<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic outbound web access from dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879892#M955594</link>
    <description>&lt;P&gt;I'm having a problem getting web access from my dmz network. It has a higher security-level than the outside interface, so shouldn't I be able to get outside internet access from the dmz? Inbound access from outside to the DMZ works fine the way I have it w/ PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone see anything wrong w/ what I've got?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5510(config)# sh run                  &lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname 5510&lt;/P&gt;&lt;P&gt;enable password ABC87h/3Z9f23JKj6 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.3.0 DEV_NET&lt;/P&gt;&lt;P&gt;name 192.168.4.0 DMZ_NET&lt;/P&gt;&lt;P&gt;name 192.168.2.0 CLUSTER_NET&lt;/P&gt;&lt;P&gt;name 199.199.xxx.0 AEW_NET&lt;/P&gt;&lt;P&gt;name 199.199.xxx.14 MY_WAN_IP&lt;/P&gt;&lt;P&gt;name 192.168.1.0 MGMT_NET&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address MY_WAN_IP 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 20&lt;/P&gt;&lt;P&gt; ip address 192.168.4.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif cluster&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif development&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group protocol TCP_UDP_ICMP&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network CLUSTER_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.2.10&lt;/P&gt;&lt;P&gt;object-group network DEVELOPMENT_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.3.10&lt;/P&gt;&lt;P&gt;object-group network DMZ_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.4.10&lt;/P&gt;&lt;P&gt;object-group network INSIDE_GRP&lt;/P&gt;&lt;P&gt; group-object DMZ_GRP&lt;/P&gt;&lt;P&gt; group-object CLUSTER_GRP&lt;/P&gt;&lt;P&gt; group-object DEVELOPMENT_GRP&lt;/P&gt;&lt;P&gt;object-group service DMZ_SERVICES tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3690&lt;/P&gt;&lt;P&gt;object-group service ALL_SERVICES tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3690&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt;access-list ANY_ACCESS extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list SSH_ACCESS extended permit tcp any any eq ssh &lt;/P&gt;&lt;P&gt;access-list ALL_ACCESS extended permit tcp any any object-group ALL_SERVICES &lt;/P&gt;&lt;P&gt;access-list DMZ_ACCESS extended permit tcp any interface dmz object-group DMZ_SERVICES &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu cluster 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu development 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;icmp permit any cluster&lt;/P&gt;&lt;P&gt;icmp permit any development&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-507.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 1 DMZ_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (cluster) 1 CLUSTER_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (development) 1 DEV_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;static (cluster,outside) tcp interface ssh 192.168.2.10 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface www 192.168.4.10 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface https 192.168.4.10 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 3690 192.168.4.10 3690 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (management,development) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (management,cluster) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (management,dmz) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (development,cluster) DEV_NET DEV_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (development,dmz) DEV_NET DEV_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (cluster,development) CLUSTER_NET CLUSTER_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group DMZ_ACCESS in interface dmz&lt;/P&gt;&lt;P&gt;access-group SSH_ACCESS in interface cluster&lt;/P&gt;&lt;P&gt;access-group ALL_ACCESS in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 139.169.174.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http MGMT_NET 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 11:58:46 GMT</pubDate>
    <dc:creator>a.e.wiggin</dc:creator>
    <dc:date>2019-03-11T11:58:46Z</dc:date>
    <item>
      <title>outbound web access from dmz</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879892#M955594</link>
      <description>&lt;P&gt;I'm having a problem getting web access from my dmz network. It has a higher security-level than the outside interface, so shouldn't I be able to get outside internet access from the dmz? Inbound access from outside to the DMZ works fine the way I have it w/ PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone see anything wrong w/ what I've got?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5510(config)# sh run                  &lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(7) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname 5510&lt;/P&gt;&lt;P&gt;enable password ABC87h/3Z9f23JKj6 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.3.0 DEV_NET&lt;/P&gt;&lt;P&gt;name 192.168.4.0 DMZ_NET&lt;/P&gt;&lt;P&gt;name 192.168.2.0 CLUSTER_NET&lt;/P&gt;&lt;P&gt;name 199.199.xxx.0 AEW_NET&lt;/P&gt;&lt;P&gt;name 199.199.xxx.14 MY_WAN_IP&lt;/P&gt;&lt;P&gt;name 192.168.1.0 MGMT_NET&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address MY_WAN_IP 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 20&lt;/P&gt;&lt;P&gt; ip address 192.168.4.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif cluster&lt;/P&gt;&lt;P&gt; security-level 60&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif development&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group protocol TCP_UDP_ICMP&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network CLUSTER_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.2.10&lt;/P&gt;&lt;P&gt;object-group network DEVELOPMENT_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.3.10&lt;/P&gt;&lt;P&gt;object-group network DMZ_GRP&lt;/P&gt;&lt;P&gt; network-object host 192.168.4.10&lt;/P&gt;&lt;P&gt;object-group network INSIDE_GRP&lt;/P&gt;&lt;P&gt; group-object DMZ_GRP&lt;/P&gt;&lt;P&gt; group-object CLUSTER_GRP&lt;/P&gt;&lt;P&gt; group-object DEVELOPMENT_GRP&lt;/P&gt;&lt;P&gt;object-group service DMZ_SERVICES tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3690&lt;/P&gt;&lt;P&gt;object-group service ALL_SERVICES tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 3690&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt;access-list ANY_ACCESS extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list SSH_ACCESS extended permit tcp any any eq ssh &lt;/P&gt;&lt;P&gt;access-list ALL_ACCESS extended permit tcp any any object-group ALL_SERVICES &lt;/P&gt;&lt;P&gt;access-list DMZ_ACCESS extended permit tcp any interface dmz object-group DMZ_SERVICES &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu cluster 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu development 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp permit any dmz&lt;/P&gt;&lt;P&gt;icmp permit any cluster&lt;/P&gt;&lt;P&gt;icmp permit any development&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-507.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 1 DMZ_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (cluster) 1 CLUSTER_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (development) 1 DEV_NET 255.255.255.0&lt;/P&gt;&lt;P&gt;static (cluster,outside) tcp interface ssh 192.168.2.10 ssh netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface www 192.168.4.10 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface https 192.168.4.10 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) tcp interface 3690 192.168.4.10 3690 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (management,development) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (management,cluster) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (management,dmz) MGMT_NET MGMT_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (development,cluster) DEV_NET DEV_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (development,dmz) DEV_NET DEV_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (cluster,development) CLUSTER_NET CLUSTER_NET netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group DMZ_ACCESS in interface dmz&lt;/P&gt;&lt;P&gt;access-group SSH_ACCESS in interface cluster&lt;/P&gt;&lt;P&gt;access-group ALL_ACCESS in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 139.169.174.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http MGMT_NET 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879892#M955594</guid>
      <dc:creator>a.e.wiggin</dc:creator>
      <dc:date>2019-03-11T11:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: outbound web access from dmz</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879893#M955596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This acl is blocking it, don't forget about the explicit deny ip any any...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_ACCESS extended permit tcp any interface dmz object-group DMZ_SERVICES &lt;/P&gt;&lt;P&gt;access-list DMZ_ACCESS extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the reason for the above acl? If you don't need it, get rid of it and you will get to the internet. If you need access from the dmz to the inside, you must write the access in this acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2008 16:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879893#M955596</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-02-04T16:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: outbound web access from dmz</title>
      <link>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879894#M955598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought it was allowing only 3 of the 4 services I care about to get into the DMZ and ssh to the others. However, it did work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it has something to do w/ PAT which I don't quite understand yet. Do access-lists override PAT, was I using them both wrong together?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My only problem now is that my ssh logins take minutes to 'login' to other machines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2008 16:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outbound-web-access-from-dmz/m-p/879894#M955598</guid>
      <dc:creator>a.e.wiggin</dc:creator>
      <dc:date>2008-02-04T16:34:35Z</dc:date>
    </item>
  </channel>
</rss>

