<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DMZ Internet Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424622#M712886</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only difference that I see is:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The IntNet gets translated to 216.64.172.34&lt;BR /&gt;The DMZNet gets translated to 216.64.172.33&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say, Internet works fine from the IntNet interface? &lt;BR /&gt;Could you do a test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;nat (DMZNet) 1 10.2.0.0 255.255.0.0&lt;BR /&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way, the DMZNet will get translated to .34 as the IntNet.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Let's see if it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Apr 2010 22:00:17 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-04-23T22:00:17Z</dc:date>
    <item>
      <title>DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424619#M712860</link>
      <description>&lt;P&gt;I think that I am on the last part of my Firewall config, and that is allowing traffic out of the DMZ to the Internet.&amp;nbsp; In theory I have it working where Internet traffic coming in is allowed, but I haven't been able to test that yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config for the DMZ:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;BR /&gt; description TWTelecom Internet&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif ExtNet&lt;BR /&gt; security-level 1&lt;BR /&gt; ip address 207.170.247.122 255.255.255.252&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;BR /&gt; description DMZ Interface&lt;BR /&gt; nameif DMZNet&lt;BR /&gt; security-level 25&lt;BR /&gt; ip address 10.2.2.254 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service WebPorts tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq pop3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZACL remark Allow all ICMP traffic&lt;BR /&gt;access-list DMZACL extended permit icmp any any &lt;BR /&gt;access-list DMZACL remark Allow SQL traffic from websites to SQL servers&lt;BR /&gt;access-list DMZACL extended permit tcp object-group DMZWebsites object-group IntSQL eq 1433 &lt;BR /&gt;access-list DMZACL remark Allow SMTP traffic from websites to Exchange servers&lt;BR /&gt;access-list DMZACL extended permit tcp object-group DMZWebsites object-group IntSMTP eq smtp &lt;BR /&gt;access-list DMZACL remark Deny all DMZ traffic to Internal Network&lt;BR /&gt;access-list DMZACL extended deny ip any host 10.1.0.0 &lt;BR /&gt;access-list DMZACL remark Allow DMZ access to the Internet&lt;BR /&gt;access-list DMZACL extended permit tcp 10.2.0.0 255.255.0.0 any object-group WebPorts &lt;BR /&gt;access-list DMZACL remark Deny EVERYTHING&lt;BR /&gt;access-list DMZACL extended deny ip any any&lt;/P&gt;&lt;P&gt;global (ExtNet) 1 216.64.172.34 netmask 255.255.255.255&lt;BR /&gt;global (ExtNet) 2 216.64.172.33 netmask 255.255.255.255&lt;BR /&gt;nat (IntNet) 0 access-list nonat&lt;BR /&gt;nat (IntNet) 1 10.1.0.0 255.255.0.0&lt;BR /&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;static (IntNet,DMZNet) 10.1.0.0 10.1.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;access-group IntACL in interface IntNet&lt;BR /&gt;access-group ExtACL in interface ExtNet&lt;BR /&gt;access-group DMZACL in interface DMZNet&lt;BR /&gt;route ExtNet 0.0.0.0 0.0.0.0 207.170.247.121 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But so far I am unable to ping anything on the Internet, nor am I able to connect to anything using HTTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think that the traffic is being blocked as I am able to use&lt;/P&gt;&lt;P&gt;packet-tracer input DMZNet tcp 10.2.1.100 80 209.85.171.104 80 detail&lt;/P&gt;&lt;P&gt;without any errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also checked the logs and it shows that it is trying to do the connection, but it doesn't appear like the connection ever finishes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that it might be a routing issue.&amp;nbsp; But I am not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help to shed some light on this issue?&amp;nbsp; I am pretty sure the ACL's are good, but I am still a bit skeptical of the NAT or possibly the routing.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424619#M712860</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2019-03-11T17:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424620#M712869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're tryintg to get out to the internet from the interface called DMZNet correct?&lt;/P&gt;&lt;P&gt;This interface has a security level of 25.&lt;/P&gt;&lt;P&gt;The outside ExNet has a security level of 1.&lt;/P&gt;&lt;P&gt;This means that traffic should flow from this interface to the outside interface (security level 0) without any ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZNet has an IP range of 10.2.0.0/16&lt;/P&gt;&lt;P&gt;The ExNet has a public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you PING 207.170.247.121 from the ASA itself?&lt;/P&gt;&lt;P&gt;Can you PING 4.2.2.2 from the ASA itself?