Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

ASA 5520 DMZ Configuration Question

Posted on 2006-11-02
2
Medium Priority
?
1,174 Views
Last Modified: 2009-07-29
I have a general DMZ configuration question.

I have two networks:

DMZ - 192.168.155.0 /24
Inside - 172.22.0.0 /16

Here is what I have done:

static (Inside,DMZ) 172.22.0.0 172.22.0.0 netmask 255.255.0.0
global (Outside) 10 interface
global (DMZ) 10 interface
nat (Inside) 10 0.0.0.0 0.0.0.0
nat (DMZ) 10 0.0.0.0 0.0.0.0

So right now I have this:
- DMZ can access the internet
- 172.22.x.x network can access DMZ across all ports

How can I restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ? or port 21 ex...
I have seen examples where the static command lists only the IP of the Inside host and not the entire range.  The problem is, I have a device
that would need to be accessed by all users in the 22 network over a specified port, not a single host.

Thanks in advance.

Nick


0
Comment
Question by:Paisley-Consulting
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 1000 total points
ID: 17862733
>restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ?
Access-lists ---

 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq smtp
 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq <port#>
 access-list DMZ_Restricted deny ip 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0
 access-list DMZ_Restricted permit ip any any
 access-group DMZ_Restricted in interface inside

BTW, you don't need the static unless you want the systems in the DMZ to address the internal users directly by their private IP's. Given the rest of the information that you provided, I don't think that is your intention..
 
0
 

Author Comment

by:Paisley-Consulting
ID: 17864234
Thanks that is exactly what I wanted and it worked great.
0

Featured Post

Receive 1:1 tech help

Solve your biggest tech problems alongside global tech experts with 1:1 help.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Kernel Data Recovery is a renowned Data Recovery solution provider which offers wide range of softwares for both enterprise and home users with its cost-effective solutions. Let's have a quick overview of the journey and data recovery tools range he…
Suggested Courses
Course of the Month10 days, 2 hours left to enroll

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question