12-05-2001 12:53 PM - edited 03-08-2019 09:20 PM
I'm a starter! Okay, one (2.2.2.2) of the servers on the DMZ needs to access the Internet. The server's DNS is pointing to a DNS server (1.1.1.1) on the outside of the PIX. I don't understand why this doesn't work, I thought that everything is allow out by default. <br>Now, when I added 2 access-list: <br>access-list acl_dmz permit udp host 2.2.2.2 host 1.1.1.1 eq 53 <br>access-list acl_dmz permit tcp host 2.2.2.2 any eq 80 <br>I can get out to the Internet. Please advice!!!
12-05-2001 11:59 PM
NAT or PAT the 2.2.2.2 to an available IP address at the outside interface, then no need for those access-lists.
12-06-2001 05:13 AM
I take it these lines were added to an ACL called acl_dmz already bound to the interface.
With a valid NAT translation through the pix from dmz to outside, traffic will flow by default so long as there is no ACL.
Applying the ACL creates an implicit deny at the end of the list.
12-06-2001 10:03 AM
Hi, yes there are other ACLs applied to acl_dmz bound to the dmz interface. So, is that mean I have implicitly allow traffic to go out to the Internet?
12-06-2001 03:09 PM
Each Access Control Lists ends with an implicit deny all statement, whether you configure it or not. So, if you do apply an acl to an interface, you need to create an entry for all traffic allowed.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide