Access problem from Inside to DMZ and outside to DMZ
So long time lurker, first time poster. These FTD firewalls are making me feel like a greenhorn again. I've slogged through the initial configuration, have interfaces and etherchannels finally working... but cannot for the life of me configure access from our inside networks to our DMZ. I configured NATs in the vein of our configuration on the older ASA5525s without success.
Re: Access problem from Inside to DMZ and outside to DMZ
The Access-rules should be similar to what you have on the ASA version 8.3+. You do not need a NAT to go from inside to DMZ. You can however add a NAT exempt to exempt inside to DMZ traffic from any translation.
DMZ to outside would require an Auto NAT rule. Also, an ACL would be needed from Outside to DMZ to allow internet users to access your public DMZ servers.
It would be good if you can show us an example of what you have configured and what is not working.
If you are just starting with Threat Response for the first time, use our quick start guides for Umbrella, Email Security, or Firepower. You can also check out our module configuration videos on YouTube and the in-produ...
If you own AMP for Endpoints, you can manage users within the AMP dashboard. If you have other Cisco products, you can manage users at https://castle.amp.cisco.com/my/users.
Learn more about Threat Response here, or check out other FAQs he...
Threat Response is free with selected Cisco Security products. To get access, simply go to the login page for your region - NA, EU, or APJC* - and either log in or click to create an account. You can also watch this 1 min v...
Threat Response is not a SIEM, but it can work alongside a SIEM to speed up investigations. For instance, via the browser plugins, Threat Response provides additional response capabilities directly from within the web-based interfaces of a SIEM.