<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need Help setting up ASA 5505 with dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369741#M731934</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am very glad to hear that you are reading books and trying to configure. Way to Go !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This static&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.10 xxx.xxx.xxx.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us say DMZ is 50 level and inside is 100 level.&amp;nbsp; That static above is called a D-NAT or destination NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You only need to use this when you want to change the DESTINATION IP address that the inside hosts try to reach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like I said by default you only need to provide translation from high to low and only for the SOURCE IP. That static will look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) fake_ip real_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy learning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Jan 2010 15:47:25 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-01-18T15:47:25Z</dc:date>
    <item>
      <title>Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369734#M731858</link>
      <description>&lt;P&gt;I am new to this, so please bear with me. I am attempting to set up an ASA 5505 witht he following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside network on 192.168.0.0&lt;/P&gt;&lt;P&gt;outside network xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;dmz 192.168.1.0 with database accesable from inside and outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After a few days of trying to get this running, I am understanding somethings, but still can't get it to work. So far inside can access internet, inside can access DMZ, sort of. I can access another computer on the DMZ @192.168.1.20, but not the database at 192.168.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside cannot access database on DMZ.&lt;/P&gt;&lt;P&gt; Currently outside is DHCP, but will be moved to a static address later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname sausage&lt;BR /&gt;domain-name umn.edu&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd xxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name umn.edu&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_access_in extended permit tcp any host xxx.xxx.xxx.xxx eq 3306 &lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any eq 3306 host xxx.xxx.xxx.xxx &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (dmz,outside) tcp interface 3306 192.168.1.10 3306 netmask 255.255.255.255 &lt;BR /&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 &lt;BR /&gt;static (dmz,inside) 192.168.1.10 xxx.xxx.xxx.xxx netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in_1 in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.200-192.168.0.250 inside&lt;BR /&gt;dhcpd dns 134.84.84.84 128.101.101.101 interface inside&lt;BR /&gt;dhcpd domain umn.edu interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2345f04be6a8c8cfbacc9d511d61abbb&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369734#M731858</guid>
      <dc:creator>magnetpeat</dc:creator>
      <dc:date>2019-03-11T16:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369735#M731864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You outside ACL only allows port 3306 to host xxxx.&lt;/P&gt;&lt;P&gt;And also you static for the dmz is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 3306 192.168.1.10 3306 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you should only be able to reach xxxx on port 3306 coming from the outside give that xx is the outside interface ip address and that the internal host 192.168.1.10 is listening on 3306.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow more communications please change you ACL and statics for out to dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 23:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369735#M731864</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-01-13T23:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369736#M731877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi PK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--So you should only be able to reach xxxx on port 3306 coming from the outside give that xx is the outside interface ip address and that the internal host --192.168.1.10 is listening on 3306.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is actually what I am trying to do, however it is not working. I cannot access 192.168.10 on port 3306 coming from the outside. I am guessing something is wrong with the SNAT's that I have set up, but I have tried many different variations and nothing seems to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 02:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369736#M731877</guid>
      <dc:creator>magnetpeat</dc:creator>
      <dc:date>2010-01-14T02:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369737#M731887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the reason for this static?&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.10 xxx.xxx.xxx.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no need for this. By default we do not translate the hosts on the lower security interface. DMZ is sec 50 and Inside is 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway the acl should look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pls. remove these two lines&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xxx.xxx.xxx.xxx eq 3306 &lt;BR /&gt;access-list outside_access_in_1 extended permit tcp any eq 3306 host xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and add just this one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 3306&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the only acl that you need.&amp;nbsp; This will receive the traffic on the outside interace for port 3306 and based on the static pat line it will send it to the dmz host 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 03:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369737#M731887</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-14T03:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369738#M731902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If xxx is the outside interface then your config is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleado do "logg enable", "logg buffer-size 1000000", "logg buffered debug" and try a connection and do "sh logg" to get the logs, those could tell more..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 06:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369738#M731902</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-01-14T06:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369739#M731918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the solution, it is now working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you ask:&lt;/P&gt;&lt;P&gt;What is the reason for this static?&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.10 xxx.xxx.xxx.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was followiing, or atempting to follow, the Config for DMZ from the ASA 5505 getting started book and that is one of the statics they have you put in. I am slowly learning this stuff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks also to pkampana for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jan 2010 18:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369739#M731918</guid>
      <dc:creator>magnetpeat</dc:creator>
      <dc:date>2010-01-15T18:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369740#M731925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The static is in charge of mapping an external (or other&lt;/P&gt;&lt;P&gt;address) to an internal address based on which interfaces you specify between the parenthesis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) ext_addr internal_addr netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jan 2010 07:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369740#M731925</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-01-18T07:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help setting up ASA 5505 with dmz</title>
      <link>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369741#M731934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am very glad to hear that you are reading books and trying to configure. Way to Go !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This static&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.10 xxx.xxx.xxx.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us say DMZ is 50 level and inside is 100 level.&amp;nbsp; That static above is called a D-NAT or destination NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You only need to use this when you want to change the DESTINATION IP address that the inside hosts try to reach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like I said by default you only need to provide translation from high to low and only for the SOURCE IP. That static will look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) fake_ip real_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy learning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for rating.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jan 2010 15:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-setting-up-asa-5505-with-dmz/m-p/1369741#M731934</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-18T15:47:25Z</dc:date>
    </item>
  </channel>
</rss>

