cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1224
Views
0
Helpful
2
Replies

ASA 5500 from inside to dmz access with private and public address

asoka
Level 1
Level 1



Hi,
My ASA is a simple setup with a dmz, customer don’t have a dns server in the inside
network. So I use dns doctoring to access the web server in the dmz with
public address.

static (dmz,inside) 11x.x.xx.ccc 192.168.x.x netmask 255.255.255.255 dns

If I do that I loose the access to the same server with the private address, is there
any way I could address the dmz server with both private and public address from inside network.

Cheers



1 Accepted Solution

Accepted Solutions

Maykol Rojas
Cisco Employee
Cisco Employee

Hi,

If you are running version below 8.3 you can do it. In 8.2 try this

access-list pnat1 permit ip host 192.168.x.x any

access-list pnat2 permit ip host 192.168.x.x any

no static (dmz,inside) 11x.x.xx.ccc 192.168.x.x netmask 255.255.255.255 dns

static (dmz,inside) 11.x.x.x access-list pnat1

static (dmz,inside) 192.168.x.x access-list pnat2

Let me know how it goes.

Mike

Mike

View solution in original post

2 Replies 2

Maykol Rojas
Cisco Employee
Cisco Employee

Hi,

If you are running version below 8.3 you can do it. In 8.2 try this

access-list pnat1 permit ip host 192.168.x.x any

access-list pnat2 permit ip host 192.168.x.x any

no static (dmz,inside) 11x.x.xx.ccc 192.168.x.x netmask 255.255.255.255 dns

static (dmz,inside) 11.x.x.x access-list pnat1

static (dmz,inside) 192.168.x.x access-list pnat2

Let me know how it goes.

Mike

Mike

HI, Thanks Mike, it works

but I had to make it

access-list pnat3 permit ip host 192.168.x.x host 11.x.x.x

static (dmz,inside) 11.x.x.x  access-list pnat3

and I didn't need the other static, once dns doctoring removed private address access works and with policy NATing public address access also works

any comments

regards

Review Cisco Networking for a $25 gift card