<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't send mail from server in DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424095#M715104</link>
    <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm in the process of getting a PIX 525 (OS 8.04) setup.&amp;nbsp; It has 6 ethernet interfaces.&amp;nbsp; I have a DMZ (DMZ-IBM) that hosts our Lotus Domino Servers.&amp;nbsp; I am using PAT for this scenario.&amp;nbsp; Inbound mail is working fine, but I am unable to send any outgoing mail.&amp;nbsp; For that matter, I am also unable to access the internet from any server in that DMZ which while not needed all the time, is useful for updating the OS on those servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ-IBM are all using 192.168.10.0/28.&amp;nbsp; I have 2 public IPs that those servers share using PAT.&amp;nbsp; I tried running a packet-tracer and it says that traffic is dropped by an Access-List, an implicit rule.&amp;nbsp; I'm not sure what kind of an ACL to create to enable web and mail traffic to go out the outside interface from a host in DMZ-IBM.&amp;nbsp; Any suggestions are welcome.&amp;nbsp; Thank you very much!&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:27:22 GMT</pubDate>
    <dc:creator>fieryhail</dc:creator>
    <dc:date>2019-03-11T17:27:22Z</dc:date>
    <item>
      <title>Can't send mail from server in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424095#M715104</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm in the process of getting a PIX 525 (OS 8.04) setup.&amp;nbsp; It has 6 ethernet interfaces.&amp;nbsp; I have a DMZ (DMZ-IBM) that hosts our Lotus Domino Servers.&amp;nbsp; I am using PAT for this scenario.&amp;nbsp; Inbound mail is working fine, but I am unable to send any outgoing mail.&amp;nbsp; For that matter, I am also unable to access the internet from any server in that DMZ which while not needed all the time, is useful for updating the OS on those servers. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ-IBM are all using 192.168.10.0/28.&amp;nbsp; I have 2 public IPs that those servers share using PAT.&amp;nbsp; I tried running a packet-tracer and it says that traffic is dropped by an Access-List, an implicit rule.&amp;nbsp; I'm not sure what kind of an ACL to create to enable web and mail traffic to go out the outside interface from a host in DMZ-IBM.&amp;nbsp; Any suggestions are welcome.&amp;nbsp; Thank you very much!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424095#M715104</guid>
      <dc:creator>fieryhail</dc:creator>
      <dc:date>2019-03-11T17:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: Can't send mail from server in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424096#M715106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 18:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424096#M715106</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-03-30T18:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Can't send mail from server in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424097#M715108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize for the fact that it is probably very messy.&amp;nbsp; I am very very new to this.&amp;nbsp; Please forgive me (and point out) any ametuerish mistakes I have made.&amp;nbsp; I also omitted the VPN entries as I do not believe they are relevant to this situation in order to make the config a little easier to read.&amp;nbsp; Thanks again for any assistance in tis matter.&amp;nbsp; Is very much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 8.0(4) &lt;BR /&gt;!&lt;BR /&gt;hostname pix&lt;BR /&gt;domain-name rcserveny.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 96.xx.xx.174 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt; nameif DMZ1&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.30.1 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif DMZ-ESX&lt;BR /&gt; security-level 80&lt;BR /&gt; ip address 192.168.50.1 255.255.255.248 &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface Ethernet3&lt;BR /&gt; speed 100&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; duplex full&amp;nbsp; &lt;BR /&gt; nameif DMZ-IBM&lt;BR /&gt; security-level 60&lt;BR /&gt; ip address 192.168.10.1 255.255.255.240 &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface Ethernet4&lt;BR /&gt; shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; no nameif&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;interface Ethernet5&lt;BR /&gt; speed 100&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; duplex full&amp;nbsp; &lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.1 255.255.255.0 &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name rcserveny.