Solved

Cisco ASA DMZ question

Posted on 2007-04-11
8
718 Views
Last Modified: 2008-01-09
We are using the CIsco ASA 5505 IOS version 7.1(1) We have created a DMZ however are unable access the DMZ from the inside?  So for example our DMZ is 10.1.3.X and our internal network is 10.1.4.X. I am able to ping a computer 10.1.3.9, however I can not reach it via http://10.1.3.9.

Thanks

0
Comment
Question by:jbuddy
  • 3
  • 3
8 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 18899190
Do you have any access-lists applied on the inside?

Do you have both dmz and inside on the same security level?

If both are not; then we would need to see your configuration.

Cheers,
Rajesh
0
 

Author Comment

by:jbuddy
ID: 18907542
The inside security interface is set at 100 the DMZ is set at 50. If I put an ACL allowing ICMP I can ping the server at 10.1.3.9, however if I try to allow any, only ping still works I cannot contact the webserver at port 80 or rdp.

Thanks
0
 

Author Comment

by:jbuddy
ID: 18907621
And only 2 implicit rules exist on the inside interface
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 32

Expert Comment

by:rsivanandan
ID: 18909457
Ok, can you post a sanitized configuration here (remove passwords and first octect of public ip addresses)

Cheers,
Rajesh
0
 

Accepted Solution

by:
jbuddy earned 0 total points
ID: 20488197
I had to add 2 implicit rules to allow access
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 20489894
JBuddy,

  Isn't it after looking at my first post you realized that you need to have allow access in your access-list? Why are you closing the question like this?

Cheers,
Rajesh
0
 
LVL 1

Expert Comment

by:modus_operandi
ID: 20517467
Closed, 500 points refunded.
modus_operandi
EE Moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now