01-26-2016 08:58 AM - edited 02-21-2020 05:42 AM
Hello All,
what all we required when communicating from Inside(security level 100) to dmz (security level 25) both having private pools .
inside ip 192.168.7.10
dmz ip 192.168.107.10
service rdp .
I know we need to add ACL on DMZ-in apart from that do we need any nat configs ? if yes then why we need and what will be the syntax ?
Thanks in advance.
-
Harish
01-26-2016 09:55 AM
As always: It depends ...
01-26-2016 10:37 AM
Hello Karsten,
Thanks for the time and your response.
inside to dmz - i think no acl required 100 to 25 security level
dmz to inside - we need acl bcoz the security level is higher on inside , what i taught. Can you confirm if statefull inspection works in this case eg 100 to 25 .
Firewall version is above 8.4 .
Snippet as per my understanding (Let me know if I'm correct or wrong)
-----------------
object network NAT-Source
host 192.168.7.10
object network NAT-Destination
host 192.168.107.10
nat (inside,dmz) source static NAT-Source NAT-Source destination static NAT-Destination NAT-Destination
-------------
Thanks again.
Harish
01-26-2016 11:01 AM
The ASA is a statefull firewall. Allowing the return-traffic is the main purpose of a statefull firewall (in addition to other things).
And the NAT is probably not needed at all.
01-26-2016 11:38 AM
01-27-2016 07:10 AM
Hello Karsten,
I got the chance of working on the issue.
There was no access-group called on inside interface and i allowed any traffic , it worked.
NAT not required.
Thanks you
- Harish
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide