Solved

ASA 5520 DMZ Configuration Question

Posted on 2006-11-02
2
1,166 Views
Last Modified: 2009-07-29
I have a general DMZ configuration question.

I have two networks:

DMZ - 192.168.155.0 /24
Inside - 172.22.0.0 /16

Here is what I have done:

static (Inside,DMZ) 172.22.0.0 172.22.0.0 netmask 255.255.0.0
global (Outside) 10 interface
global (DMZ) 10 interface
nat (Inside) 10 0.0.0.0 0.0.0.0
nat (DMZ) 10 0.0.0.0 0.0.0.0

So right now I have this:
- DMZ can access the internet
- 172.22.x.x network can access DMZ across all ports

How can I restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ? or port 21 ex...
I have seen examples where the static command lists only the IP of the Inside host and not the entire range.  The problem is, I have a device
that would need to be accessed by all users in the 22 network over a specified port, not a single host.

Thanks in advance.

Nick


0
Comment
Question by:Paisley-Consulting
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 17862733
>restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ?
Access-lists ---

 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq smtp
 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq <port#>
 access-list DMZ_Restricted deny ip 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0
 access-list DMZ_Restricted permit ip any any
 access-group DMZ_Restricted in interface inside

BTW, you don't need the static unless you want the systems in the DMZ to address the internal users directly by their private IP's. Given the rest of the information that you provided, I don't think that is your intention..
 
0
 

Author Comment

by:Paisley-Consulting
ID: 17864234
Thanks that is exactly what I wanted and it worked great.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now