<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Setting up DMZ on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544851#M751659</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the prompt response&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;global (dmz) 1 interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;This will allow all inside hosts to commucate with dmz server,&lt;/P&gt;&lt;P&gt;But in my case, I want to allow single host (that is my pc ) to communicate with&amp;nbsp; this server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 05 Sep 2010 00:07:49 GMT</pubDate>
    <dc:creator>samirshaikh52</dc:creator>
    <dc:date>2010-09-05T00:07:49Z</dc:date>
    <item>
      <title>Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544849#M751608</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;I've an Cisco ASA 5520 with following interfaces setup:&lt;/P&gt;&lt;P&gt;Outside (0) 78.93.*.*&lt;/P&gt;&lt;P&gt;Inside ( 100) 10.1.2.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I am planning to setup dmz and there will be webserver in that zone&lt;/P&gt;&lt;P&gt;I need help for two things:&lt;/P&gt;&lt;P&gt;1. How do I allow people accessing this webserver from Public Network&lt;/P&gt;&lt;P&gt;2, How do I allow only my pc residing in inside network to access this server and vice versa&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any will would be highly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544849#M751608</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2019-03-11T18:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544850#M751620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally this is what you'll have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside = security level 100&lt;/P&gt;&lt;P&gt;outside = security level 0&lt;/P&gt;&lt;P&gt;dmz = security level 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow traffic from outside to dmz you need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) public_IP private_IP --&amp;gt;&amp;nbsp; public_IP is the NATed IP for the web server and private_IP is the real IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host public_IP eq 80&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL will permit only TCP port 80 to the web server from the outside and it's applied to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to allow communication from inside to dmz, you just need NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544850#M751620</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544851#M751659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the prompt response&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;global (dmz) 1 interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;This will allow all inside hosts to commucate with dmz server,&lt;/P&gt;&lt;P&gt;But in my case, I want to allow single host (that is my pc ) to communicate with&amp;nbsp; this server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:07:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544851#M751659</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T00:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544852#M751717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To allow a single PC instead of having:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You change it to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 x.x.x.x 255.255.255.255&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace x.x.x.x with the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:11:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544852#M751717</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544853#M751757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What would happen if i make&amp;nbsp; static NAT ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544853#M751757</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T00:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544854#M751791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can create a static NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming your inside IP is 10.0.0.1&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.1 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT is normally done for inbound access (from a lower security interface to a higher security)&lt;/P&gt;&lt;P&gt;Regular NAT is normally done for outbound traffic (that's why I gave you the example).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Short answer is... either way will work.&lt;/P&gt;&lt;P&gt;Problem with static NAT is that the DMZ will have access to initiate traffic to your PC (if allowed by ACL)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544854#M751791</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544855#M751821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have heard something about Exempt NAT. Perhaps I didn't got any idea from web.&lt;/P&gt;&lt;P&gt;Please can you explain with simple example&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544855#M751821</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T00:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544856#M751846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exempt NAT is NAT 0 with ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allows you to define which traffic to bypass NAT and it has the highest preference in the NAT priority check done by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally used to bypass NAT for VPN traffic&lt;/P&gt;&lt;P&gt;ie.&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.1.1.0 255.255.255.0 10.1.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will allow traffic to flow between both networks with NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do the example of the static...&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.1 10.0.0.1&lt;/P&gt;&lt;P&gt;then you are allowing traffic to pass with NAT as well (this is static Identity NAT because you're not really translating the address anyway).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544856#M751846</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544857#M751879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If i am not wrong, can I&amp;nbsp; &lt;SPAN style="color: #333333; font-family: arial,helvetica,sans-serif; "&gt;just create an ACL to allow traffic from inside to dmz without NAT...Is is possible to make it ?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544857#M751879</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T00:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544858#M751907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&lt;/P&gt;&lt;P&gt;Depending on the version.&lt;/P&gt;&lt;P&gt;If you have nat-control enabled (can check it with sh run nat-control) then you MUST have a NAT rule for the ASA to allow traffic to pass between interfaces.&lt;/P&gt;&lt;P&gt;If you disable nat-control, then you can pass traffic without NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, an ACL is not required to pass traffic from inside to dmz.&lt;/P&gt;&lt;P&gt;An ACL is required to pass traffic from a lower security to a higher security (like in the case from dmz to inside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544858#M751907</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544859#M751925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is what i have done after your great explanation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.2.18 10.1.2.18&amp;nbsp; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Created an ACL to allow the traffice from dmz to inside&lt;/P&gt;&lt;P&gt;access-list DMZ-1_access_in line 2 extended permit tcp host 172.16.1.X object-group MYPC object-group sqlnet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544859#M751925</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T00:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544860#M751938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remember the important rules:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from higher security to lower security &lt;BR /&gt;requires NAT (if having nat-control)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from lower security to higher security &lt;BR /&gt;requires STATIC NAT and ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you already have an ACL applied to an interface, i.e. inside, &lt;BR /&gt;then all traffic that should be permitted must be explicitly defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really understand the above, you're done (for the basics). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 00:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544860#M751938</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-05T00:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up DMZ on ASA</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544861#M751953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much to all clear all my doubts&lt;/P&gt;&lt;P&gt;Thats was quiter helpful.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Sep 2010 01:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-dmz-on-asa/m-p/1544861#M751953</guid>
      <dc:creator>samirshaikh52</dc:creator>
      <dc:date>2010-09-05T01:17:34Z</dc:date>
    </item>
  </channel>
</rss>