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list nonnat_inside_DMZ1 extended permit ip 10.0.0.0 255.0.0.0 192.168.30.0 255.255.255.0 &lt;BR /&gt;access-list nonnat_inside_DMZ1 extended permit ip any 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list nonnat_inside_DMZ1 extended permit ip host 10.1.1.1 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list nonnat_inside_DMZ1 extended permit ip 10.0.0.0 255.0.0.0 192.168.112.0 255.255.248.0 &lt;BR /&gt;access-list nonnat_inside_DMZ1 extended permit ip 10.1.1.0 255.255.255.0 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list DMZ1_IN extended permit ip interface inside interface DMZ1 &lt;BR /&gt;access-list DMZ1_IN extended permit tcp host 192.168.30.2 any eq www &lt;BR /&gt;access-list DMZ1_IN extended permit icmp host 192.168.30.2 any &lt;BR /&gt;access-list DMZ1_IN extended permit ip host 192.168.30.2 any &lt;BR /&gt;access-list DMZ1_IN extended permit ip 10.1.1.0 255.255.255.0 192.168.30.0 255.255.255.248 &lt;BR /&gt;access-list DMZ1_IN extended permit icmp any any &lt;BR /&gt;access-list DMZ1_IN extended permit ip 10.0.0.0 255.0.0.0 192.168.30.0 255.255.255.248 &lt;BR /&gt;access-list INSIDE_IN extended permit ip 10.0.0.0 255.0.0.0 any &lt;BR /&gt;access-list INSIDE_IN extended permit ip 10.1.1.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;BR /&gt;access-list INSIDE_IN extended permit ip 10.1.1.0 255.255.255.0 192.168.10.0 255.255.255.240 &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 0.0.0.0 255.0.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 10.0.0.0 255.0.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 127.0.0.0 255.0.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 172.16.0.0 255.240.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 192.168.0.0 255.255.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended deny ip 224.0.0.0 224.0.0.0 any &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.171 eq www &lt;BR /&gt;access-list OUTSIDE_IN extended permit icmp any host 96.xx.xx.171 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.171 eq 420 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp 10.0.0.0 255.0.0.0 host 192.168.30.2 eq www &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq smtp &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq pop3 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq imap4 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq ldap &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 580 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 581 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq lotusnotes &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 1433 &lt;BR /&gt;access-list OUTSIDE_IN extended permit udp any host 96.xx.xx.172 eq 1433 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 1516 &lt;BR /&gt;access-list OUTSIDE_IN extended permit udp any host 96.xx.xx.172 eq 1516 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 2080 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 3891 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 3903 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 7080 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 7090 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 7092 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 7443 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 7444 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 8642 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 11099 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 11100 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 18180 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.172 eq 18443 &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.171 eq ldap &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.171 eq https &lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any host 96.xx.xx.171 eq lotusnotes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ1_nat0_outbound extended permit ip 192.168.30.0 255.255.255.248 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list DMZ-ESX_IN extended permit ip 10.1.1.0 255.255.255.0 192.168.50.0 255.255.255.248 &lt;BR /&gt;access-list DMZ-ESX_IN extended permit ip interface inside interface DMZ-ESX &lt;BR /&gt;access-list nonnat_inside_DMZ-ESX extended permit ip 10.0.0.0 255.0.0.0 192.168.50.0 255.255.255.248 &lt;BR /&gt;access-list nonnat_inside_DMZ-ESX extended permit ip any 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list nonnat_inside_DMZ-ESX extended permit ip host 10.1.1.1 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list nonnat_inside_DMZ-ESX extended permit ip 10.0.0.0 255.0.0.0 192.168.112.0 255.255.248.0 &lt;BR /&gt;access-list nonnat_inside_DMZ-ESX extended permit ip 10.1.1.0 255.255.255.0 10.1.1.0 255.255.255.192 &lt;BR /&gt;access-list DMZ-IBM_IN extended permit ip interface inside interface DMZ-IBM &lt;BR /&gt;access-list DMZ-IBM_IN extended permit ip 10.1.1.0 255.255.255.0 192.168.10.0 255.255.255.240 &lt;BR /&gt;access-list DMZ-IBM_IN extended permit tcp host 192.168.10.2 any eq smtp &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor emergencies&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 10.1.1.101&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu DMZ1 1500 &lt;BR /&gt;mtu DMZ-ESX 1500&lt;BR /&gt;mtu DMZ-IBM 1500&lt;BR /&gt;ip local pool internal 10.1.1.31-10.1.1.40 mask 255.255.255.0&lt;BR /&gt;no failover&amp;nbsp;&amp;nbsp; &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image flash:/asdm-61551.