<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Giving DMZ internet access only in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993815#M941462</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brettilborrow: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ACL on my DMZ, so I solved the problem then by doing just as you described it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping tho that there was a better way then having to implent an "deny ip &lt;INTERNAL networks=""&gt;" at the start of the ACL. And then putting the "permit ip any any" to give internal DMZ hosts access to the internet.&lt;/INTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But regarding the ACL, im going from an higher sec-level and towards an lower interface when going "outside" arent I? my DMZ hosts should only get an denied when encountering my other higher sec-level DMZ/inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, appreciate the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Mar 2008 10:42:32 GMT</pubDate>
    <dc:creator>azore2007</dc:creator>
    <dc:date>2008-03-06T10:42:32Z</dc:date>
    <item>
      <title>Giving DMZ internet access only</title>
      <link>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993812#M941450</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm abit confused and need some config help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would you configure your PIX/ASA to let your DMZ which has a public IP-Network access to the internet without NAT'ing it through the outside interface&lt;/P&gt;&lt;P&gt;And without giving the DMZ access anything else (like other DMZ,internal networks etc)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Outside&lt;/P&gt;&lt;P&gt;Public IP-Address/NW&lt;/P&gt;&lt;P&gt;Sec-level 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface DMZ &lt;/P&gt;&lt;P&gt;Public IP-Address/NW&lt;/P&gt;&lt;P&gt;Sec-Level 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface Inside&lt;/P&gt;&lt;P&gt;Internal IP Address/NW&lt;/P&gt;&lt;P&gt;Sec 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) dmz_nw dmz_nw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt this be enough to let my DMZ out and able to access the internet without using my outside interface IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have nat-control active also &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I make sense? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993812#M941450</guid>
      <dc:creator>azore2007</dc:creator>
      <dc:date>2019-03-11T12:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Giving DMZ internet access only</title>
      <link>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993813#M941456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config you have should be enough to allow access to the internet for your DMZ hosts, provided that you do not have an acl applied to the DMZ interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do have an acl applied, you will need to modify the acl to permit the outbound traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g: &lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK any eq 80&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK any eq 443&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK host DNS_SERVER eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: If you want to restrict access from the DMZ to your internal network on the ports mentioned above (you may have noticed the 'any' keyword used as the destination), then you need to add the following to your acl BEFORE the above mentioned lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g:&lt;/P&gt;&lt;P&gt;access-list acl_dmz deny ip DMZ_NET DMZ_MASK INT_NET INT_MASK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;COMMAND SUMMARY:&lt;/P&gt;&lt;P&gt;access-list acl_dmz deny ip DMZ_NET DMZ_MASK INT_NET INT_MASK&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK any eq 80&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK any eq 443&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp DMZ_NET DMZ_MASK host DNS_SERVER eq 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTES ON NATTING ON ASA:&lt;/P&gt;&lt;P&gt;Try to remember this: 'statics' override 'nats' for outbound connectivity, unless you specify a 'nat 0'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case you have a static and a nat that covers the DMZ hosts, and taking the above into account, the NAT 0 statement will be used for the outbound connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2008 16:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993813#M941456</guid>
      <dc:creator>brettmilborrow</dc:creator>
      <dc:date>2008-03-05T16:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: Giving DMZ internet access only</title>
      <link>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993814#M941458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (dmz) 0 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will allow DMZ to access Internal networks as well. Delete it, and you should be ok.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2008 21:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993814#M941458</guid>
      <dc:creator>kaachary</dc:creator>
      <dc:date>2008-03-05T21:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Giving DMZ internet access only</title>
      <link>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993815#M941462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brettilborrow: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ACL on my DMZ, so I solved the problem then by doing just as you described it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping tho that there was a better way then having to implent an "deny ip &lt;INTERNAL networks=""&gt;" at the start of the ACL. And then putting the "permit ip any any" to give internal DMZ hosts access to the internet.&lt;/INTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But regarding the ACL, im going from an higher sec-level and towards an lower interface when going "outside" arent I? my DMZ hosts should only get an denied when encountering my other higher sec-level DMZ/inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, appreciate the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2008 10:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-dmz-internet-access-only/m-p/993815#M941462</guid>
      <dc:creator>azore2007</dc:creator>
      <dc:date>2008-03-06T10:42:32Z</dc:date>
    </item>
  </channel>
</rss>

