<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to allow SMTP on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008910#M918795</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ajay, you just need to permit it in the outside &amp;gt;&amp;gt; dmz direction. The remaining (dmz&amp;gt;&amp;gt;outside) return traffic will automatically be permitted due to the 'stateful' nature of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as your DMZ server has higher security level than outside, it will also be able to 'send' outbound email (provided proper NAT rules are there).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jun 2008 14:31:08 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2008-06-06T14:31:08Z</dc:date>
    <item>
      <title>Need to allow SMTP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008909#M918793</link>
      <description>&lt;P&gt;Hi I want to give SMTP acccess to one of the machine in DMZ zone .I am going to allow DMZ access-list IN for port 25 .do i need to allow return traffic in ASA .or editing access list IN in DMZ and patting will allow me to access SMTP on internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please explain thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008909#M918793</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2019-03-11T12:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Need to allow SMTP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008910#M918795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ajay, you just need to permit it in the outside &amp;gt;&amp;gt; dmz direction. The remaining (dmz&amp;gt;&amp;gt;outside) return traffic will automatically be permitted due to the 'stateful' nature of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as your DMZ server has higher security level than outside, it will also be able to 'send' outbound email (provided proper NAT rules are there).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806745b8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 14:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008910#M918795</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-06T14:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need to allow SMTP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008911#M918797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Farrukh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply but mail server is not sitting in DMZ zone .....this is application server sitting in DMZ on which i need to just configure sending mail to outside .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will not be a static natting I will pat it with same IP as i do for Inside hosts .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case traffic from DMZ &amp;gt;&amp;gt;&amp;gt;Outside on port 25 will be allowed but what about return traffic .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will it allow by default or i need to add any inspect rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please explain &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 14:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008911#M918797</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2008-06-06T14:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Need to allow SMTP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008912#M918799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes 'return' traffic will be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No need to worry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 14:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008912#M918799</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-06T14:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need to allow SMTP on ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008913#M918801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ajay,&lt;/P&gt;&lt;P&gt;  If you dont have an ACL applied to DMZ atm, you dont need to specifically permit a traffic originated from a higher security level interface destined to a lower security interface. &lt;/P&gt;&lt;P&gt;  Firewall is a statefull device and will permit return traffic by default. you dont need extra ACLs.&lt;/P&gt;&lt;P&gt;  If you have an ACL applied to dmz for other(filtering purpoeses) you should specifically enter permit for smtp outbound, since the ACL has an implicit deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2008 14:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-allow-smtp-on-asa/m-p/1008913#M918801</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-06T14:42:37Z</dc:date>
    </item>
  </channel>
</rss>

