<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inside to dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880957#M969206</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your static and acl should be similar to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.23.20 10.10.23.20 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list inside_access_in  permit tcp host 10.10.23.20  host 192.168.211.200 eq 21&lt;/P&gt;&lt;P&gt;access-list inside_access_in  permit tcp host 10.10.23.20  host 192.168.211.200 eq 25&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Sep 2007 01:30:29 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2007-09-19T01:30:29Z</dc:date>
    <item>
      <title>inside to dmz</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880956#M969205</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;suppose i have one server (x) on the inside interface of ASA which need to access server (y) on the DMZ interface of the ASA for specific port e.g. 25 &amp;amp; 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but in doing so the server (x) ip address e.g. 10.10.23.20 should be natted to (192.168.211.201) the subnet configured on the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server (x) need to access server (y) having ip address  192.168.211.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what would be the best possible way to do so, i have tried using access-list and global but i get error message on syslog portmap translation creation failed, now i was thinking of doing it using static from (inside,dmz) using access list - PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help would be great&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:12:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880956#M969205</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2019-03-11T11:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: inside to dmz</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880957#M969206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your static and acl should be similar to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.23.20 10.10.23.20 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-list inside_access_in  permit tcp host 10.10.23.20  host 192.168.211.200 eq 21&lt;/P&gt;&lt;P&gt;access-list inside_access_in  permit tcp host 10.10.23.20  host 192.168.211.200 eq 25&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 01:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880957#M969206</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-09-19T01:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: inside to dmz</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880958#M969208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi jorgemcse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would leave the 10.10.23.20 without being translated, but like i said earlier i want 10.10.23.20 to be translated to 192.168.211.201 , a subnet configured on the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this clear out my point of question&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 04:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880958#M969208</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-09-19T04:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: inside to dmz</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880959#M969209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zulqurnain, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then creating  PAT for dmz interface  is one way of doing it , allocate an address for it under the 192.168.201.0 subnet  and create PAT, or using the dmz-interface itself as PAT device.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g regular pat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 192.168.201.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 14:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880959#M969209</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-09-19T14:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: inside to dmz</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880960#M969212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the error exaclty that you are getting. Ideally you dont need an ACL when going from inside to dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should only have one statement &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.211.200 10.10.23.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try this and if it works then you can create an ACL on the DMZ interface for restricting the ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just out of curiosity..do you have the nat-control enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Pls rate if it helps--&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 14:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-dmz/m-p/880960#M969212</guid>
      <dc:creator>zubairjalal</dc:creator>
      <dc:date>2007-09-19T14:35:15Z</dc:date>
    </item>
  </channel>
</rss>

