Solved

ASA 5520 DMZ Configuration Question

Posted on 2006-11-02
2
1,168 Views
Last Modified: 2009-07-29
I have a general DMZ configuration question.

I have two networks:

DMZ - 192.168.155.0 /24
Inside - 172.22.0.0 /16

Here is what I have done:

static (Inside,DMZ) 172.22.0.0 172.22.0.0 netmask 255.255.0.0
global (Outside) 10 interface
global (DMZ) 10 interface
nat (Inside) 10 0.0.0.0 0.0.0.0
nat (DMZ) 10 0.0.0.0 0.0.0.0

So right now I have this:
- DMZ can access the internet
- 172.22.x.x network can access DMZ across all ports

How can I restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ? or port 21 ex...
I have seen examples where the static command lists only the IP of the Inside host and not the entire range.  The problem is, I have a device
that would need to be accessed by all users in the 22 network over a specified port, not a single host.

Thanks in advance.

Nick


0
Comment
Question by:Paisley-Consulting
2 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 17862733
>restrict access into the DMZ from the Inside so only port 25 is open from the Inside to the DMZ?
Access-lists ---

 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq smtp
 access-list DMZ_Restricted permit tcp 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0 eq <port#>
 access-list DMZ_Restricted deny ip 172.22.0.0 255.255.0.0 192.168.155.0 255.255.255.0
 access-list DMZ_Restricted permit ip any any
 access-group DMZ_Restricted in interface inside

BTW, you don't need the static unless you want the systems in the DMZ to address the internal users directly by their private IP's. Given the rest of the information that you provided, I don't think that is your intention..
 
0
 

Author Comment

by:Paisley-Consulting
ID: 17864234
Thanks that is exactly what I wanted and it worked great.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question