Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: Query on DMZ implementation.

Query on DMZ implementation. 7 years 4 months ago #30989

  • chidimaar
  • chidimaar's Avatar
  • Offline
  • New Member
  • Posts: 4
  • Karma: 0
Hi,
I am trying to setup DMZ on my ASA 5510; I am not able to access a web server on DMZ from inside.

I did some search on internet (on firewall.cx as well) and found out i need to give a static command between inside and DMZ.
If my-
inside is 10.10.10.0
DMZ is 192.168.10.0

I should have static NAT between inside and DMZ; the command would be
static(inside, dmz) 10.10.10.0 10.10.10.0 netmask 255.255.255.0

Could anyone pls help me understand what the above mentioned command really does ?

Thanks.
The administrator has disabled public write access.

Re: Query on DMZ implementation. 7 years 4 months ago #30991

  • Chris
  • Chris's Avatar
  • Offline
  • Administrator
  • Posts: 1446
  • Thank you received: 13
  • Karma: 8
chidimaar,

I've removed your identical post in our other category as there is no need to make double posts - it just confuses things. One post is sufficient on Firewall.cx :)

Regarding your question, you need two things:

1) A Static NAT command
2) ACL's allowing traffic to pass between the two networks.

The static nat command you mentioned should be correct according to the information you've provided:

static(inside, dmz) 10.10.10.0 10.10.10.0 netmask 255.255.255.0

The above command ensures that no NAT translation is performed for traffic from your INSIDE network toward the DMZ Zone. This effectively means that machines on your DMZ zone will see the requests coming from your internal lan IP range and try to reply back to them.

With Cisco ASA's, it is imperative that every NAT command is accompanied with its ACL - access lists, otherwise no traffic will be allowed over your ASA.

So, with that in mind, you need to create an access lists and apply it to your INSIDE interface.

For example:

access-list inside-in extended permit ip 10.10.10.0 255.255.255.0 192.168.10.0 255.255.255.0

The above should give you access to your DMZ from your LAN network.

Cheers,
Chris Partsenidis.
Founder & Editor-in-Chief
www.Firewall.cx
The administrator has disabled public write access.

Re: Query on DMZ implementation. 7 years 4 months ago #30992

  • chidimaar
  • chidimaar's Avatar
  • Offline
  • New Member
  • Posts: 4
  • Karma: 0
Thanks for the reply Chris !!

Let me get this right.

For traffic to flow between any two interfaces of firewall regardless of their security level, I must specify a NAT/no NAT along with a ACL permitting the traffic.


Pls correct me if I am wrong.

Thanks.
The administrator has disabled public write access.

Re: Query on DMZ implementation. 7 years 4 months ago #30995

  • chidimaar
  • chidimaar's Avatar
  • Offline
  • New Member
  • Posts: 4
  • Karma: 0
Also with above query, currently I am not able to access the server on dmz from internet. I have bunch of public IP's provided to me by my ISP, out of which I am using one public IP for server so that it'll be accessible over internet.
As mentioned earlier, 192.168.10.0 /24 is my DMZ; and 192.168.10.5 is web server.

I have configured the required things like static NAT and access list:

static (dmz, outside) 124.x.y.z 192.168.10.5 netmask 255.255.255.255

access-list outside extended permit tcp any host 124.x.y.z eq https
access-list outside extended permit tcp any host 124.x.y.z eq ssh
access-list outside extended permit tcp any host 124.x.y.z eq http

access-group outside in interface outside

Unfortunately, I cannot share the complete ASA configuration here; will try to post if anything else is required.

Can anyone pls figure out what went wrong ?

I am really sorry about limited information. Let me know if i need to provide anything else.

Thanks.
The administrator has disabled public write access.

Re: Query on DMZ implementation. 7 years 4 months ago #31368

  • faisal4u2
  • faisal4u2's Avatar
  • Offline
  • New Member
  • Posts: 4
  • Karma: 0
The configuration is Perfectly fine.

You need to clear arp on your firewall as well as the arp entry to be cleared on ISP router.

Better is to reload your firewall and the modem or internet router after taking the downtime in your organization it willl work.
The administrator has disabled public write access.
Time to create page: 0.079 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup