06-03-2018 09:04 PM - edited 02-21-2020 07:50 AM
Dear Support
Recently i installed a web server on my DMZ zone.
My network is with two firewalls, one sophos and Cisco ASA 5525 (cf network design attached)
The server in dmz has ASA ip like default-gateway, the webserver reach internet easly and from Internet we can also reach the webserver installed in dmz
My isssue is that from inside network we cannot reach the webserver, we have this error message
Deny TCP(no connection) from 10.4.11.3/8080 to 192.192.0.10/58495 flags SYN ACK on interface inside
Inbound TCP connection denied from 10.4.11.3/8080 to 192.192.0.10/59535 flags SYN ACK on interface inside
can anybody help us how can we reach our webserver from inside
Regards
Solved! Go to Solution.
06-05-2018 03:35 AM
The simplest solution would be that you add a static route on the DMZ server for 192.192.0.0/24 or /16 with next-hop 10.4.11.2.
Now the trick would be, what if you had 100 DMZ servers instead of just one, or what if you cannot alter DMZ server network config. In this case I have two more ideas
- setup a policy based routing policy on the Sophos firewall and ask that traffic with src LAN and destination 10.4.11.3 go to next-hop 10.4.11.1
- play with ASA TCP Bypass config; here's a very good example.
06-03-2018 10:48 PM
Can you send the config of the inner ASA. so we can check your ACL and NAT?
cheers
06-03-2018 11:58 PM
06-05-2018 03:35 AM
The simplest solution would be that you add a static route on the DMZ server for 192.192.0.0/24 or /16 with next-hop 10.4.11.2.
Now the trick would be, what if you had 100 DMZ servers instead of just one, or what if you cannot alter DMZ server network config. In this case I have two more ideas
- setup a policy based routing policy on the Sophos firewall and ask that traffic with src LAN and destination 10.4.11.3 go to next-hop 10.4.11.1
- play with ASA TCP Bypass config; here's a very good example.
06-05-2018 04:06 AM
Many Thanks Florian
So you are right, if we have a lot server in dmz, it will be difficult to manage.
I think the best and simply way is to use a third interface on the ASA and all dmz servers will be hosted behind the third ASA interfaces.
what do you think about this ?
so all traffic from inside network will enter asa before going to dmz server.
06-05-2018 05:02 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide