<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connecting a second subnet to dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511634#M635506</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok so the Inside will be the DMZ and the SAN will be... well.... the SAN network, I dont see any NAT configuration, woulc you please do a packet tracer command from the DMZ to the SAN network? I will be like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp &lt;INSIDE_IP&gt; 1025 &lt;SAN_IP&gt; 80&lt;/SAN_IP&gt;&lt;/INSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this we will be able to see what is the reason for the drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Nov 2010 19:21:51 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2010-11-03T19:21:51Z</dc:date>
    <item>
      <title>Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511631#M635503</link>
      <description>&lt;P&gt;We just dropped a SAN into our dmz and I've created a new network for it for it using a different subnet. The LAN itself works independently without a problem but as I try to connect the new network to our ASA 5520's I'm running into connectivity issue. I can't seem to get traffic from the dmz subnet to the san subnet. The DMZ and SAN interfaces are set to the same security level on the ASA and I have allowed same-security traffic to pass. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone give me a sanity check here? I think I need an appropriate NAT entry for this to work but all of my attempts at that have yielded no progress. I've left out unrelated ACL and NAT entries and VPN config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xx.xxx.xxx.xxx 255.255.255.224 standby xx.xxx.xxx.xxx &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0 standby 10.0.0.254 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; nameif SAN&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.1.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 10.0.0.0 255.255.0.0 10.0.1.0 255.255.255.0 &lt;BR /&gt;access-list nonat extended permit ip 10.0.0.0 255.255.255.0 10.0.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_out extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu SAN 1500&lt;BR /&gt;ip local pool vpnpool 10.0.5.1-10.0.5.254 mask 255.255.255.0&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover GigabitEthernet0/3&lt;BR /&gt;failover key *****&lt;BR /&gt;failover link failover GigabitEthernet0/3&lt;BR /&gt;failover interface ip failover 172.16.1.1 255.255.255.0 standby 172.16.1.2&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;monitor-interface inside&lt;BR /&gt;monitor-interface management&lt;BR /&gt;monitor-interface SAN&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-508.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 xx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group PERMIT_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 66.150.232.161 1&lt;BR /&gt;route inside 10.0.5.0 255.255.255.0 10.0.0.1 1&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511631#M635503</guid>
      <dc:creator>mayanquetza</dc:creator>
      <dc:date>2019-03-11T19:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511632#M635504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My name is Mike and I will try to help you out, I dont see the DMZ anywhere I can see the SAN interface only. Are the DMZ and SAN on the same interface? Would the ASA do the routing for this subnets? Would you please draw us a topology for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 19:02:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511632#M635504</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-03T19:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511633#M635505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will &lt;SPAN style="background-color: #f8fafd;"&gt;a visio diagram suffice? I've attached our layout. I've added the lighter weigted lines to the diagram indicating what I'm trying to do.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The background colors take the place of physical connections to the appropriate LAN switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;The DMZ, as of right now, is signified by the "inside" and "san" interfaces on the ASA config I pasted. The ASA will be doing the routing for these subnets, that's not what I wanted but it also isn't my call.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 19:15:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511633#M635505</guid>
      <dc:creator>mayanquetza</dc:creator>
      <dc:date>2010-11-03T19:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511634#M635506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok so the Inside will be the DMZ and the SAN will be... well.... the SAN network, I dont see any NAT configuration, woulc you please do a packet tracer command from the DMZ to the SAN network? I will be like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp &lt;INSIDE_IP&gt; 1025 &lt;SAN_IP&gt; 80&lt;/SAN_IP&gt;&lt;/INSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this we will be able to see what is the reason for the drop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Nov 2010 19:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511634#M635506</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-03T19:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511635#M635507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the packet-tracer command valid on ASA 7.0(X) software?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS isn't recognizing it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 16:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511635#M635507</guid>
      <dc:creator>mayanquetza</dc:creator>
      <dc:date>2010-11-04T16:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511636#M635508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately, it was introduced in 7.2, so you will not have it in 7.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Nov 2010 18:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511636#M635508</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-04T18:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Connecting a second subnet to dmz</title>
      <link>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511637#M635509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My apologies, the devices are fairly new and I haven't had the downtime to upgrade them. This isn't a showstopper is it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Nov 2010 13:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connecting-a-second-subnet-to-dmz/m-p/1511637#M635509</guid>
      <dc:creator>mayanquetza</dc:creator>
      <dc:date>2010-11-05T13:13:53Z</dc:date>
    </item>
  </channel>
</rss>

