Access problem from Inside to DMZ and outside to DMZ
So long time lurker, first time poster. These FTD firewalls are making me feel like a greenhorn again. I've slogged through the initial configuration, have interfaces and etherchannels finally working... but cannot for the life of me configure access from our inside networks to our DMZ. I configured NATs in the vein of our configuration on the older ASA5525s without success.
Re: Access problem from Inside to DMZ and outside to DMZ
The Access-rules should be similar to what you have on the ASA version 8.3+. You do not need a NAT to go from inside to DMZ. You can however add a NAT exempt to exempt inside to DMZ traffic from any translation.
DMZ to outside would require an Auto NAT rule. Also, an ACL would be needed from Outside to DMZ to allow internet users to access your public DMZ servers.
It would be good if you can show us an example of what you have configured and what is not working.
Hi All, A customer wants to authenticate Anyconnect VPN users from an ASA using the client installed certificate and then with AD. i.e. Is this a corporate device?Would we recommend authenticating the cert on the ASA then passing the AD check to ISE ...
Hello Team, we are getting alert in FMC stating policy deployment failed, we are running on 6.2.0 version and not sure which version is stable version to re mediate this issue, in one event i have seen restart will resolve this issue but is it perman...
Threat Hunting 101
In the latest Cisco Cybersecurity report, we explore all there is to know about threat hunting and provide a how-to guide for creating a threat hunting team.
Here are some of th...
What Is Cisco Identity Services Engine?
Cisco Identity Services Engine (ISE) is an all-in-one enterprise policy control product that enables comprehensive secure wired, wireless, and Virtual Private Networking (VPN) access.
Cisco ISE offers...
To participate in this event, please use the button to ask your questions
(This event was formerly know as Ask the Expert event)
This topic is a chance to discuss more about the best configuration and troubleshooting pr...