<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with giving devices behind DMZ access to Lan Resou in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476358#M812385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the access list that you suggested but i still receive this error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNSDeny inbound UDP from petcam2/64204 to 10.10.10.254/53 due to DNS Query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Jul 2010 17:46:01 GMT</pubDate>
    <dc:creator>David Haman</dc:creator>
    <dc:date>2010-07-07T17:46:01Z</dc:date>
    <item>
      <title>Need help with giving devices behind DMZ access to Lan Resources</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476345#M812370</link>
      <description>&lt;P&gt;Heres a little background of my setup, I have 1 Isp which assigns me an Ip via dhcp , i have Patted my inside to outside to receive net access, I have also done the same with my Dmz interface which all devices on the Dmz can access the internet. Inside (vlan1) Outside (vlan2) Dmz (vlan3)&lt;/P&gt;&lt;P&gt;I have sucessfully setup rules to access from outside of my network a couple of security cameras to watch my dogs while i am work, my email server etc , plus i have vpn access. works very well. My only issue is i want dmz devices to be able to access and Use my Dns server that sits on the inside , but i have tried so many access list, rules etc and i continuously receive an error that states denied due to dns query. I also want DMZ devices to beable to access network printers (port 9100) that reside on the inside also but i have been unsucessful with this Of course the only way my dmz devices can access internal recourses is if i set the security level to 100 which i do not want to do . Vlan 3 labled dmz is my wireless segment . (as for now i have a second nic on my dns server that is on the 10.10.3.x network going to vlan 3 ) but that is just temp . I want Dmz computers to be able to access internal Dns and AD..etc..I also was wishing that the ASA could allow me to doa&amp;nbsp; sort of ip helper so my vlan 3 can pull ip addresses from my dhcp server on the dmz network, but for now i have dhcp running on a server for just the inside, and the dmz is pulling dhcp address for clients from the asa dhcp server..I just want the dmz devices to be able to access certain inside resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any assistance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxxxxx&lt;BR /&gt;domain-name xxxxxxxxxxxx.local&lt;BR /&gt;enable password xxxxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.10.10.9 foxclone&lt;BR /&gt;name 10.10.10.198 netprinter-01&lt;BR /&gt;name 10.10.10.14 file-serv&lt;BR /&gt;name 10.10.3.190 petcam&lt;BR /&gt;name 10.10.10.25 mail-serv&lt;BR /&gt;name 10.10.3.191 petcam2&lt;BR /&gt;name 10.10.10.254 namesrv0-1&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.10.3.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;banner exec Welcome To xxxxxxx&lt;BR /&gt;banner login Welcome To xxxxxxx&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server namesrv0-1&lt;BR /&gt; domain-name xxxxxxxxx.local&lt;BR /&gt;dns server-group vlan3_dns_server&lt;BR /&gt; name-server 10.10.3.254(temp)&lt;BR /&gt; domain-name dmz.liquidskynet.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.10.10.0 &lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt; description inside network segment&amp;nbsp; &lt;BR /&gt;object network obj-192.168.10.0 &lt;BR /&gt; subnet 192.168.10.0 255.255.255.192&lt;BR /&gt;object network mail-serv-smtp &lt;BR /&gt; host 10.10.10.25&lt;BR /&gt;object network mail-serv-https &lt;BR /&gt; host 10.10.10.25&lt;BR /&gt;object network foxclone &lt;BR /&gt; host 10.10.10.9&lt;BR /&gt;object network Inside_Outside_Dynamic_Pat &lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network Dmz_Outside_Dynamic_Pat &lt;BR /&gt; subnet 10.10.3.0 255.255.255.0&lt;BR /&gt;object network petcam2-http &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object network petcam-http &lt;BR /&gt; host 10.10.3.190&lt;BR /&gt;object network petcam2-winstream &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object network namesrv0-1 &lt;BR /&gt; host 10.10.10.254&lt;BR /&gt;object network file-serv &lt;BR /&gt; host 10.10.10.14&lt;BR /&gt;object network obj-10.10.3.0 &lt;BR /&gt; subnet 10.10.3.0 255.255.255.0&lt;BR /&gt; description dmz network segment&amp;nbsp; &lt;BR /&gt;object network Dmz_Inside_Dynamic_Pat &lt;BR /&gt; subnet 10.10.3.0 255.255.255.0&lt;BR /&gt;object network namesrv0-1(vlan3) &lt;BR /&gt; host 10.10.3.254&lt;BR /&gt;object network mail-serv &lt;BR /&gt; host 10.10.10.25&lt;BR /&gt;object network foxclone-rdp-dmz &lt;BR /&gt; host 10.10.10.9&lt;BR /&gt;object-group network obj_any&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list Tunnel-1_splitTunnelAcl standard permit 10.10.10.0 255.255.255.0 &lt;BR /&gt;access-list Tunnel-1_splitTunnelAcl standard permit 10.10.3.0 255.255.255.0 &lt;BR /&gt;access-list dmz_nat0_outbound extended permit ip 10.10.3.0 255.255.255.0 192.168.10.0 255.255.255.192 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.10.10.0 255.255.255.0 192.168.10.0 255.255.255.192 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam-http eq 8081 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object mail-serv-https eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any object mail-serv-smtp eq smtp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object foxclone eq 7000 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam2-http eq 8082 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam2-winstream eq 81 inactive &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;&lt;SPAN&gt;logging from-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:cisco.alerts@liquidskynet.com" target="_blank"&gt;cisco.alerts@liquidskynet.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;logging recipient-address &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:david.haman@liquidskynet.com" target="_blank"&gt;david.haman@liquidskynet.com&lt;/A&gt;&lt;SPAN&gt; level alerts&lt;/SPAN&gt;&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool Vpn-1_Pool 192.168.10.10-192.168.10.34 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;asdm location petcam 255.255.255.255 inside&lt;BR /&gt;asdm location file-serv 255.255.255.255 inside&lt;BR /&gt;asdm location petcam2 255.255.255.255 inside&lt;BR /&gt;asdm location 10.10.3.25 255.255.255.255 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static obj-10.10.10.0 obj-10.10.10.0 destination static obj-192.168.10.0 obj-192.168.10.0&lt;BR /&gt;nat (dmz,outside) source static obj-10.10.3.0 obj-10.10.3.0 destination static obj-192.168.10.0 obj-192.168.10.0&lt;BR /&gt;!&lt;BR /&gt;object network mail-serv-smtp&lt;BR /&gt; nat (inside,outside) static interface service tcp smtp smtp &lt;BR /&gt;object network mail-serv-https&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;object network foxclone&lt;BR /&gt; nat (inside,outside) static interface service tcp 7000 7000 &lt;BR /&gt;object network Inside_Outside_Dynamic_Pat&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Dmz_Outside_Dynamic_Pat&lt;BR /&gt; nat (dmz,outside) dynamic interface dns&lt;BR /&gt;object network petcam2-http&lt;BR /&gt; nat (dmz,outside) static interface service tcp 8082 8082 &lt;BR /&gt;object network petcam-http&lt;BR /&gt; nat (dmz,outside) static interface service tcp 8081 8081 &lt;BR /&gt;object network petcam2-winstream&lt;BR /&gt; nat (dmz,outside) static interface service tcp 81 81 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;nac-policy DfltGrpPolicy-nac-framework-create nac-framework&lt;BR /&gt; reval-period 36000&lt;BR /&gt; sq-period 300&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http 10.10.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns namesrv0-1 68.87.73.246 interface inside&lt;BR /&gt;dhcpd domain liquidskynet.local interface inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.3.10-10.10.3.30 dmz&lt;BR /&gt;dhcpd dns 10.10.3.254 68.87.73.246 interface dmz&lt;BR /&gt;dhcpd domain dmz.liquidskynet.local interface dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;tftp-server inside foxclone C:\TFTP-Root&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy Tunnel-1 internal&lt;BR /&gt;group-policy Tunnel-1 attributes&lt;BR /&gt; dns-server value 10.10.10.254 10.10.3.254&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Tunnel-1_splitTunnelAcl&lt;BR /&gt; default-domain value liquidskynet.local&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 10.10.10.254&lt;BR /&gt; ip-comp enable&lt;BR /&gt; re-xauth enable&lt;BR /&gt; pfs enable&lt;BR /&gt; nac-settings value DfltGrpPolicy-nac-framework-create&lt;BR /&gt; address-pools value Vpn-1_Pool&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username dhaman password xxxxxxxxxxxxxxxxxxxxx encrypted privilege 15&lt;BR /&gt;username dhaman attributes&lt;BR /&gt; vpn-group-policy Tunnel-1&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; password-storage disable&lt;BR /&gt; group-lock none&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; default-group-policy Tunnel-1&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key xxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;tunnel-group Tunnel-1 type remote-access&lt;BR /&gt;tunnel-group Tunnel-1 general-attributes&lt;BR /&gt; address-pool Vpn-1_Pool&lt;BR /&gt; default-group-policy Tunnel-1&lt;BR /&gt;tunnel-group Tunnel-1 ipsec-attributes&lt;BR /&gt; pre-shared-key xxxxxxxxxxxxxxxxx&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.10.10.25&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476345#M812370</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2019-03-11T18:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476346#M812371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems like you are missing access-list on the DMZ interface. Since DMZ interface is on lower security than the inside, you need exclusive rules to allow DMZ to inside communication.Please try adding an access-list rule allowing traffic from DMZ network to inside and see if that helps. Also, I do not see any NAT rules from inside to DMZ. You might need to add identity NAT to allow DMZ devices to access the inside servers. Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 23:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476346#M812371</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-06T23:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476347#M812372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you give an example, at first i did have a an access list for this but it did not seem to help.&lt;/P&gt;&lt;P&gt;I upgraded from an older version of asa to this 8.3 version and in the asdm it is a lot more granular than before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have tried such access list as&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit tcp any object namesrv0-1 eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still doesnt work &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 00:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476347#M812372</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T00:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476348#M812373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could use something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any host &lt;INSIDE server="" ip=""&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list you have seems incorrect as most commonly DNS uses UDP but your access-list is for TCP. Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 02:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476348#M812373</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T02:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476349#M812374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your assistance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i ran the following command&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in permit ip any host 10.10.10.254 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still have been receiving the following error when ever i try to have a dmz host use the Dns server in the inside ..im at a loss here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the error i receive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny inbound UDP from 10.10.3.11/62073 to 10.10.10.254/53 due to DNS Query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 04:00:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476349#M812374</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T04:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476350#M812375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you already added the NAT rule from inside to DMZ? Can you try using the packet-tracer and see at what point the firewall is blocking the access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz udp &lt;IP of="" the="" dmz="" client=""&gt; 1024 &lt;IP of="" the="" inside="" server=""&gt; 53 detailed&lt;/IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tell us the exact place where the packets are getting blocked. Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 04:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476350#M812375</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T04:32:46Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476351#M812376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a ststic nat rule from source inside (inside network 10.10.10.0/24) to destination dmz&lt;/P&gt;&lt;P&gt;(dmz network 10.10.3.0/24) im not undestanding why i would need this though since my indside can already see&lt;/P&gt;&lt;P&gt;everything behind the dmz , its that the dmz cant see speccific services like dns behind the inside. o&lt;/P&gt;&lt;P&gt;r maybe i have it backwards?&lt;/P&gt;&lt;P&gt;i have added&amp;nbsp; the staic nat as you suggested inside to dmz, and created an access rule to allow inbound to my dns server but udp/53 is still being dropped&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 11:44:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476351#M812376</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T11:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476352#M812377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the output of the packet tracer here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz udp &lt;IP of="" the="" dmz="" client=""&gt; 1024 &lt;IP of="" the="" inside="" server=""&gt; 53 detailed&lt;/IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 12:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476352#M812377</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T12:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476353#M812378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the results of&lt;/P&gt;&lt;P&gt;packet-tracer input dmz udp 10.10.3.191 1024 10.10.10.254 53 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcac10428, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=8287, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcac10c48, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=236, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 13:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476353#M812378</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T13:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476354#M812379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems like the access-list is not applied to the interface. The traffic is getting dropped due to implicit rule. Can you please apply the ACL to the interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group &lt;ACL name=""&gt; in interface DMZ&lt;/ACL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 15:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476354#M812379</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T15:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476355#M812380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After running these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list dmz_access_in permit ip any host 10.10.10.254&lt;BR /&gt;access-group dmz_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i receive the following error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;petcam2&amp;nbsp;&amp;nbsp;&amp;nbsp; 1132&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.14.204.103&amp;nbsp;&amp;nbsp;&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; Deny tcp src dmz:petcam2/1132 dst outside:72.14.204.103/80 by access-group "dmz_access_in" [0x0, 0x0]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 15:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476355#M812380</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T15:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476356#M812381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a screenshot of my asdm setups , acl, access rules and Nat, maybe this could help clear up my issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 15:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476356#M812381</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T15:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476357#M812382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you add the following lines to the access-list? Also, when you had that access-list, I am assuming you were able to get to the DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any host 10.10.10.254&lt;/P&gt;&lt;P&gt;access-list dmz_access_in deny ip any 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 17:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476357#M812382</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T17:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476358#M812385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the access list that you suggested but i still receive this error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNSDeny inbound UDP from petcam2/64204 to 10.10.10.254/53 due to DNS Query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 17:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476358#M812385</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T17:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476359#M812386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, I think the issue could be due to a bug in Cisco code. But before we go there, can you post the latest "show run" output (with the DMZ access-lists) and also the packet-tracer output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz udp 10.10.3.191 1024 10.10.10.254 53 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 19:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476359#M812386</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T19:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476360#M812388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;: Saved&lt;BR /&gt;: Written by dhaman at 15:57:32.736 EDT Wed Jul 7 2010&lt;BR /&gt;!&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname brickzone&lt;BR /&gt;domain-name liquidskynet.local&lt;BR /&gt;enable password XXXXXXXX encrypted&lt;BR /&gt;passwd XXXXXXXXXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.10.10.9 foxclone&lt;BR /&gt;name 10.10.10.198 netprinter-01&lt;BR /&gt;name 10.10.10.14 file-serv&lt;BR /&gt;name 10.10.3.190 petcam&lt;BR /&gt;name 10.10.10.25 mail-serv&lt;BR /&gt;name 10.10.3.191 petcam2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.10.3.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name liquidskynet.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.10.10.0 &lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.10.0 &lt;BR /&gt; subnet 192.168.10.0 255.255.255.192&lt;BR /&gt;object network mail-serv-smtp &lt;BR /&gt; host 10.10.10.25&lt;BR /&gt;object network mail-serv-https &lt;BR /&gt; host 10.10.10.25&lt;BR /&gt;object network foxclone &lt;BR /&gt; host 10.10.10.9&lt;BR /&gt;object network Inside_Outside_Dynamic_Pat &lt;BR /&gt; subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;object network Dmz_Outside_Dynamic_Pat &lt;BR /&gt; subnet 10.10.3.0 255.255.255.0&lt;BR /&gt;object network petcam2-http &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object network petcam-http &lt;BR /&gt; host 10.10.3.190&lt;BR /&gt;object network petcam2-winstream &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object network backup-serv &lt;BR /&gt; host 10.10.3.11&lt;BR /&gt;object network obj-10.10.3.0 &lt;BR /&gt; subnet 10.10.3.0 255.255.255.0&lt;BR /&gt;object network namesrv0-1 &lt;BR /&gt; host 10.10.10.254&lt;BR /&gt; description AD,DNS,DHCP(Inside) &lt;BR /&gt;object network petcam-todns-to-inside &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object network petcam2-inside-dns &lt;BR /&gt; host 10.10.3.191&lt;BR /&gt;object-group network obj_any&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list dmz_access_in extended permit ip any host 10.10.10.254 &lt;BR /&gt;access-list dmz_access_in extended deny ip any 10.10.10.0 255.255.255.0 &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list Tunnel-1_splitTunnelAcl standard permit 10.10.10.0 255.255.255.0 &lt;BR /&gt;access-list Tunnel-1_splitTunnelAcl standard permit 10.10.3.0 255.255.255.0 &lt;BR /&gt;access-list dmz_nat0_outbound extended permit ip 10.10.3.0 255.255.255.0 192.168.10.0 255.255.255.192 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.10.10.0 255.255.255.0 192.168.10.0 255.255.255.192 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam-http eq 8081 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object mail-serv-smtp eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any object mail-serv-smtp eq smtp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object foxclone eq 7000 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam2-http eq 8082 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object petcam2-winstream eq 81 inactive &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool Vpn-1_Pool 192.168.10.10-192.168.10.34 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;asdm location petcam 255.255.255.255 inside&lt;BR /&gt;asdm location file-serv 255.255.255.255 inside&lt;BR /&gt;asdm location mail-serv 255.255.255.255 inside&lt;BR /&gt;asdm location petcam2 255.255.255.255 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,any) source static obj-10.10.10.0 obj-10.10.10.0 destination static obj-192.168.10.0 obj-192.168.10.0&lt;BR /&gt;nat (dmz,outside) source static obj-10.10.3.0 obj-10.10.3.0 destination static obj-192.168.10.0 obj-192.168.10.0&lt;BR /&gt;!&lt;BR /&gt;object network mail-serv-smtp&lt;BR /&gt; nat (inside,outside) static interface service tcp smtp smtp &lt;BR /&gt;object network mail-serv-https&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;object network foxclone&lt;BR /&gt; nat (inside,outside) static interface service tcp 7000 7000 &lt;BR /&gt;object network Inside_Outside_Dynamic_Pat&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network Dmz_Outside_Dynamic_Pat&lt;BR /&gt; nat (dmz,outside) dynamic interface&lt;BR /&gt;object network petcam2-http&lt;BR /&gt; nat (dmz,outside) static interface service tcp 8082 8082 &lt;BR /&gt;object network petcam-http&lt;BR /&gt; nat (dmz,outside) static interface service tcp 8081 8081 &lt;BR /&gt;object network petcam2-winstream&lt;BR /&gt; nat (dmz,outside) static interface service tcp 81 81 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;nac-policy DfltGrpPolicy-nac-framework-create nac-framework&lt;BR /&gt; reval-period 36000&lt;BR /&gt; sq-period 300&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http 10.10.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 10.10.10.254 interface inside&lt;BR /&gt;dhcpd domain liquidskynet.local interface inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.3.10-10.10.3.30 dmz&lt;BR /&gt;dhcpd dns 68.87.71.230 68.87.73.246 interface dmz&lt;BR /&gt;dhcpd domain dmz.liquidskynet.local interface dmz&lt;BR /&gt;dhcpd enable dmz&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy Tunnel-1 internal&lt;BR /&gt;group-policy Tunnel-1 attributes&lt;BR /&gt; dns-server value 10.10.10.254&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Tunnel-1_splitTunnelAcl&lt;BR /&gt; default-domain value liquidskynet.local&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 10.10.10.254&lt;BR /&gt; ip-comp enable&lt;BR /&gt; re-xauth enable&lt;BR /&gt; pfs enable&lt;BR /&gt; nac-settings value DfltGrpPolicy-nac-framework-create&lt;BR /&gt; address-pools value Vpn-1_Pool&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username dhaman password XXXXXXXXXXXXXXXXXXXXXXXX encrypted privilege 15&lt;BR /&gt;username dhaman attributes&lt;BR /&gt; vpn-group-policy Tunnel-1&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; password-storage disable&lt;BR /&gt; group-lock none&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; default-group-policy Tunnel-1&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key XXXXXXXXXXXXX&lt;BR /&gt;tunnel-group Tunnel-1 type remote-access&lt;BR /&gt;tunnel-group Tunnel-1 general-attributes&lt;BR /&gt; address-pool Vpn-1_Pool&lt;BR /&gt; default-group-policy Tunnel-1&lt;BR /&gt;tunnel-group Tunnel-1 ipsec-attributes&lt;BR /&gt; pre-shared-keyXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum XXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the Trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcac10428, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=16767, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.10.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcac10c48, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=464, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=dmz, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 20:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476360#M812388</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T20:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476361#M812390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see the DMZ access-list applied to the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the identity NAT between inside and DMZ is missing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network namesrv0-1 &lt;BR /&gt; host 10.10.10.254&lt;BR /&gt; description AD,DNS,DHCP(Inside)&lt;/P&gt;&lt;P&gt;nat (inside,dmz) static 10.10.10.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please enter these commands and then run the packet tracer again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmz udp 10.10.3.191 1024 10.10.10.254 53 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully that should tell us where it is getting blocked. Current output indicates that there is not access-list on the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 20:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476361#M812390</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T20:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476362#M812392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;after i added&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any host 10.10.10.254&lt;/P&gt;&lt;P&gt;access-list dmz_access_in deny ip any 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was forgetting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source static namesrv0-1 namesrv0-1 destination static namesrv0-1 namesrv0-1&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My dmz devices can now use my dns server that sits on the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so very&amp;nbsp; much for your assistance with helping me I really appreciate it, now i have a much better understanding of this&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 20:43:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476362#M812392</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T20:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476363#M812394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice to know that things are working now. Glad that we could help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Do not forget to rate the useful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 21:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476363#M812394</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-07T21:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with giving devices behind DMZ access to Lan Resou</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476364#M812396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One last question&amp;nbsp; could you explain how these&amp;nbsp; are allowing dmz devices the ability to use the dns server on the inside, is there anyway that i could get more granular with a rule that allows the dmz network (10.10.3.0/24) to use udp 53 located on 10.10.10.254 (dns server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in permit ip any host 10.10.10.254&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; dmz_access_in deny ip any 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; dmz_access_in permit ip any any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (this seems like it would not be safe ) but if i disable then the dmz devices can not use 10.10.10.254 to resolve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source static&amp;nbsp; namesrv0-1 namesrv0-1 destination static namesrv0-1 namesrv0-1&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp; dmz_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Jul 2010 22:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-giving-devices-behind-dmz-access-to-lan-resources/m-p/1476364#M812396</guid>
      <dc:creator>David Haman</dc:creator>
      <dc:date>2010-07-07T22:07:05Z</dc:date>
    </item>
  </channel>
</rss>

