<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN connections to DMZ resources in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157107#M876038</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, hopefully someone else can chime in here..it shouldn't be doing that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Feb 2009 19:33:32 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2009-02-20T19:33:32Z</dc:date>
    <item>
      <title>VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157093#M876019</link>
      <description>&lt;P&gt;I have an ASA 5510 that has a DMZ configured on it (192.168.0.0/24).  The DMZ works fine except VPN users cannot hit any of the websites that run in the DMZ.  My DMZ users connect through the Outside interface and are assigned a DHCP address from the pool (192.168.211.1-192.168.211.254).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have the following ACE in my access-list attached to the outside interface to allow traffic from the VPN subnet to the DMZ interface since it is a higher security level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside line 1 extended permit ip 192.168.211.0 255.255.255.0 192.168.0.0 255.255.255.0 (hitcnt=300)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I connect to VPN and try to hit a website in the DMZ I see the hitcount increment but I still get nothing.  What am I missing?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157093#M876019</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2019-03-11T14:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157094#M876021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good morning:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to include your DMZ addressing in the traffic to encrypt in VPN configuration. This if you have the split-tunneling feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cordially.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 15:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157094#M876021</guid>
      <dc:creator>colonha27</dc:creator>
      <dc:date>2009-02-20T15:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157095#M876022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Missing nat exemption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmznat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.211.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list dmznat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 15:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157095#M876022</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T15:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157096#M876023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That worked!  Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide a quick 'dummies' explanation of why I needed that?  Also, do I need the ACE entry I listed in my first post?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 16:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157096#M876023</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T16:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157097#M876024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It wouldn't need to be there if you were hitting the webserver on a public ip address that was nat'd in the firewall, but since you are hitting the private dmz address, you need to exclude the traffic from nat. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You most likely do not need that access list entry because ipsec vpn traffic typically bypasses these acl's. To make sure, see if you have 'sysopt connection permit-ipsec or sysopt connection permit-vpn' in your configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 16:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157097#M876024</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T16:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157098#M876025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I spoke too soon.  While that did allow my VPN users to get to websites in the DMZ it killed their access to resources on the LAN.  After I connected to the VPN I opened NSLOOKUP and it was unable to resolve to the internal DNS servers I have specified.  It was pushing everything out the split tunnel using the DNS server of the ISP for the Internet connection.  That was why they were able to get to the DMZ websites, they were using the split-tunneling and surfing through the ISP instead of hitting the DMZ directly through the VPN tunnel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:04:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157098#M876025</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T19:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157099#M876026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a question in there? If you post the config I'm sure we can clear it up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157099#M876026</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T19:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157100#M876027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, config is attached.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157100#M876027</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T19:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157101#M876028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What's not working with that config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157101#M876028</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T19:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157102#M876029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My VPN users cannot access and websites that are running in the DMZ1.  They can access resources that are on the INSIDE.  They need to be able to do both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157102#M876029</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T19:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157103#M876030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should still fix your problem and should not break the access to the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmznat0 extended permit ip 192.168.0.0 255.255.255.0 192.168.211.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;nat (DMZ1) 0 access-list dmznat0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:21:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157103#M876030</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T19:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157104#M876032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As soon as I do that my VPN users lose the ability to access resources on the INSIDE.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157104#M876032</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T19:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157105#M876036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And you're doing "nat (DMZ1) access-list natdmz0" right? NOT "nat (inside) access-list natdmz0"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise that doesn't make sense why it's doing that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157105#M876036</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T19:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157106#M876037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, after I did that my SH RUN NAT looked like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 0 access-list dmznat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I discovered the issue with not being able to hit inside resources I removed the NAT statement but it did fix the issue.  I had to restart the ASA to clear it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157106#M876037</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-02-20T19:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157107#M876038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, hopefully someone else can chime in here..it shouldn't be doing that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2009 19:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157107#M876038</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2009-02-20T19:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connections to DMZ resources</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157108#M876039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to close this case...I opened a TAC case and they stated that I needed to put in the same DMZNAT0 statement that you recommended.  I told them about the issue it caused and it baffled them.  So I went ahead and re-added the statements into the config during off hours and it worked fine.  I don't know what happened the first time that caused the problems but it is working now.  Thank you for the help.  For clarification this is what I ended up adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZNAT0 extended permit ip 192.168.0.0 255.255.255.0 192.168.211.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (DMZ1) 0 access-list DMZNAT0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Mar 2009 14:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connections-to-dmz-resources/m-p/1157108#M876039</guid>
      <dc:creator>qbakies11</dc:creator>
      <dc:date>2009-03-04T14:22:13Z</dc:date>
    </item>
  </channel>
</rss>

