<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SQL server access from DMZ interface ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697341#M561692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied the static (inside,DMZ) 192.168.1.7 192.168.1.7 netmask 255.255.255.255 as stated below. but still no go. I've attched my config and also packet tracer test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terrence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 May 2011 06:36:23 GMT</pubDate>
    <dc:creator>terrencepayet</dc:creator>
    <dc:date>2011-05-27T06:36:23Z</dc:date>
    <item>
      <title>SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697337#M561686</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow users from network 10.132.23.0/24, 10.132.33.0/24, 10.132.24.0/24 access to our SQL server(192.168.1.7) located on the inside interface(192.168.1.0/24 network)&lt;/P&gt;&lt;P&gt;Those networks (10.132.0.0/16) come from the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can this be done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697337#M561686</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2019-03-11T20:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697338#M561689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes it can. Were you interested in natting any of the traffic? If not, just use NAT Exemption to allow the traffic through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 23:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697338#M561689</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-26T23:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697339#M561690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let me expain the scenario. I will like to allow 10.132.23.0/24, 10.132.33.0, 10.136.66.0/24 coming on DMZ interface 10.132.26.1/24 to the inside interface, to access our Microsoft SQL server 192.168.1.7 255.255.255.255. I would like to protect the rest of the internl network from access. Also is there a way to allow access to the Microsoft Sql Server port:1433.&lt;/P&gt;&lt;P&gt;I would like to ping the Sql Server from the DMZ interface also. Is this possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 03:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697339#M561690</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-27T03:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697340#M561691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said this is possible. You most likely want to use NAT Exemption or even a Static to allow the networks to talk to each other. I assume the DMZ is a lower security than the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The easiest way to configure access is using a static like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.1.7 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above static would allow all resources on the DMZ to access the inside 192.168.1.7 server. To further restrict what can access the 192.168.1.7, you than use the access-list on the DMZ interface to allow and/or restrict access to the SQL server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said, you can also use NAT exemption to allow the communication as well.&amp;nbsp; Nat exemption give you more flexibility to identify networks that can access the 192.168.1.7, however you would still require use of the access-list to allow or block traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat exemption configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_bypassing.html#wp1080803"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_bypassing.html#wp1080803&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 05:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697340#M561691</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-27T05:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697341#M561692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied the static (inside,DMZ) 192.168.1.7 192.168.1.7 netmask 255.255.255.255 as stated below. but still no go. I've attched my config and also packet tracer test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terrence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 06:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697341#M561692</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-27T06:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697342#M561693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like you forgot to apply a access-list for the DMZ. Access-lists are required for all interfaces with the expection of the hishest security interface. Apply an access-list for the DMZ networks to the SQL server and let me know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 06:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697342#M561693</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-27T06:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697343#M561694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might have to add this ACL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp 10.132.0.0 255.255.0.0 SQLDB&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are missing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 06:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697343#M561694</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-27T06:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697344#M561695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've added the access-list as suggested. But still no go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am i doing something wrong. Am not able to ping 192.168.1.7.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 07:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697344#M561695</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-27T07:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697345#M561696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works now thanks.&lt;/P&gt;&lt;P&gt;But instead of using static, I would like to use Natting. So network from 10.132.0.0 from the DMZ access the 10.132.26.1 interface and translate it to our internal LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 07:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697345#M561696</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-27T07:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697346#M561697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Terrence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need the static as well, but if you want to nat the dmz users to inside interface, then you can add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 2 10.32.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;global (inside) 2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 07:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697346#M561697</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-27T07:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697347#M561698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;So let's say i want to access my database server 192.168.1.7 from 10.132.0.0/16.&lt;/P&gt;&lt;P&gt;I want to be able to access the server from 10.132.26.1. So users on the remote network will use 10.132.26.1 to access the database.&lt;/P&gt;&lt;P&gt;This is what i want to acheive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 07:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697347#M561698</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-27T07:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697348#M561699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Than you would just change the static I provided you earlier:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.132.26.1 192.168.1.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above static will allow hosts on the DMZ to access the 192.168.1.7 server using the mapped IP address of 10.132.26.1. Keep in mind you alos have to change your access-list on the DMZ to allow connections to 10.132.26.1 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 20:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697348#M561699</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-27T20:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: SQL server access from DMZ interface ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697349#M561700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank. It works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 May 2011 09:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sql-server-access-from-dmz-interface-asa-5505/m-p/1697349#M561700</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-28T09:27:00Z</dc:date>
    </item>
  </channel>
</rss>