&lt;/P&gt;&lt;P&gt;If the answer is yes, then you have Internet from the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check with the ''sh xlate local 10.2.2.x'' when attempting to get out to the Internet from that host on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 21:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424620#M712869</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T21:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424621#M712874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, thank you for that fast reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In most cases, yes the Internet would flow freely from one interface to a lower interface, but I have specific denies in place to block unwanted traffic out.&lt;/P&gt;&lt;P&gt;But as I said my packet trace works without issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I ran sh xlate local 10.2.50.100 and here is the output that I received:&lt;/P&gt;&lt;P&gt;PAT Global 216.64.172.33(1551) Local 10.2.50.100 ICMP id 768&lt;/P&gt;&lt;P&gt;Using the IntNet interface I am able to ping 209.85.171.104, but I am unable to ping that using either ExtNet or DMZNet&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 209.85.171.104, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When running a ping from 10.2.50.100 to 209.85.171.104 this is what is showing up in the log&lt;/P&gt;&lt;P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Apr 23 2010&lt;/TD&gt;&lt;TD&gt;07:38:17&lt;/TD&gt;&lt;TD&gt;302020&lt;/TD&gt;&lt;TD&gt;10.2.50.100&lt;/TD&gt;&lt;TD&gt;768&lt;/TD&gt;&lt;TD&gt;209.85.171.104&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;Built outbound ICMP connection for faddr 209.85.171.104/0 gaddr 216.64.172.33/42153 laddr 10.2.50.100/768&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Apr 23 2010&lt;/TD&gt;&lt;TD&gt;07:38:21&lt;/TD&gt;&lt;TD&gt;302021&lt;/TD&gt;&lt;TD&gt;209.85.171.104&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;10.2.50.100&lt;/TD&gt;&lt;TD&gt;768&lt;/TD&gt;&lt;TD&gt;Teardown ICMP connection for faddr 209.85.171.104/0 gaddr 216.64.172.33/42153 laddr 10.2.50.100/768&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 21:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424621#M712874</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-23T21:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424622#M712886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only difference that I see is:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The IntNet gets translated to 216.64.172.34&lt;BR /&gt;The DMZNet gets translated to 216.64.172.33&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say, Internet works fine from the IntNet interface? &lt;BR /&gt;Could you do a test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;nat (DMZNet) 1 10.2.0.0 255.255.0.0&lt;BR /&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way, the DMZNet will get translated to .34 as the IntNet.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Let's see if it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Apr 2010 22:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424622#M712886</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-23T22:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424623#M712895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize for the late response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I made those changes, and I am still unable to ping from my DMZNet interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually stumped as to why I am unable to connect out at this point.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Apr 2010 22:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424623#M712895</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-28T22:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424624#M712903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please double-check that the destination that you're trying to reach is allowed on the DMZACL access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, check if the translation is being built when attempting the connection.&lt;/P&gt;&lt;P&gt;sh xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, try to reach the default gateway of the ASA from the host on the DMZ, to check if traffic from the DMZ through the outside interface is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use an utility called Packet Tracer which you can use it via the CLI or ASDM that shows if any process on the ASA is blocking the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Apr 2010 22:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424624#M712903</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-28T22:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424625#M712924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is creating the xlate when I run the ping:&lt;/P&gt;&lt;P&gt;Firewall# sh xlate | inc 10.2&lt;BR /&gt;PAT Global 216.64.172.33(16856) Local 10.2.50.100 ICMP id 768&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to ping the default gateway just fine from the computer I am testing with.&amp;nbsp; When I try to ping from the ASA itself (ping DMZNet 209.85.171.104) I get request timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am afraid that I do not know how to do the packet tracer command with ICMP properly (I will have to look that up a bit later).&amp;nbsp; But when I ran the command:&lt;/P&gt;&lt;P&gt; packet-tracer input DMZNet icmp 10.2.2.100 1 1 1 209.85.171.104&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ExtNet&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZACL in interface DMZNet&lt;BR /&gt;access-list DMZACL extended permit icmp any any&lt;BR /&gt;access-list DMZACL remark Allow SQL traffic from websites to SQL servers&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp; match ip DMZNet 10.2.0.0 255.255.0.0 ExtNet any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (216.64.172.33)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZNet&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ExtNet&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I do know how to run the packet tracer for TCP and this is what I got from there:&lt;/P&gt;&lt;P&gt; packet-tracer input DMZNet tcp 10.2.2.100 80 209.85.171.104 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ExtNet&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZACL in interface DMZNet&lt;BR /&gt;access-list DMZACL extended permit tcp 10.2.0.0 255.255.0.0 any object-group WebPorts&lt;BR /&gt;access-list DMZACL remark Deny EVERYTHING&lt;BR /&gt;object-group service WebPorts tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq pop3&lt;BR /&gt; port-object eq imap4&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp; match ip DMZNet 10.2.0.0 255.255.0.0 ExtNet any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (216.64.172.33)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 11, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.2.2.100/80 to 216.64.172.33/319 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp; match ip DMZNet 10.2.0.0 255.255.0.0 ExtNet any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 2 (216.64.172.33)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 11, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 701784, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: output and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 207.170.247.121 using egress ifc ExtNet&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 001b.c016.c8f7 hits 42500&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZNet&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: ExtNet&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;It looks like I might have a NAT problem....again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 13:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424625#M712924</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-29T13:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424626#M712949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem&amp;nbsp; seems NAT, let's do the following:&lt;/P&gt;&lt;P&gt;Please post the output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;sh run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 14:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424626#M712949</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T14:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424627#M712965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall# sh run nat&lt;BR /&gt;nat (IntNet) 0 access-list nonat&lt;BR /&gt;nat (IntNet) 1 10.1.0.0 255.255.0.0&lt;BR /&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# sh run global&lt;BR /&gt;global (ExtNet) 1 216.64.172.34 netmask 255.255.255.255&lt;BR /&gt;global (ExtNet) 2 216.64.172.33 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# sh run static&lt;BR /&gt;static (IntNet,DMZNet) 10.1.0.0 10.1.0.0 netmask 255.255.0.0&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.35 10.1.2.12 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.40 10.1.2.6 netmask 255.255.255.255&lt;BR /&gt;static (DMZNet,ExtNet) 216.64.172.41 10.1.2.2 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.61 10.1.1.100 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.62 10.1.1.101 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.59 10.1.1.102 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.58 10.1.1.104 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.42 10.1.1.106 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.57 10.1.2.150 netmask 255.255.255.255&lt;BR /&gt;static (IntNet,ExtNet) 216.64.172.38 10.1.2.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# sh run access-group&lt;BR /&gt;access-group IntACL in interface IntNet&lt;BR /&gt;access-group ExtACL in interface ExtNet&lt;BR /&gt;access-group DMZACL in interface DMZNet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# sh run access-list&lt;BR /&gt;access-list DMZACL remark Allow all ICMP traffic&lt;BR /&gt;access-list DMZACL extended permit icmp any any&lt;BR /&gt;access-list DMZACL remark Allow SQL traffic from websites to SQL servers&lt;BR /&gt;access-list DMZACL extended permit tcp object-group DMZWebsites object-group IntSQL eq 1433&lt;BR /&gt;access-list DMZACL remark Allow SMTP traffic from websites to Exchange servers&lt;BR /&gt;access-list DMZACL extended permit tcp object-group DMZWebsites object-group IntSMTP eq smtp&lt;BR /&gt;access-list DMZACL remark Deny all DMZ traffic to Internal Network&lt;BR /&gt;access-list DMZACL extended deny ip any 10.1.0.0 255.255.0.0&lt;BR /&gt;access-list DMZACL remark Allow DMZ access