<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting up device in DMZ (SlingBox) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474051#M681632</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you meant to say "sling box NATed ip address" instead of "my computer" on the following:&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt;host 10.2.1.10&amp;nbsp;&amp;nbsp; &amp;lt;-----------slingbox&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object&amp;nbsp; network NAS1&lt;/P&gt;&lt;P&gt;nat (dmz,inside) static 192.168.1.15&amp;nbsp;&amp;nbsp; &amp;lt;--------&lt;SPAN style="color: #ff0000;"&gt;my&amp;nbsp; computer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the assumption is correct, here is what I believe you are trying to achieve:&lt;/P&gt;&lt;P&gt;Your PC where the slingbox client is on 192.168.1.8.&lt;/P&gt;&lt;P&gt;Slingbox is on DMZ with ip address of 10.2.1.10, and you would like to NAT it to 192.168.1.15 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would also need to configure the following:&lt;/P&gt;&lt;P&gt;object network yourPC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.1.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,dmz) static 192.168.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, if you have access-list on the inside interface, you would need to allow between your PC 192.168.1.8 and 192.168.1.15 (plus make sure that proxy arp on the inside interface is not disabled).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 May 2010 05:18:34 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-05-03T05:18:34Z</dc:date>
    <item>
      <title>Setting up device in DMZ (SlingBox)</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474050#M681629</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For those who is not familiar with what is SlingBox is, it basically stream a analog or digital video source over TCP/IP.&amp;nbsp; Is a pretty cool device and it will also stream the video over internet.&amp;nbsp; &lt;A href="http://ca.slingmedia.com/go/slingbox-prohd" target="_blank"&gt;http://ca.slingmedia.com/go/slingbox-prohd&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The software client to view the SlingBox has a major issue.&amp;nbsp; It require that the computer and slingbox device located within the same network.&amp;nbsp; Basically, the software client will need to automatically detects the slingbox and there is no way to manually tell the software client where the slingbox is located (say if I place the slingbox in a different network).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Being side that, I try to put my slingbox in the DMZ of my ASA5505 base license. Setup static NAT as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt;host 10.2.1.10&amp;nbsp;&amp;nbsp; &amp;lt;-----------slingbox&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt;nat (dmz,inside) static 192.168.1.15&amp;nbsp;&amp;nbsp; &amp;lt;--------my computer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: I am using ASA 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My computer IP is 192.168.1.8 and when I launch the software client, it is unable to detect my slingbox in the DMZ....&amp;nbsp;&amp;nbsp; Any clue how to get this going? Keep in mind I only have the base license for my ASA5505, so I can't initiate traffic from DMZ to inside and I am not sure if that is a requirement for the slingbox....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I don't really want to put my slingbox to the inside zone, as slingbox require external internet connection initiated from the outside!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try getting support from slingbox manufacturer, they have never seen anyone trying to do this, hence, useless...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxxxxxxx&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan500&lt;/P&gt;&lt;P&gt; no forward interface Vlan800&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.2.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan800&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt; switchport protected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt; switchport protected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt; switchport protected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt; switchport protected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa831-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone xxxxx&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt; host 10.2.1.10&lt;/P&gt;&lt;P&gt;object network Internet_Access&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Internet_Access2&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service SlingBox tcp&lt;/P&gt;&lt;P&gt; port-object eq 5001&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ipv6 access-list inside_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list dmz_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list outside_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.15&lt;/P&gt;&lt;P&gt;object network Internet_Access&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Internet_Access2&lt;/P&gt;&lt;P&gt; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_ipv6_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;access-group dmz_access_ipv6_in in interface dmz&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_ipv6_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.2.1.8-10.2.1.12 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns {ISP DNS1} {ISP DNS2} interface dmz&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.8-192.168.1.15 inside&lt;/P&gt;&lt;P&gt;dhcpd dns {ISP DNS1} {ISP DNS2} interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username xxxxxx password xxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474050#M681629</guid>
      <dc:creator>SPERTWCISCO</dc:creator>
      <dc:date>2019-03-11T17:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up device in DMZ (SlingBox)</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474051#M681632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you meant to say "sling box NATed ip address" instead of "my computer" on the following:&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt;host 10.2.1.10&amp;nbsp;&amp;nbsp; &amp;lt;-----------slingbox&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object&amp;nbsp; network NAS1&lt;/P&gt;&lt;P&gt;nat (dmz,inside) static 192.168.1.15&amp;nbsp;&amp;nbsp; &amp;lt;--------&lt;SPAN style="color: #ff0000;"&gt;my&amp;nbsp; computer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the assumption is correct, here is what I believe you are trying to achieve:&lt;/P&gt;&lt;P&gt;Your PC where the slingbox client is on 192.168.1.8.&lt;/P&gt;&lt;P&gt;Slingbox is on DMZ with ip address of 10.2.1.10, and you would like to NAT it to 192.168.1.15 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would also need to configure the following:&lt;/P&gt;&lt;P&gt;object network yourPC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.1.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,dmz) static 192.168.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, if you have access-list on the inside interface, you would need to allow between your PC 192.168.1.8 and 192.168.1.15 (plus make sure that proxy arp on the inside interface is not disabled).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 05:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474051#M681632</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-03T05:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up device in DMZ (SlingBox)</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474052#M681634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;^^Your assumption is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ensure proxy arp is enable on all interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But still, the Slingbox client (192.168.1.8) can not detect the slingbox device (10.2.1.10) in the dmz....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname xxxx&lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan200&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan500&lt;/P&gt;&lt;P&gt; no forward interface Vlan800&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.2.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan800&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 800&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa831-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt; host 10.2.1.10&lt;/P&gt;&lt;P&gt;object network Internet_Access&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network Internet_Access2&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network laptop&lt;/P&gt;&lt;P&gt; host 192.168.1.8&lt;/P&gt;&lt;P&gt;object-group service SlingBox tcp&lt;/P&gt;&lt;P&gt; port-object eq 5001&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host 192.168.1.8 any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.1.9 any object-group SlingBox&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip host 192.168.1.8 host 192.168.1.15&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ipv6 access-list inside_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list dmz_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;ipv6 access-list outside_access_ipv6_in deny ip any any&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network NAS1&lt;/P&gt;&lt;P&gt; nat (dmz,inside) static 192.168.1.15&lt;/P&gt;&lt;P&gt;object network Internet_Access&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network Internet_Access2&lt;/P&gt;&lt;P&gt; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network laptop&lt;/P&gt;&lt;P&gt; nat (inside,dmz) static 192.168.1.8&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_ipv6_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;access-group dmz_access_ipv6_in in interface dmz&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_ipv6_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.2.1.8-10.2.1.12 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns [ISP DNS1] [ISP DNS2] interface dmz&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.8-192.168.1.15 inside&lt;/P&gt;&lt;P&gt;dhcpd dns [ISP DNS1] [ISP DNS2] interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username xxxxx password xxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 May 2010 05:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474052#M681634</guid>
      <dc:creator>SPERTWCISCO</dc:creator>
      <dc:date>2010-05-03T05:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up device in DMZ (SlingBox)</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474053#M681635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip host 10.2.1.10 host 192.168.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still doesn't work~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 04:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474053#M681635</guid>
      <dc:creator>SPERTWCISCO</dc:creator>
      <dc:date>2010-05-04T04:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up device in DMZ (SlingBox)</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474054#M681636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not too sure how slingbox works, but how does it automatically detect the server? What protocol and address does it use? Are you sure you can't configure the server ip address on the client?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 11:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-device-in-dmz-slingbox/m-p/1474054#M681636</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T11:47:08Z</dc:date>
    </item>
  </channel>
</rss>

