt;BR /&gt;crypto map mymap 1 ipsec-isakmp dynamic dyn1&lt;BR /&gt;crypto map mymap interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 43200&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 172.16.40.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.11.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd ping_timeout 750&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map imblock&lt;BR /&gt; match any&lt;BR /&gt;class-map P2P&lt;BR /&gt; match port tcp eq www&lt;BR /&gt;class-map outside-class&lt;BR /&gt; match access-list outside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map type inspect im impolicy&lt;BR /&gt; parameters&lt;BR /&gt; match protocol msn-im yahoo-im &lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;policy-map outside-policy&lt;BR /&gt; class outside-class&lt;BR /&gt;&amp;nbsp; csc fail-close&lt;BR /&gt;policy-map type inspect http P2P_HTTP&lt;BR /&gt; parameters&lt;BR /&gt; match request uri regex _default_gator&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; match request uri regex _default_x-kazaa-network&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt;policy-map IM_P2P&lt;BR /&gt; class imblock&lt;BR /&gt;&amp;nbsp; inspect im impolicy &lt;BR /&gt; class P2P&lt;BR /&gt;&amp;nbsp; inspect http P2P_HTTP &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy outside-policy interface outside&lt;BR /&gt;service-policy IM_P2P interface inside&lt;BR /&gt;group-policy group-policy-default internal&lt;BR /&gt;group-policy group-policy-default attributes&lt;BR /&gt; banner value Welcome to the Nisum Corporate Network&lt;BR /&gt; dns-server value 192.168.6.22 61.12.21.34&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnelspecified_List&lt;BR /&gt; nac-settings none&lt;BR /&gt;username ssagi password itaVYlZs.BGqDowM encrypted&lt;BR /&gt;username ssagi attributes&lt;BR /&gt; vpn-group-policy group-policy-default&lt;BR /&gt;username nisumit password phchH3wy6GkeWo0r encrypted privilege 15&lt;BR /&gt;username kchamakura password K6LxuUPUCV9A/lHE encrypted&lt;BR /&gt;username kchamakura attributes&lt;BR /&gt; vpn-group-policy group-policy-default&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username mvadlamudi password qgC7ZYk1bSqttIFD encrypted&lt;BR /&gt;username mvadlamudi attributes&lt;BR /&gt; vpn-group-policy group-policy-default&lt;BR /&gt;tunnel-group testgroup type remote-access&lt;BR /&gt;tunnel-group testgroup general-attributes&lt;BR /&gt; address-pool testpool&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt; default-group-policy group-policy-default&lt;BR /&gt;tunnel-group testgroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:a40c65d743e80128799b090f8d671193&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Nisum-ASA5510# sh route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway of last resort is 203.196.150.161 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.12.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.13.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.14.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.15.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.8.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.40.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.30.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.20.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 203.196.150.160 255.255.255.224 is directly connected, outside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.4.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:18, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.0 255.255.0.0 is directly connected, cplane&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:19, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.6.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.7.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:19, inside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 203.196.150.161, outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708305#M557232</guid>
      <dc:creator>kiran kumar Chamakura</dc:creator>
      <dc:date>2019-03-11T20:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with routing Inside and outside traffic to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708306#M557233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kiran,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at the output of 'show interface', does your DMZ interface (eth0/1) show as up/up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically, if the interface is fully up, you should at least have a connected route for 10.10.10.x/24 in the output of 'show route'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Apr 2011 13:33:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708306#M557233</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-04-23T13:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with routing Inside and outside traffic to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708307#M557235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was an mistake, now we can see the route for DMZwhen i execute ip route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.12.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.13.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.14.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.15.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.8.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.40.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.30.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.20.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.11.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 203.196.150.160 255.255.255.224 is directly connected, outside&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.4.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:16, inside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.0.0 255.255.0.0 is directly connected, cplane&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:17, inside&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.0 255.255.255.0 is directly connected, DMZ&lt;BR /&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.6.0 255.255.255.0 [1/0] via 172.16.40.2, inside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;R&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.7.0 255.255.255.0 [120/1] via 172.16.40.2, 0:00:17, inside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnaks&lt;/P&gt;&lt;P&gt;Kiran Kumatr CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Apr 2011 13:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708307#M557235</guid>
      <dc:creator>kiran kumar Chamakura</dc:creator>
      <dc:date>2011-04-23T13:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with routing Inside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708308#M557236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured DMZ and I am able access the Web Server in the DMZ from Outside and I am able to access Inside Network from DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue is , i am not able to access Web Server in DMZ from Inside. When i am trying to access i am encountering with an Error as follows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;Error: No translation group found for icmp src inside dst DMZ&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_DMZ extended permit tcp any host x.x.x.x eq www&lt;BR /&gt;access-list acl-vpnclient extended permit ip object-group group-inside-vpnclient 192.168.x.0 255.255.255.0&lt;BR /&gt;access-list acl-vpnclient extended permit tcp object-group group-inside-vpnclient object-group DM_INLINE_TCP_3 192.168.x.0 255.255.255.0&lt;BR /&gt;access-list acl-vpnclient extended permit ip host 192.168.15.177 host 10.10.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_int extended permit tcp host 10.10.10.2 any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list inside_outside extended permit tcp host 192.168.x.177 host 10.10.10.2 eq www log&lt;BR /&gt;access-list inside_outside extended permit icmp host 192.168.x.177 host 10.10.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list acl-vpnclient&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,outside) x.x.x.x 10.10.10.2 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,inside) x.x.x.x 10.10.10.2 netmask 255.255.255.255&lt;BR /&gt;access-group outside_DMZ in interface outside&lt;BR /&gt;access-group dmz_int in interface DMZ&lt;BR /&gt;access-group inside_outside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kiran Kumar CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Apr 2011 12:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708308#M557236</guid>
      <dc:creator>kiran kumar Chamakura</dc:creator>
      <dc:date>2011-04-27T12:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with routing Inside and outside traffic to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708309#M557238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem got resolved after i implimented the PAT to DMZ Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kiran Kumar CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Apr 2011 10:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-routing-inside-and-outside-traffic-to-dmz/m-p/1708309#M557238</guid>
      <dc:creator>kiran kumar Chamakura</dc:creator>
      <dc:date>2011-04-28T10:37:49Z</dc:date>
    </item>
  </channel>
</rss>

