09-10-2007 05:59 AM - edited 03-11-2019 04:08 AM
I have an ASA 5510 with a DMZ port sub-interfaced to 3 ports. The 3 interfaces are set up the same with security level 50. The outbound rules for the interfaces are the same except obviously for the source. On the first and second sub-interface i can get to the internet but on the 3rd interface i can not. When trying to access the internet i get a deny message in the syslog. The ASDM reports it as the result of an implicit rule. As far as i know, this should be allowed since it is going to a less secure interface.
09-10-2007 06:04 AM
Do you mind posting the config?
09-10-2007 06:36 AM
Can you please let me know if i have forgotten to parse anything out and when and if i can remove the attachment.
09-10-2007 06:43 AM
You can pull it now.
09-10-2007 06:48 AM
Could you post the error message you are getting.
"As far as i know, this should be allowed since it is going to a less secure interface."
-Not necessarily...you have an acl applied into DMZ-13 interface, therefore anything not specifically allowed will be denied, regardless of where it's going.
09-10-2007 07:15 AM
4 Sep 10 2007 10:14:05 106023 CYCLOPS 170.224.191.33 Deny tcp src DMZ-13:CYCLOPS/4482 dst outside:170.224.191.33/80 by access-group "DMZ-13_access_in" [0x0, 0x0]
09-10-2007 07:20 AM
You have to allow that in your DMZ-13_access_in access list.
If you want to allow all the access to the outside then you should do this.
Take your existing acl, add a deny ip any to your other dmz/inside networks. Then add a permit ip any any to allow any other access to outside network.
access-list DMZ-13_access_in deny ip any
access-list DMZ-13_access_in deny ip any
access-list DMZ-13_access_in permit ip any any
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide