Showing results for 
Search instead for 
Did you mean: 

configure communication from inside network to DMZ


ASDM 6.4

Hello :-) I need help about ASA 5505 and DMZ, I have a Base License.

What do I need to do for access inside network to DMZ?

I successfully configure, internet Access for DZM and inside network, web server can be accessed from internet, but I have problem to configure communication from inside network to DMZ.


1 Accepted Solution

Accepted Solutions

Hi ,

Well i donot agree with the same . If you have the current config with the base license , then the DMZ Interface can only speak to outside interface and not to VLAN1 (i.e DMZ can either communicate with the outside or inside but not both )

However if the inside interface want to communicate to VLAN 5 (DMZ ) resources i.e if  inside hosts initiates a new connection to DMZ , it can certainly do so and there is no restriction for it.

interface Vlan5
no forward interface Vlan1----> This says i dont want to communicate to inside i/f
nameif DMZ
security-level 50
ip address


View solution in original post

14 Replies 14


Running config

: Saved
ASA Version 8.4(2) 
hostname qpcnet
enable password Fzc1w9KayYqp2.LH encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface Ethernet0/0
 switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
 switchport access vlan 5
interface Ethernet0/4
 switchport access vlan 5
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
 nameif inside
 security-level 100
 ip address 
interface Vlan2
 nameif outside
 security-level 0
 ip address 
interface Vlan5
 no forward interface Vlan1
 nameif DMZ
 security-level 50
 ip address 
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
object network obj_any
object network speakersaid
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
access-list outside_access_in extended permit object-group TCPUDP any object speakersaid eq www 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu DMZ 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-645-206.bin
no asdm history enable
arp timeout 14400
object network obj_any
 nat (inside,outside) dynamic interface
object network speakersaid
 nat (any,any) static
nat (inside,outside) after-auto source dynamic any interface
access-group outside_access_in in interface outside
route outside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http inside
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
telnet timeout 5
ssh timeout 5
console timeout 0

dhcpd auto_config outside
dhcpd dns interface inside
dhcpd address DMZ
dhcpd dns interface DMZ
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server source outside
ntp server source outside
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
: end
asdm image disk0:/asdm-645-206.bin
no asdm history enable

Hello Dennis,

The problem here is that a base license on a 5505 ASA your DMZ or third vlan is restricted so it can only access another vlan.

In order for you to communicate from the DMZ to the Inside and Outside you will need the security-plus license.

Please rate helpful posts.



Julio Carvajal
Senior Network Security and Core Specialist