<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone based Firewall --DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461775#M654217</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still a little confused.&lt;/P&gt;&lt;P&gt;I've used vlans, hopfully this won't make much of a diffrance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below listing only has Security zones, all other info I sniped out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So :-&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; zone-member security WAN&lt;BR /&gt;!&lt;BR /&gt;interface Vlan90&lt;BR /&gt; zone-member security DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp; zone-member security LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying I need to change Vlan90 to WAn, rahter then DMZ. If so how do I set up access from some internal hosts to the "dmz" hosts that will be in the WAN zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 18 Jul 2010 07:15:57 GMT</pubDate>
    <dc:creator>brendanhoran</dc:creator>
    <dc:date>2010-07-18T07:15:57Z</dc:date>
    <item>
      <title>Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461771#M654192</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am very new to Cisco, and routing/ firewalls in general.&lt;BR /&gt;I brought my self a Cisco 1812. Its connected via Fe/0 to an ADSL modem in pure bridge mode. So the 1812 is doing all the PPP auth.&lt;BR /&gt;I've been following this guide &lt;A href="http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml" target="_blank"&gt;Zone-Based Policy Firewall Design and Application Guide&lt;/A&gt; . So far I've got everything set up. PPP works, F/W works I have a single port forward working and I've port scanned the router to ensure that only the ports I've allowed are open.&lt;BR /&gt;I am quite stuck now. I have created a DMZ zone. I have allowed SSH and HTTPS from my LAN-zone into my DMZ-zone. This works with out a hitch. The dmz is on a diffrent subnet. and hangs off Fa/6.&lt;BR /&gt;Where I am suck is I want full access from the WAN-zone into the DMZ-zone. I can't seem to get this to work.&lt;BR /&gt;Each host in the DMZ hsa there own firewall so I don't want the Cisco to do anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached my current runnign config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461771#M654192</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2019-03-11T18:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461772#M654205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i havent read the config, but i think one option is putting both the wan and dmz in the same zone, so the firewall wont do anything to block the traffic as traffic is permitted between interfaces belonging to same zone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Jul 2010 14:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461772#M654205</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-17T14:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461773#M654209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I though under ZBF, that only one interfacce can be assigned to any one zone.&lt;/P&gt;&lt;P&gt;So I don't quite understand how I would place Fe/0 and Fe/6 Into the same zone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 02:16:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461773#M654209</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-18T02:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461774#M654213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pretty much the same way as u placed other interfaces in zones&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for&amp;nbsp; eg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;u must have done the following&lt;/P&gt;&lt;P&gt;int fe0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-member security public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now all u need to do is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int fe0/6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-member security public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hoping that both of these are L3 interfaces&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 06:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461774#M654213</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-18T06:37:39Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461775#M654217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still a little confused.&lt;/P&gt;&lt;P&gt;I've used vlans, hopfully this won't make much of a diffrance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below listing only has Security zones, all other info I sniped out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So :-&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer0&lt;/P&gt;&lt;P&gt; zone-member security WAN&lt;BR /&gt;!&lt;BR /&gt;interface Vlan90&lt;BR /&gt; zone-member security DMZ&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp; zone-member security LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying I need to change Vlan90 to WAn, rahter then DMZ. If so how do I set up access from some internal hosts to the "dmz" hosts that will be in the WAN zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 07:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461775#M654217</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-18T07:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461776#M654222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i would say that it is definately worth a shot,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can out it in wan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now to permit your dmz networks to access your lan you can use access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or if you do not want to do this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;setup a zone-pair between wan and dmz and permit everything using access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if its still confusing you can paste the snippet which has class-map, policy-map and zone-pair config, i can look it up and advise suitably&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 07:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461776#M654222</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-18T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461777#M654232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll give it a shot.&lt;/P&gt;&lt;P&gt;I still don't quite understand thoug&lt;BR /&gt;I currently have a zone pair for LAN-DMZ access, this works fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;zone-pair security LAN-to-DMZ source LAN destination DMZ&lt;BR /&gt; service-policy type inspect LAN-to-DMZ-policy&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect LAN-to-DMZ-policy&lt;BR /&gt; class type inspect L7-inspect-class&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any L7-inspect-class&lt;BR /&gt; match protocol ssh&lt;BR /&gt; match protocol http&lt;BR /&gt; match protocol https&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also set up a policy map to match an ACL for the DMZ to WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any DMZ-class&lt;BR /&gt; match access-group 130&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;policy-map type inspect WAN-to-DMZ-policy&lt;BR /&gt; class type inspect DMZ-class&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;BR /&gt;access-list 130 remark DMZ access all&lt;BR /&gt;access-list 130 permit ip any any&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't quite understand why this is not working. I know SSH,HTTP and HTTPS work from LAN to DMZ, but why can DMZ to WAn any to any work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i was to change teh DMZ zone of Vlan90 to WAN, I would need to change my LAN-DMZ&amp;nbsp; policy to LAN to WAN ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 07:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461777#M654232</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-18T07:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461778#M654245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;When Zone based Firewall configurec, traffic between different Zone members are blocked by default, I suggest you configure another Zone pair allowing traffic from WAN to DMZ as bellow:&lt;BR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;zone-pair security WAN-to-DMZ source WAN destination DMZ&lt;BR /&gt; service-policy type inspect WAN-to-DMZ-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;class-map type inspect match-any DMZ-class&lt;BR /&gt; match access-group 130&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect WAN-to-DMZ-policy&lt;BR /&gt; class type inspect DMZ-class&lt;/P&gt;&lt;P&gt;inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 130 remark DMZ access all&lt;BR /&gt;access-list 130 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above config, traffic from WAN to DMZ are also allowed just as it was setup from the LAN to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Mohamed&lt;/P&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 14:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461778#M654245</guid>
      <dc:creator>Mohamed Sobair</dc:creator>
      <dc:date>2010-07-18T14:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461779#M654256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wht mohamed says is correct&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but just please keep in mind if you want the traffic to be initiated from dmz to wan you will need another zone-pair with source as dmz and destination as wan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 16:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461779#M654256</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-18T16:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461780#M654270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Mohamed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone-pair security WAN-DMZ source WAN destination DMZ&lt;BR /&gt; service-policy type inspect WAN-to-DMZ-policy&lt;BR /&gt;zone-pair security DMZ-WAN source DMZ destination WAN&lt;BR /&gt; service-policy type inspect WAN-to-DMZ-policy&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect WAN-to-DMZ-policy&lt;BR /&gt; class type inspect DMZ-class&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any DMZ-class&lt;BR /&gt; match access-group 130&lt;BR /&gt;!&lt;BR /&gt;access-list 130 remark DMZ access all&lt;BR /&gt;access-list 130 permit ip any any&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If thats right... Then i must have something else wrong as my machine in the DMZ still cna't access any services on the internet.&lt;/P&gt;&lt;P&gt;Quick question, the default gateway on machines on the Vlan90 should be 192.168.90.254 (fe/6) or should it be 192.168.0.254 (fe/1)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Jul 2010 22:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461780#M654270</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-18T22:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461781#M654282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as i said before for dmz to internet you will need one more zone-pair with source as dmz and destination as wan and the rest can be same, as in you can permit everything and inspect traffic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 04:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461781#M654282</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-19T04:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461782#M654292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i see you already have it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so what you can do is you can enale this command and it will show you if the firewall is dropping any packet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eneter this command and see the logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as far as the default gateway is concerned it will be the interface in vlan 90&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 04:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461782#M654292</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-19T04:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461783#M654302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok Looks like its dropping traffic.&lt;/P&gt;&lt;P&gt; From the log :-&lt;/P&gt;&lt;P&gt;%FW-6-DROP_PKT: Dropping dns pkt 192.168.90.250:35063 =&amp;gt; 192.231.203.3:53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.90.220, is my host on the Vlan 90.&lt;/P&gt;&lt;P&gt;192.231.203.3 is my ISP's DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question now is why and how do I find out why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 05:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461783#M654302</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-19T05:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461784#M654307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;just to clarify, these hosts were able to access internet before implementing the firewall right???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so if its an dns issue you should be able to ping to anything in internet using ip address, or you should be able to access websites using their ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 74.125.19.103, 74.125.19.147, 74.125.19.104, 74.125.19.99&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my nslookup for google gave me the following ip, can you try the following from browser&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://74.125.19.103"&gt;http://74.125.19.103&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 05:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461784#M654307</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-19T05:29:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461785#M654314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jathaval,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The host used to be on the Vlan 10, Ping,dns ect all worked fine as they do for any host on the Vlan10.&lt;/P&gt;&lt;P&gt;Vlan10 is firewalled. I need this host to be in the DMZ. So i moved this host into Vlan90.&lt;/P&gt;&lt;P&gt;Now it can not communicat with any hosts on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I try ping 74.125.19.103 from the host on Vlan90, I get nothing. Nothing in the logs, Nothing happens on the host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 05:36:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461785#M654314</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-19T05:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461786#M654318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;will it be possible for you to attach the config, so that we can look at the whole config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to isolate the issue further you can disable firewall on wan and dmz for a min by removing the zone security command and try to get to internet from dmz hosts, but be careful as you will end up disturbing traffic from lan to wan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so wht u can do is for a min you can remove zone security commands from all interfaces and test dmz-wan connectivity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i understand tihs might not be possible, so if its ok with you could you please attach the config so that we can take a look at everything&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 05:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461786#M654318</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-19T05:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461787#M654321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jathaval,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config is attached to my orignal post, in a zip file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can not pull the firewall off, its a PROD enviroment. Anything else I can try?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 06:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461787#M654321</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-19T06:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461788#M654324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you do not have ip nat inside on vlan 90 &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also include this network in 101 acl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 06:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461788#M654324</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-19T06:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461789#M654328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Solved &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;BR /&gt;As soon as I added the ip nat inside and updated ACL 101 it worked!&lt;/P&gt;&lt;P&gt;Its always the simple things, its a learning experience after all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks everyone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 09:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461789#M654328</guid>
      <dc:creator>brendanhoran</dc:creator>
      <dc:date>2010-07-19T09:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Zone based Firewall --DMZ</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461790#M654329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brendan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;EM&gt;Glad its solved, Just a quick answer to your previous example:&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Mohamed,&lt;BR /&gt; &lt;BR /&gt;I think this is right?&lt;BR /&gt; &lt;BR /&gt;!&lt;BR /&gt;zone-pair security WAN-DMZ source WAN destination &lt;SPAN class="yshortcuts" id="lw_1279535294_1" style="border-bottom: 2px dotted #366388; cursor: pointer;"&gt;DMZ&lt;/SPAN&gt;&lt;BR /&gt; service-policy type inspect WAN-to-DMZ-policy&lt;BR /&gt;zone-pair security DMZ-WAN source DMZ destination WAN&lt;BR /&gt; service-policy type inspect WAN-to-DMZ-policy&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect WAN-to-DMZ-policy&lt;BR /&gt; class type inspect DMZ-class&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any DMZ-class&lt;BR /&gt; match access-group 130&lt;BR /&gt;!&lt;BR /&gt;access-list 130 remark DMZ access all&lt;BR /&gt;access-list 130 permit ip any any&lt;BR /&gt;!&lt;BR /&gt; &lt;BR /&gt;If thats right... Then i must have something else wrong as my machine in the DMZ still cna't access any services on the internet.&lt;BR /&gt;Quick question, the default gateway on machines on the Vlan90 should be 192.168.90.254 (fe/6) or should it be 192.168.0.254 (fe/1)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3366ff;"&gt;&lt;EM&gt;If you set the pass action on the policy map , then you have to create another pair and policy that permits the return traffic from DMZ to WAN. otherwise, my example should solve your problem if you need WAN Access to DMZ which will inspect the traffic and will permit the return traffic as its stateful.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Mohamed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Jul 2010 10:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-dmz/m-p/1461790#M654329</guid>
      <dc:creator>Mohamed Sobair</dc:creator>
      <dc:date>2010-07-19T10:33:50Z</dc:date>
    </item>
  </channel>
</rss>

