10-17-2003 02:13 AM - edited 03-09-2019 05:11 AM
Hi all,
Csn someone give me some advice please. What I am trying to achieve is:
1- a dmz with internet access
2- outside access to dmz for www from any
3- access from inside host to dmz for smtp and 1433
4- access for requests from dmz to inside host from smtp and 1433
my basic config is:
hostname firewall
domain-name domain.local
nameif e0 outside sec0
nameif e1 inside sec100
nameif e2 dmz sec50
int e0 100full
int e1 100baset
int e2 100full
ip address inside 10.171.92.5 255.255.255.0
ip address outside 62.x.x.1 255.255.255.252
ip address dmz 192.168.200.1 255.255.255.252
route outside 0 0 62.x.x.2 1
nat (dmz) 1 192.168.200.2 255.255.255.255 0 0
global (outside) 1 interface
static (dmz,outside) tcp 62.x.x.1 www 192.168.200.2 www netmask 255.255.255.255
access-list outside_dmz permit tcp any host 62.x.x.1 eq www
access-group outside_dmz in interface outside
static (inside,outside) tcp 192.168.200.2 25 10.171.92.3 25 netmask 255.255.255.255
static (inside,outside) tcp 192.168.200.2 1433 10.171.92.4 1433 netmask 255.255.255.255
access-list dmz_inside permit tcp any host 10.171.92.3 eq smtp
access-list dmz_inside permit tcp any host 10.171.92.3 eq 1433
access-group dmz_inside in interface inside
--------------------------
Can anyone tell me if I have this correct. I seem to be getting confused as to where I place the access-group command. Is it on the inside interface?
Many thanks for your time
Andy
10-17-2003 04:25 AM
hi,
for your scenario 1;
if you mean to allow access from dmz to outside, it seems ok.
for scenario 2;
it seems ok.
for scenario 3;
you have use a nat statement like you did for nat(dmz) and also a global. or you if you don't want to nat you can use "nat(inside) 0 0" to disable nat.
for scenario 4;
your static statements must be like that "static (inside,dmz)" and you have to apply the dmz_inside to dmz interface instead of inside. and I couln't understand that why you made the second static for 10.171.92.4. will it be 10.171.92.3? if your's true it must be allowed in the access-list, too.
hope this helps..
10-20-2003 12:44 AM
Hi,
Thanks for the reply.
3 - If I apply an access list to the dmz interface what do I need to have? I tried this allowing accesslist to dmz for 25 and 1433 but this just stopped internet access by blocking dns etc
4 - I made a mistake the statics should be the same sorry.
I think the problem I am seeing is that im not sure how to setup the access from dmz to inside. If create statics for the internal server ip to the dmz server ip for the two ports then create an acl that allows just those ports then this acl blocks the traffic to the internet. How do I set this up?
thanks again
Andy
10-20-2003 06:07 AM
yes Andy, sorry I missed that. I think you have to add a new line to access-list dmz_inside. Because of the implicit deny statement at the end of the access-list your web server can't access to outside. So, if you append a statement that permits your webserver to outside, it will be ok.
can you try and let me know?
10-20-2003 08:30 AM
I think he is right. You will have to include the line in your outside_dmz access list in your dmz_inside access list, then apply the dmz_inside access list to your DMZ interface. Remember the name 'dmz_inside' is *only* a name, it's not instructing the access-list to only perform functions going to the inside from the dmz, it applies it to the entire interface regardless of where the traffic goes to. Also remember you dont need anything permitting access from the inside to the dmz because higher to lower communication is permitted, and the inside is "higher" than the dmz interface, but you do need to allow the dmz through to the inside. Sometimes it gets to be a pain to make sure you have multiple acl's correctly entered. You can always just use a conduit command to allow specific traffic from the dmz to the inside, that's what I do when I have very long acl's and acl's on multiple interfaces...even though I think Cisco doesnt recommend that you use conduits and acl's together it works for me, and I know a lot of engineers who do the same. Hope that helps.
10-23-2003 01:03 AM
Hi,
I have changed by config as below. Im not sure on setting up conduits so would prefer acl's. Even with whats below I still get deny messages when trying to access the internet from the dmz when the dmz_int acl is applied. I thought a higher (dmz) to lower (outside) was allowed anyway? I think most of it is correct but I can't reason why I get the deny statements now.
Thanks for your help guys I appreciate it.
Andy
hostname firewall
domain-name domain.local
nameif e0 outside sec0
nameif e1 inside sec100
nameif e2 dmz sec50
int e0 100full
int e1 100baset
int e2 100full
ip address inside 10.171.92.5 255.255.255.0
ip address outside x.x.x.1 255.255.255.252
ip address dmz 192.168.200.1 255.255.255.252
route outside 0 0 x.x.x.2 1
nat (dmz) 1 192.168.200.2 255.255.255.255 0 0
global (outside) 1 interface
nat (inside) 2 10.171.92.3 255.255.255.255
global (dmz) 2 interface
static (dmz,outside) tcp x.x.x.1 www 192.168.200.2 www netmask 255.255.255.255
access-list outside_int permit tcp any host x.x.x.1 eq www
access-group outside_int in interface outside
static (inside,dmz) tcp 192.168.200.2 25 10.171.92.3 25 netmask 255.255.255.255
static (inside,dmz) tcp 192.168.200.2 1433 10.171.92.3 1433 netmask 255.255.255.255
access-list dmz_int permit tcp host 192.168.200.2 host 10.171.92.3 eq smtp
access-list dmz_int permit tcp host 192.168.200.2 host 10.171.92.3 eq 1433
access-list dmz_int permit tcp interface dmz interface outside
access-list dmz_int permit udp interface dmz interface outside
access-group dmz_int in interface dmz
10-23-2003 04:43 AM
I have got it sorted. In the end I spoke to TAC and I realise now where I was going wrong.
I didn't understand that I needed to allow the server in the dmz an acl so it would access the dmz interface then the statics would take over.
Thanks for your time again
Andy
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide