<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic shifting the servers from inside to DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262260#M858562</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;i have to make DMZ in my network already my servers are working in inside network, but now i have to shift these server to DMZ,&lt;/P&gt;&lt;P&gt;kindly look at my configuration and guide me with configuration how i can achieve this goal. Thanks&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 10.10.10.2 255.255.255.252 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1 &lt;/P&gt;&lt;P&gt;nameif Inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2 &lt;/P&gt;&lt;P&gt;nameif DMZ &lt;/P&gt;&lt;P&gt;security-level 50 &lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3 &lt;/P&gt;&lt;P&gt;description LAN Failover Interface &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;nameif management &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.210 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.204 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.38 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny tcp host 192.168.22.38 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.100.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list traffic_for_ips extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_all extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit icmp any any &lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list nonatDMZ &lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_all in interface Inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_all in interface DMZ &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1  &lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;&lt;P&gt;ASA# &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:56:51 GMT</pubDate>
    <dc:creator>aamirkiani</dc:creator>
    <dc:date>2019-03-11T15:56:51Z</dc:date>
    <item>
      <title>shifting the servers from inside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262260#M858562</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;i have to make DMZ in my network already my servers are working in inside network, but now i have to shift these server to DMZ,&lt;/P&gt;&lt;P&gt;kindly look at my configuration and guide me with configuration how i can achieve this goal. Thanks&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4) &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 10.10.10.2 255.255.255.252 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1 &lt;/P&gt;&lt;P&gt;nameif Inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2 &lt;/P&gt;&lt;P&gt;nameif DMZ &lt;/P&gt;&lt;P&gt;security-level 50 &lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3 &lt;/P&gt;&lt;P&gt;description LAN Failover Interface &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;nameif management &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.210 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.204 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.38 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp 192.168.22.0 255.255.255.0 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny tcp host 192.168.22.38 host 192.168.0.201 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.201 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 8080 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 192.168.22.100 host 192.168.0.204 eq 7777 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.255.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 10.10.10.0 255.255.255.252 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp 192.168.22.0 255.255.255.0 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.100.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list traffic_for_ips extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_all extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit icmp any any &lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list nonatDMZ &lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_all in interface Inside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_all in interface DMZ &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.1 1  &lt;/P&gt;&lt;P&gt;: end &lt;/P&gt;&lt;P&gt;ASA# &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262260#M858562</guid>
      <dc:creator>aamirkiani</dc:creator>
      <dc:date>2019-03-11T15:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: shifting the servers from inside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262261#M858564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; With this conf you wll not be able to access your servers from outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2009 12:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262261#M858564</guid>
      <dc:creator>Jithesh K Joy</dc:creator>
      <dc:date>2009-07-21T12:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: shifting the servers from inside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262262#M858565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the following lines are confusing:- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.100.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list traffic_for_ips extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_all extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_all extended permit icmp any any&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list nonatDMZ&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me what are you planning to use this lines for???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to have your inside n/w access DMZ just enter below commands and it will work you dont need any other thing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0 extended permit ip any 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 0 access-list inside_nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thts it this will server ur purpose and you will be able to access DMZ frm Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and to access DMZ frm Outside you need to create Static\Dynamic Natting as required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hussain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jul 2009 13:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/shifting-the-servers-from-inside-to-dmz/m-p/1262262#M858565</guid>
      <dc:creator>hussain.ratlami</dc:creator>
      <dc:date>2009-07-21T13:21:29Z</dc:date>
    </item>
  </channel>
</rss>

