<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accessing outside server from DMZ Network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-outside-server-from-dmz-network/m-p/1299392#M858385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit ip 192.168.100.0 255.255.255.0 192.168.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 26 Jul 2009 12:02:50 GMT</pubDate>
    <dc:creator>Roman Rodichev</dc:creator>
    <dc:date>2009-07-26T12:02:50Z</dc:date>
    <item>
      <title>Accessing outside server from DMZ Network</title>
      <link>https://community.cisco.com/t5/network-security/accessing-outside-server-from-dmz-network/m-p/1299391#M858383</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Kindly guide me, my secnario is this there is one outside WEB server which have ip 192.168.11.28. from inside network i am able to access the webserver without any problem. but from DMZ i am not able to access that  webserver only i can ping it from DMZ.kindly look my configuration and guide me anything wrong is my configuration.Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**************&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.10.10.2 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.210 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.204 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.38 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny tcp host 192.168.22.38 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.100.215 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.100.215 eq 7777 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.100.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list traffic_for_ips extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_all extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit ip 192.168.100.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Inside&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface failovetr-int GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover interface ip failovetr-int 10.250.250.1 255.255.255.252 standby 10.250.250.2&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-61551.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list nonatDMZ&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_all in interface Inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_all in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-outside-server-from-dmz-network/m-p/1299391#M858383</guid>
      <dc:creator>aamirkiani</dc:creator>
      <dc:date>2019-03-11T15:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing outside server from DMZ Network</title>
      <link>https://community.cisco.com/t5/network-security/accessing-outside-server-from-dmz-network/m-p/1299392#M858385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit ip 192.168.100.0 255.255.255.0 192.168.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Roman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Jul 2009 12:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-outside-server-from-dmz-network/m-p/1299392#M858385</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2009-07-26T12:02:50Z</dc:date>
    </item>
  </channel>
</rss>

