• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 650
  • Last Modified:

Cisco ASA - DMZ to LAN Communication Help

Hi All,

Basically I am trying to lockdown the communications between the DMZ and the LAN but am having some issues and wondered if you could help me.

I added this Config, and basically want I wanted to achieve was only allowing server “marshal01” to talk to server “lemsip” via smtp and server “exch01” via smtp, http & https

object-group service DM_INLINE_TCP_2 tcp
port-object eq www
port-object eq https
port-object eq smtp

object-group network Private_Subnets
 network-object Private_10 255.0.0.0
 network-object Private_172 255.255.0.0
 network-object Private_192 255.255.0.0

access-list dmz_access_inside extended permit icmp any any
access-list dmz_access_inside extended permit tcp any any eq domain
access-list dmz_access_inside extended permit udp any any eq domain
access-list dmz_access_inside extended permit ip host marshal01 any
access-list dmz_access_inside extended permit tcp host marshal01 host exch01 object-group DM_INLINE_TCP_2
access-list dmz_access_inside extended permit tcp host marshal01 host lemsip eq smtp
access-list dmz_access_inside extended deny ip any object-group Private_Subnets

But now the server can get to the internet and also anything on the lan as well.

How can I prevent this getting to anything on the lan apart from what I have allowed?

Thanks

Paul
0
essexboy80
Asked:
essexboy80
  • 3
  • 2
1 Solution
 
JFrederick29Commented:
>access-list dmz_access_inside extended permit ip host marshal01 any

This rule allows full access.  Remove it to restrict access to the other rules.  If you want it to have access to the Internet (but not the LAN), add that statement to the bottom of the ACL, under the deny to private LAN networks.
0
 
essexboy80Author Commented:
understood and working now thanks.

just to confirm my config is now

access-list dmz_access_inside extended permit tcp host marshal01 host exch01 object-group DM_INLINE_TCP_2
access-list dmz_access_inside extended permit tcp host marshal01 host lemsip eq smtp
access-list dmz_access_inside extended deny ip any object-group Private_Subnets
access-list dmz_access_inside extended permit ip host marshal01 any

but how come the internet rule works when it is below the deny?
0
 
JFrederick29Commented:
Because you are only denying the server to the "Private_Subnets" networks and not the Internet.

if you denied "ip any any" then Internet would not work.
0
 
essexboy80Author Commented:
All Sorted thanks guys
0
 
JFrederick29Commented:
Glad to hear.  Can you accept an answer.
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now