Solved

ASA 5520 DMZ Configuration Question

Posted on 2006-11-02
2
1,170 Views
Last Modified: 2009-07-29
I have a general DMZ configuration question.

I have two networks:

DMZ - 192.168.155.0 /24
Inside - 172.22.0.0 /16

Here is what I have done:

static (Inside,DMZ) 172.22.0.0 172.22.0.0 netmask 255.255.0.0
global (Outside) 10 interface
global (DMZ) 10 interface
nat (Inside) 10 0.0.0.0 0.0.0.0
nat (DMZ) 10 0.0.0.0 0.0.0.0

So right now I have this:
- DMZ can access the internet
- 172.22.x.x network can access DMZ across all ports

How can I restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ? or port 21 ex...
I have seen examples where the static command lists only the IP of the Inside host and not the entire range.  The problem is, I have a device
that would need to be accessed by all users in the 22 network over a specified port, not a single host.

Thanks in advance.

Nick


0
Comment
Question by:Paisley-Consulting
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 17862733
>restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ?
Access-lists ---

 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq smtp
 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq <port#>
 access-list DMZ_Restricted deny ip 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0
 access-list DMZ_Restricted permit ip any any
 access-group DMZ_Restricted in interface inside

BTW, you don't need the static unless you want the systems in the DMZ to address the internal users directly by their private IP's. Given the rest of the information that you provided, I don't think that is your intention..
 
0
 

Author Comment

by:Paisley-Consulting
ID: 17864234
Thanks that is exactly what I wanted and it worked great.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question