<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: outside accessing DMZ just not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508488#M695192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To start with, please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Ping 192.168.2.5 from the firewall annd make sure its successful.&lt;/P&gt;&lt;P&gt;2. Try a packet tracer and check if its successful&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp &lt;ANY public="" ip=""&gt; 1025&amp;nbsp; 124.240.203.149 80 detailed. Check the output to see if the pacet is getting dropped in any of the phases. If the packet is getting dropped in any of the phases, please paste the output here.&lt;/ANY&gt;&lt;/P&gt;&lt;P&gt;3. apply captures on the inside and the outside interface and check to see if packets are going through the firewall in both directions.Please paste the output of the capture here. Please refer to the link below for info on how to apply captures on PIX&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml#cliconfig"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml#cliconfig&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manisha Mandekar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Oct 2010 03:51:07 GMT</pubDate>
    <dc:creator>mmandeka</dc:creator>
    <dc:date>2010-10-14T03:51:07Z</dc:date>
    <item>
      <title>outside accessing DMZ just not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508487#M695176</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my configuration detail which from which I have been having difficulty access the DMZ (webserver)from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-508.bin&lt;BR /&gt;asdm location 192.168.1.5 255.255.255.255 DMZ&lt;BR /&gt;asdm location 192.168.0.0 255.255.255.255 Inside&lt;BR /&gt;asdm location 192.168.2.5 255.255.255.255 DMZ&lt;BR /&gt;asdm history enable&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.0(8) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name bfana.gov.tg&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; description LAN Facing Interface&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; description DMZ Facing Interface&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; description Internet Facing Interface&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.3.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;banner exec Unauthorised Access is Prohibitted.&lt;BR /&gt;banner exec Violation is deemed illegal and intruders will be prosecuted&lt;BR /&gt;banner login Unauthorised Access is Prohibitted.&lt;BR /&gt;banner login Violation is deemed illegal and intruders will be prosecuted&lt;BR /&gt;banner motd Unauthorised Access is Prohibitted.&lt;BR /&gt;banner motd Violation is deemed illegal and intruders will be prosecuted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PGT 10&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns name-server 124.240.221.33&lt;BR /&gt;dns name-server 202.165.192.23&lt;BR /&gt;access-list Outside_access_in remark Internet to Inside&lt;BR /&gt;access-list Outside_access_in extended permit ip any any &lt;BR /&gt;access-list Outside_access_in remark Permit Internet to Web Server&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host 124.240.203.149 eq www &lt;BR /&gt;access-list Inside_nat0_outbound extended permit ip any 192.168.1.0 255.255.255.128 &lt;BR /&gt;access-list Inside_access_in remark Inside accessing Internet&lt;BR /&gt;access-list Inside_access_in extended permit ip 192.168.0.0 255.255.255.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list test level debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging debug-trace&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip audit attack action drop&lt;BR /&gt;no failover&lt;BR /&gt;monitor-interface Inside&lt;BR /&gt;monitor-interface DMZ&lt;BR /&gt;monitor-interface Outside&lt;BR /&gt;monitor-interface management&lt;BR /&gt;icmp permit any Inside&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;icmp permit any Outside&lt;BR /&gt;asdm image disk0:/asdm-508.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (DMZ) 1 192.168.2.10-192.168.2.254 netmask 255.255.255.0&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;BR /&gt;nat (Inside) 1 192.168.0.0 255.255.255.0&lt;BR /&gt;nat (DMZ) 1 192.168.2.0 255.255.255.0 dns&lt;BR /&gt;static (DMZ,Outside) 124.240.203.149 192.168.2.5 netmask 255.255.255.255 &lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 124.240.203.229 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;group-policy Infocom internal&lt;BR /&gt;group-policy Infocom attributes&lt;BR /&gt; dns-server value 124.240.221.33 202.165.192.23&lt;BR /&gt; default-domain value bfana.gov.tg&lt;BR /&gt; webvpn&lt;BR /&gt;username user1 password iS5o8BaNdLW4rit5 encrypted privilege 0&lt;BR /&gt;username user1 attributes&lt;BR /&gt; vpn-group-policy Infocom&lt;BR /&gt; webvpn&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.3.0 255.255.255.0 management&lt;BR /&gt;snmp-server location 8th Floor detroit FND&lt;BR /&gt;snmp-server contact Liang&lt;BR /&gt;snmp-server community infocom&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no sysopt connection permit-ipsec&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 20 set security-association lifetime seconds 28800&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;isakmp enable Outside&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption aes&lt;BR /&gt;isakmp policy 10 hash md5&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;no vpn-addr-assign local&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 Inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.0.50-192.168.0.100 Inside&lt;BR /&gt;dhcpd address 192.168.3.10-192.168.3.20 management&lt;BR /&gt;dhcpd dns 124.240.221.33 202.165.192.23&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;dhcpd domain bfana.gov.tg&lt;BR /&gt;dhcpd enable Inside&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns maximum-length 512 &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Cryptochecksum:ac6b5d216611db0f668672790018b48e&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508487#M695176</guid>
      <dc:creator>Pius Nolih</dc:creator>
      <dc:date>2019-03-11T18:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: outside accessing DMZ just not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508488#M695192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To start with, please try the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Ping 192.168.2.5 from the firewall annd make sure its successful.&lt;/P&gt;&lt;P&gt;2. Try a packet tracer and check if its successful&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp &lt;ANY public="" ip=""&gt; 1025&amp;nbsp; 124.240.203.149 80 detailed. Check the output to see if the pacet is getting dropped in any of the phases. If the packet is getting dropped in any of the phases, please paste the output here.&lt;/ANY&gt;&lt;/P&gt;&lt;P&gt;3. apply captures on the inside and the outside interface and check to see if packets are going through the firewall in both directions.Please paste the output of the capture here. Please refer to the link below for info on how to apply captures on PIX&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml#cliconfig"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml#cliconfig&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manisha Mandekar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 03:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508488#M695192</guid>
      <dc:creator>mmandeka</dc:creator>
      <dc:date>2010-10-14T03:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: outside accessing DMZ just not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508489#M695211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My Asa version 7 and ASDM software does not support packet tracer.&lt;/P&gt;&lt;P&gt;If you can provide me a useful link to upgrade to versions supporting packet tracer, that would be good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried version 5.2 for ASDM on a spare ASA with similar version but could not get packet tracer loading...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try googling and would appreciate your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 04:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508489#M695211</guid>
      <dc:creator>Pius Nolih</dc:creator>
      <dc:date>2010-10-14T04:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: outside accessing DMZ just not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508490#M695227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet tracer command was introduced in 7.2(1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could upgrade the ASA to 7.2(4) and its a stable version in the 7.2 trail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's more information on the command:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/p_72.html#wp1724426&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please collect the bidirectional captures as this gives us exact details on whats dropping the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another suggestion here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also collect some syslgs on the pix in debugging level. Reproduce the issue. Then check the logs to see if you find something there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Oct 2010 04:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508490#M695227</guid>
      <dc:creator>mmandeka</dc:creator>
      <dc:date>2010-10-14T04:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: outside accessing DMZ just not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508491#M695255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks I guess upgrading wi&lt;/P&gt;&lt;P&gt;ll be the step in the right direction..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 04:21:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-accessing-dmz-just-not-working/m-p/1508491#M695255</guid>
      <dc:creator>Pius Nolih</dc:creator>
      <dc:date>2010-10-15T04:21:26Z</dc:date>
    </item>
  </channel>
</rss>