to the Internet&lt;BR /&gt;access-list DMZACL extended permit tcp 10.2.0.0 255.255.0.0 any object-group WebPorts&lt;BR /&gt;access-list DMZACL remark Deny EVERYTHING&lt;BR /&gt;access-list DMZACL extended deny ip any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 14:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424627#M712965</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-29T14:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424628#M712975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, here are the commands we need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZNet) 2 10.2.0.0 255.255.0.0&lt;BR /&gt;global (ExtNet) 2 216.64.172.33 netmask 255.255.255.255&lt;BR /&gt;access-group DMZACL in interface DMZNet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to get to 209.85.171.104 from 10.2.2.100 correct?&lt;/P&gt;&lt;P&gt;The access list applied to the DMZNet is DMZACL.&lt;BR /&gt;You are referring to an object-group called DMZWebsites, but from the configuration I only see&lt;BR /&gt;the object-group WebPorts tcp &lt;BR /&gt;You need to make sure that on the DMZACL, the outgoing traffic is allowed (or post the object-groups as well)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, &lt;BR /&gt;Host 10.2.2.100 (DMZNet) will be NATed to 216.64.172.33 when going out the outside interface. &lt;BR /&gt;We have checked that the translation takes place ''sh xlate local 10.2.2.100'' correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have said, that you can PING 207.170.247.121 from 10.2.2.100 fine correct?&lt;BR /&gt;This means that traffic is flowing fine from the DMZNet to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP that you're trying to reach 209.85.171.104, is located on the outside interface from the ASA perspective correct? &lt;BR /&gt;What is this device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 14:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424628#M712975</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T14:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424629#M712988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry about that, I forgot about the object groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service WebPorts tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq pop3&lt;BR /&gt; port-object eq imap4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DMZWebsites&lt;BR /&gt; network-object host 10.2.1.101&lt;BR /&gt; network-object host 10.2.1.100&lt;BR /&gt; network-object host 10.2.1.104&lt;BR /&gt; network-object host 10.2.1.102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;209.85.171.104 is just one of the IP addresses for &lt;A href="http://www.google.com"&gt;www.google.com&lt;/A&gt;&amp;nbsp; Since I may have a problem with DNS resolution, I am first testing with IP's, once I get the IP's functioning I will start playing with DNS.&lt;/P&gt;&lt;P&gt;So to answer your question I need all DMZNet systems (10.2.0.0/16) to be able to access the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The system that I am currently testing with is setup on DHCP and has an IP of 10.2.50.102&lt;/P&gt;&lt;P&gt;Firewall# sh xlate local 10.2.50.102&lt;BR /&gt;309 in use, 777 most used&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is on an ASA 5510 running 8.0(5)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 15:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424629#M712988</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-29T15:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424630#M712996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cannot PING 209.85.171.104 or open a browser with that IP either.&lt;/P&gt;&lt;P&gt;Can you try a PING to 4.2.2.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 15:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424630#M712996</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T15:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424631#M713004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright, so I am a dunce, and Google has changed their IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to successfully ping the 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which means that this has probably been working since the start &lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/plain.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was also able to get DNS up and running, but allowing External DNS traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much Federico, you have perfectly resolved my problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 16:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424631#M713004</guid>
      <dc:creator>kharvey</dc:creator>
      <dc:date>2010-04-29T16:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: DMZ Internet Access</title>
      <link>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424632#M713010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad that is working.&lt;/P&gt;&lt;P&gt;Thank you Ken.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 16:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-internet-access/m-p/1424632#M713010</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T16:18:33Z</dc:date>
    </item>
  </channel>
</rss>

