<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 basic lic-DMZ to outside access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258542#M857924</link>
    <description>&lt;P&gt;I have a new 5505 with basic license, and I setup DMZ as security 50, inside to out side no issues.&lt;/P&gt;&lt;P&gt;restricted access from DMZ to inside (that satisfy the license limitation), but I should be able to access internet(outside) from DMZ am I corrct.But I can't.&lt;/P&gt;&lt;P&gt;I dont have ACLs and I have &lt;/P&gt;&lt;P&gt;global (outside) 1 with interface &lt;/P&gt;&lt;P&gt;nat (DMZ) 1 with "DMZ subnet"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding is of the asa and pix is, this should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I doing any thing wrong here, pls advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:21:52 GMT</pubDate>
    <dc:creator>asoka</dc:creator>
    <dc:date>2019-03-11T16:21:52Z</dc:date>
    <item>
      <title>ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258542#M857924</link>
      <description>&lt;P&gt;I have a new 5505 with basic license, and I setup DMZ as security 50, inside to out side no issues.&lt;/P&gt;&lt;P&gt;restricted access from DMZ to inside (that satisfy the license limitation), but I should be able to access internet(outside) from DMZ am I corrct.But I can't.&lt;/P&gt;&lt;P&gt;I dont have ACLs and I have &lt;/P&gt;&lt;P&gt;global (outside) 1 with interface &lt;/P&gt;&lt;P&gt;nat (DMZ) 1 with "DMZ subnet"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding is of the asa and pix is, this should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I doing any thing wrong here, pls advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258542#M857924</guid>
      <dc:creator>asoka</dc:creator>
      <dc:date>2019-03-11T16:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258543#M857926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it must be the ACL, how you are restricting access from DMZ to inside. there must be a acl for the dmz interface to restrict traffic if i am not wrong allow traffic there towards internet and you will be all set to go.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 12:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258543#M857926</guid>
      <dc:creator>indra</dc:creator>
      <dc:date>2009-10-01T12:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258544#M857928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;I&gt;Only three active VLANs can be configured with the Base license, and up to 20 active VLANs with the Security Plus license. You can create a third VLAN with the Base license, but this VLAN only has communication either to the outside or to the inside but not in both directions. If you need to have the communication in both directions, then you need to upgrade the license. Also, if you use the Base license, allow this interface to be the third VLAN and limit it from initiating contact to one other VLAN with the hostname(config-if)# no forward interface vlan number command. Thus the third VLAN can be configured.&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#ThirdVLAN" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#ThirdVLAN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 12:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258544#M857928</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-01T12:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258545#M857930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for quick post, I read all about it, but I dont know if &lt;/P&gt;&lt;P&gt;no forward interface vlan command &lt;/P&gt;&lt;P&gt;prevent forwarding packet to outside interface, my restricted interface would be from DMZ to inside.&lt;/P&gt;&lt;P&gt;Cos I dont have ACL configured, I would assume traffice should allow from DMZ to outside, is it so&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 13:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258545#M857930</guid>
      <dc:creator>asoka</dc:creator>
      <dc:date>2009-10-01T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258546#M857932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your config and a show version?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 14:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258546#M857932</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-01T14:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258547#M857934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you have this configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan3&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the DMZ to have Internet, but no access to inside, then you configure it this way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan3&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;no forward interface vlan1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It wasn't clear if that's what you did or not...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Oct 2009 22:41:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258547#M857934</guid>
      <dc:creator>cmcbride</dc:creator>
      <dc:date>2009-10-01T22:41:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258548#M857937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for th epost, this is the config&lt;/P&gt;&lt;P&gt;I am not sure it need a ACL to allow traffic out of DMZ to outside when u have "no forward interface vlan1" command, interesting though I can see the DNS resolution in the browser bottom bar when I try to go to a web site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1xx.1xx.213.142 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name tagitmobile.com&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1xx.15xx.213.129 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.36 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.3.10-192.168.3.31 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns 203.116.1.78 203.116.1.94 interface dmz&lt;/P&gt;&lt;P&gt;dhcpd domain tagitmobile.com interface dmz&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Oct 2009 03:01:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258548#M857937</guid>
      <dc:creator>asoka</dc:creator>
      <dc:date>2009-10-02T03:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258549#M857940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You do need an ACL on the DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access extended permit tcp any any eq 80&lt;/P&gt;&lt;P&gt;access-list dmz_access extended permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;access-list dmz_access extended permit udp any any eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group dmz_access in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding this, try surfing the internet, and check the logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Oct 2009 12:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258549#M857940</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-02T12:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258550#M857941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you're missing a global statement for the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the log show??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Oct 2009 19:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258550#M857941</guid>
      <dc:creator>jdlampard</dc:creator>
      <dc:date>2009-10-08T19:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 basic lic-DMZ to outside access</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258551#M857942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Thanks for reply, this customer installed a interim solution until they receive security plus license, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, the single global statement is enough for both inside and dmz isn't it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I get a chance to test this asa I will update the entry here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Oct 2009 02:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-basic-lic-dmz-to-outside-access/m-p/1258551#M857942</guid>
      <dc:creator>asoka</dc:creator>
      <dc:date>2009-10-09T02:35:42Z</dc:date>
    </item>
  </channel>
</rss>

