<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: the illusive inside to dmz nat issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929212#M938705</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to add a rule for http. Can you hit the webserver from another machine on the dmz?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Apr 2008 19:44:37 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2008-04-25T19:44:37Z</dc:date>
    <item>
      <title>the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929197#M938690</link>
      <description>&lt;P&gt;I am setting up my dmz area on my new 5520 and have the outside to dmz nat for a webserver working properly. However Im having trouble understanding what needs to be done for reaching that webserver on the inside. Reading of inside to dmz nat, identity nat, etc. below is partial config.... Im trying to access the 10.2.253.16 web server in dmz from inside thanks any advice is appreciated thanks &lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname cdpasa1 &lt;/P&gt;&lt;P&gt;domain-name xx.com &lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;name 10.249.48.0 Hgnwhse description Hgnwhse &lt;/P&gt;&lt;P&gt;dns-guard &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 74.x.x.2 255.255.255.224 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 10.2.30.13 255.255.192.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2 &lt;/P&gt;&lt;P&gt;nameif DMZ &lt;/P&gt;&lt;P&gt;security-level 50 &lt;/P&gt;&lt;P&gt;ip address 10.2.253.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;nameif management &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.1.3 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;boot system disk0:/asa803-k8.bin &lt;/P&gt;&lt;P&gt;ftp mode passive &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS &lt;/P&gt;&lt;P&gt;domain-name cecodoor.com &lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP &lt;/P&gt;&lt;P&gt;protocol-object udp &lt;/P&gt;&lt;P&gt;protocol-object tcp &lt;/P&gt;&lt;P&gt;access-list cecovpn_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list cecovpn_splitTunnelAcl standard permit 172.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Hgnwhse 255.255.255.0 10.2.0.0 255.255.192.0 &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip any Hgnwhse 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.13 eq www &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.13 eq https &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.14 eq www &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit esp any any &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit udp any any eq isakmp &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any host 74.x.x.13 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any host 74.x.x.16 &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.16 eq www &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.16 eq https &lt;/P&gt;&lt;P&gt;access-list outside_in extended deny ip any any log &lt;/P&gt;&lt;P&gt;access-list inside_nat0 extended permit ip any 10.2.253.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0 extended permit ip any 10.2.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging enable &lt;/P&gt;&lt;P&gt;logging buffer-size 20000 &lt;/P&gt;&lt;P&gt;logging monitor informational &lt;/P&gt;&lt;P&gt;logging buffered informational &lt;/P&gt;&lt;P&gt;logging asdm informational &lt;/P&gt;&lt;P&gt;logging from-address &lt;A href="mailto:asa5520@cecodoor.com" target="_blank"&gt;asa5520@cecodoor.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;logging recipient-address &lt;A href="mailto:chays@cecodoor.com" target="_blank"&gt;chays@cecodoor.com&lt;/A&gt; level errors &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu management 1500 &lt;/P&gt;&lt;P&gt;mtu DMZ 1500 &lt;/P&gt;&lt;P&gt;ip local pool cdppool 10.2.23.50-10.2.23.100 mask 255.255.255.192 &lt;/P&gt;&lt;P&gt;no failover &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;/P&gt;&lt;P&gt;icmp permit host 10.249.48.1 outside &lt;/P&gt;&lt;P&gt;icmp permit any outside &lt;/P&gt;&lt;P&gt;icmp permit any inside &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-611.bin &lt;/P&gt;&lt;P&gt;no asdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 101 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;static (inside,outside) 74.x.x.13 10.2.18.13 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.2.20.0 10.2.20.0 netmask 255.255.254.0 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) 74.x.x.16 10.2.253.16 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:36:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929197#M938690</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2019-03-11T12:36:44Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929198#M938691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This statement is all you need as long as the inside client is part of 10.2.20.0 255.255.254.0. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.2.20.0 10.2.20.0 netmask 255.255.254.0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 12:51:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929198#M938691</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-25T12:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929199#M938692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have that statement in there already, see bottom of post.    I do have the dmz in vlan 50 and the inside network on vlan 33 if that makes any difference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929199#M938692</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T13:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929200#M938693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know you had that statement, but I was making sure the client you are coming from is part of 10.2.20.0 255.255.254.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How are you testing connectivity, ping, &lt;A class="jive-link-custom" href="http://10.2.253.16" target="_blank"&gt;http://10.2.253.16&lt;/A&gt; ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929200#M938693</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-25T13:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929201#M938694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;oh, sorry, thought you may have missed it.  I am trying from a pc with 10.2.20.219 ip, so it should be able.  I cant ping or access from IE.   With the  identity nat, I shouldnt have to add acl's, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929201#M938694</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T13:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929202#M938695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For ping you would need to allow the reply in the dmz interface, but no acl needed for ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you pinging 10.2.253.16 or a hostname?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929202#M938695</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-25T13:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929203#M938696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i am pinging 10.2.253.16, I figured I should get that working before adding a dns entry.  When I do a tracert from 10.2.20.219 it hits my stack (also routing) and then times out.  both vlans are on this stack so the routes for 20.x and 253.x are directly connected.  stack = 10.2.0.2 with 255.255.192.0 mask   tracert hits 0.2 on 1st hop, then dies &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 13:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929203#M938696</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T13:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929204#M938697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Instead of &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;Use the following :&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 18:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929204#M938697</guid>
      <dc:creator>rkalia1</dc:creator>
      <dc:date>2008-04-25T18:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929205#M938698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yea I thought that would work to, but it didnt. thanks for the try though&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929205#M938698</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T19:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929206#M938699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you allowed icmp into the dmz interface yet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list dmz extended deny ip any 10.2.20.0 255.255.254.0&lt;/P&gt;&lt;P&gt;access-list dmz extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz in interface DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929206#M938699</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-25T19:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929207#M938700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, delete all nat exemption rule because by default security level number of inside network is high(100) and it will access DMZ and outside network without making any rule. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929207#M938700</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-04-25T19:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929208#M938701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Hgnwhse 255.255.255.0 10.2.0.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have given wrong ip 10.2.23.0 instead of right one 10.2.253.0 check and confirm Thanks Vinay Gupta.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929208#M938701</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-04-25T19:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929209#M938702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually added these earlier and was able to ping 10.2.253.16 and then added and acl to permit http, but was never able to access the web page on that server,  I have since removed and tried other solutions (this is the only one that I received a successful ping on)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929209#M938702</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T19:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929210#M938703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this access list was created by ra vpn wizard when creating my remote access vpn in which the pool addresses are 10.2.23.50-100, so I cant change these or it will break my vpn users&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:41:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929210#M938703</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-25T19:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929211#M938704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok. are you able to telnet from inside machine to web server machine port? Check and confirm. Thanks Vinay Gupta.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:43:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929211#M938704</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-04-25T19:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929212#M938705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to add a rule for http. Can you hit the webserver from another machine on the dmz?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 19:44:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929212#M938705</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-25T19:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929213#M938706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can try switching off "nat-control" by "no nat-control" and then you dont need to use identity nat command for going from inside to DMZ.  Since you already have one nat 0 command for VPN users so this workaround may work for you.  "nat-control" is ON by default in ASAs now.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Apr 2008 23:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929213#M938706</guid>
      <dc:creator>rkalia1</dc:creator>
      <dc:date>2008-04-25T23:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929214#M938707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im still battling this.   I can ping webserver in dmz from inside, but cant access website from inside to dmz.  I can ping my devices on inside from webserver on dmz.   Here is my current running config... any other ideas.........Ive made a few changes from original posted config  thanks again  &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 74.x.x.2 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.2.30.13 255.255.192.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.2.253.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd BWaQlcykry5AAxTH encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa803-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name cecodoor.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list cecovpn_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list cecovpn_splitTunnelAcl standard permit 172.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.0.0.0 255.0.0.0 10.2.23.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.2.253.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip Hgnwhse 255.255.255.0 10.2.0.0 255.255.192.0&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip any Hgnwhse 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp 10.2.253.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.13 eq www&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.13 eq https&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.14 eq www&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit esp any any&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any host 74.x.x.13&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit icmp any host 74.x.x.16&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.16 eq www&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 74.x.x.16 eq https&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool cdppool 10.2.23.50-10.2.23.100 mask 255.255.255.192&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host 10.249.48.1 outside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-611.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 10.2.253.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 74.x.x.13 10.2.18.13 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 74.x.x.16 10.2.253.16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.2.253.16 10.2.253.16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 74.x.x.1 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 10.2.0.2 1&lt;/P&gt;&lt;P&gt;route inside 10.2.64.0 255.255.254.0 10.2.0.2 1&lt;/P&gt;&lt;P&gt;route inside 10.244.12.0 255.255.255.0 10.2.30.12 1&lt;/P&gt;&lt;P&gt;route outside Hgnwhse 255.255.255.0 74.x.x.1 1&lt;/P&gt;&lt;P&gt;route inside 172.0.0.0 255.0.0.0 10.2.30.9 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.2.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;**crypto's omitted due to length**&lt;/P&gt;&lt;P&gt;**vpn items omitted due to length**&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2008 15:10:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929214#M938707</guid>
      <dc:creator>gmtimmons</dc:creator>
      <dc:date>2008-04-29T15:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929215#M938708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your static from the inside to the dmz needs to be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.2.30.0 10.2.30.0 netmask 255.255.254.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have deleted all of the old statics and added this one, you need to do a clear xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work after that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Apr 2008 20:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929215#M938708</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2008-04-29T20:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: the illusive inside to dmz nat issue</title>
      <link>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929216#M938709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you do not want to perform NAT for traffic passing between the DMZ and inside interfaces then there are two different options I am aware of that you can use.  The first method makes use of the "nat (inside) 0" command and the second method involves the use of the "static (inside,DMZ)" command.  From my experience, both of these options will accomplish the same goal of instructing the ASA to not perform any NAT translations for traffic passing between the inside and DMZ interfaces.  Instructions for configuring each of these methods is listed below.  You will want to choose one method or the other and not both.  My personal preference would be to use "nat (inside) 0" since you already have it configured for other purposes.  IMHO the "nat zero" method is easier to understand and makes more logical sense than using statics. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OPTION 1: To successfully pass traffic between the inside and DMZ interfaces by using the "nat (inside) 0" command, you need to configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Remove existing unneeded/unused NAT translation&lt;/P&gt;&lt;P&gt;no static (inside,DMZ) 10.2.20.0 10.2.20.0 netmask 255.255.254.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Add entries to the "no NAT" ACL that will match traffic sourced from&lt;/P&gt;&lt;P&gt;!either of the two networks (10./8 or 172./8) residing on the inside&lt;/P&gt;&lt;P&gt;!interface destined for the DMZ network.  This ACL is tied to the&lt;/P&gt;&lt;P&gt;!"nat (inside) 0" command.  A "nat" command configured with an&lt;/P&gt;&lt;P&gt;!identifier of "0" does not provide the same function as a "nat"&lt;/P&gt;&lt;P&gt;!command configured with an identifier other than "0".  The "0" is&lt;/P&gt;&lt;P&gt;!used when you have traffic that you do not want the ASA to NAT.  When&lt;/P&gt;&lt;P&gt;!the ASA does not perform a NAT translation it passes traffic just like&lt;/P&gt;&lt;P&gt;!a router does.  The "nat" command you are currently using has the ACL&lt;/P&gt;&lt;P&gt;!"inside_nat0_outbound tied to it.  Only traffic that succesfully&lt;/P&gt;&lt;P&gt;!matches an entry in this ACL will make use of this "nat" command and&lt;/P&gt;&lt;P&gt;!not be NATted.  If traffic does not match this ACL then the ASA&lt;/P&gt;&lt;P&gt;!attempts to match the traffic with the other configured "nat" commands.&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.2.253.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.0.0.0 255.0.0.0 10.2.253.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this configuration you should run "clear xlate" to clear all existing NAT translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OPTION 2: To successfully pass traffic between the inside and DMZ interfaces by using the "static (inside,DMZ)" command, you need to configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Remove existing unneeded/unused NAT translation&lt;/P&gt;&lt;P&gt;no static (inside,DMZ) 10.2.20.0 10.2.20.0 netmask 255.255.254.0&lt;/P&gt;&lt;P&gt;!This static command instructs the ASA to NAT the source address&lt;/P&gt;&lt;P&gt;!of packets coming from 10./8 or 172./8 to the packet's original source&lt;/P&gt;&lt;P&gt;!address.  So in actuality, the source and destination addresses in the&lt;/P&gt;&lt;P&gt;!packet do not get changed and the packet gets forwarded.  Although&lt;/P&gt;&lt;P&gt;!at first glance this command may appear to be pointless and unneeded,&lt;/P&gt;&lt;P&gt;!the ASA requires that this or NAT 0 be configured in order for the ASA&lt;/P&gt;&lt;P&gt;!to forward traffic from a lower security interface (DMZ) to a&lt;/P&gt;&lt;P&gt;!higher security interface (inside).&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 172.0.0.0 172.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this configuration you should run "clear xlate" to clear all existing NAT translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to test connectivity from the DMZ server to an inside server using ICMP, you will need to add an access-list and apply it inbound on the DMZ interface.  Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit icmp any any&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 05:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/the-illusive-inside-to-dmz-nat-issue/m-p/929216#M938709</guid>
      <dc:creator>kermitt95</dc:creator>
      <dc:date>2008-05-01T05:54:43Z</dc:date>
    </item>
  </channel>
</rss>