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 101 interface&lt;BR /&gt;nat (inside) 0 access-list nonnat_inside_DMZ1&lt;BR /&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ1) 0 access-list DMZ1_nat0_outbound&lt;BR /&gt;static (DMZ1,outside) tcp 96.56.78.171 420 192.168.30.2 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 smtp 192.168.10.2 smtp netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 pop3 192.168.10.2 pop3 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 imap4 192.168.10.2 imap4 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 ldap 192.168.10.2 ldap netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 580 192.168.10.6 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 581 192.168.10.6 https netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 lotusnotes 192.168.10.2 lotusnotes netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 1433 192.168.10.2 1433 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) udp 96.56.78.172 1433 192.168.10.2 1433 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 1516 192.168.10.2 1516 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) udp 96.56.78.172 1516 192.168.10.2 1516 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 2080 192.168.10.2 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 2443 192.168.10.2 https netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 3891 192.168.10.2 3891 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 3903 192.168.10.2 3903 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 7080 192.168.10.6 7080 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 7090 192.168.10.6 7090 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 7092 192.168.10.6 7092 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 7443 192.168.10.6 7443 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 8642 192.168.10.6 8642 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 11099 192.168.10.6 11099 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 11100 192.168.10.6 11100 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 18180 192.168.10.6 18180 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.172 18443 192.168.10.6 18443 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.171 www 192.168.10.4 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.171 ldap 192.168.10.4 ldap netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.171 https 192.168.10.4 https netmask 255.255.255.255 &lt;BR /&gt;static (DMZ-IBM,outside) tcp 96.56.78.171 lotusnotes 192.168.10.4 lotusnotes netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ-ESX) 10.1.1.0 10.1.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (inside,DMZ-IBM) 10.1.1.0 10.1.1.0 netmask 255.255.255.0 &lt;BR /&gt;access-group INSIDE_IN in interface inside&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;BR /&gt;access-group DMZ1_IN in interface DMZ1&lt;BR /&gt;access-group DMZ-ESX_IN in interface DMZ-ESX&lt;BR /&gt;access-group DMZ-IBM_IN in interface DMZ-IBM&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.xx.xx.169 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5 &lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 10.1.1.101-10.1.1.200 inside&lt;BR /&gt;dhcpd dns xx.xx.xx.138 xx.xx.xx.4 interface inside&lt;BR /&gt;dhcpd domain rcserveny.com interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 18:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424097#M715108</guid>
      <dc:creator>fieryhail</dc:creator>
      <dc:date>2010-03-30T18:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Can't send mail from server in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424098#M715110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I seem to have solved the issue, but I'm not sure if in doing so I am creating more potential problems.&amp;nbsp; My gut says that I may be.&amp;nbsp; I see that I was missing a NAT statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ-IBM) 101 192.168.10.0 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then i added: (and this is the part that concerns me)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IBM_IN extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this may be opening the server up too much, is there a way to tighten it up some, or am I wrong to be concerned?&amp;nbsp; Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 19:32:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424098#M715110</guid>
      <dc:creator>fieryhail</dc:creator>
      <dc:date>2010-03-30T19:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Can't send mail from server in DMZ</title>
      <link>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424099#M715113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A missing NAT was I thought it would be. Your permit ip any any is wide open (but only outbound from the DMZ). You can tighten it down with something like this-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IBM_IN extended permit udp host 192.168.10.x host [dns server] eq 53&lt;/P&gt;&lt;P&gt;access-list DMZ-IBM_IN extended permit tcp host 192.168.10.x any eq 80&lt;/P&gt;&lt;P&gt;access-list DMZ-IBM_IN extended permit tcp host 192.168.10.x any eq 443&lt;/P&gt;&lt;P&gt;access-list DMZ-IBM_IN extended deny ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would allow DNS lookups and web browsing. You don't need to permit traffic that comes into the interface as the ASA is stateful and will keep track of the sessions coming from other interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Mar 2010 19:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-send-mail-from-server-in-dmz/m-p/1424099#M715113</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-03-30T19:40:04Z</dc:date>
    </item>
  </channel>
</rss>

