Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 755
  • Last Modified:

Cisco ASA ACL

I have some "Internal" servers 192.x.x.x trying to telnet to a "DMZ" server 172.x.x.x on port 27000 and connection keeps failing. What access list rule via ASDM or CLI should I insert to get this working.
0
solarisjunkie
Asked:
solarisjunkie
  • 3
1 Solution
 
slamjam2000Commented:
!(Inside server)192.168.1.10 --> 172.20.1.20 (DMZ server)

!defining acl with interface

access-group DMZtoInside in interface DMZ
access-group InsidetoDMZ in interface inside


!example of static NAT

static (inside,DMZ) 172.20.1.5 192.168.2.20 netmask 255.255.255.255

!DMZ back to Inside server
access-list DMZtoInside permit tcp host 172.20.1.20 host 172.20.1.5 eq 27000

!inside server access to DMZ
access-list InsidetoDMZ permit tcp host 192.168.1.10 host 192.168.2.20 eq 27000
0
 
slamjam2000Commented:
Oop... I missed something on my last post.. sorry...  here it is..

!Example Path: (Inside server)192.168.1.10 --> 172.20.1.20 (DMZ server)

!defining acl with interface
access-group DMZtoInside in interface DMZ
access-group InsidetoDMZ in interface inside


!example of static NAT

static (inside,DMZ) 172.20.1.5 192.168.1.10 netmask 255.255.255.255
static (DMZ,inside) 192.168.1.20 172.20.1.20 netmask 255.255.255.255


!inside server access to DMZ
access-list InsidetoDMZ permit tcp host 192.168.1.10 host 192.168.2.20 eq 27000

!DMZ back to Inside server
access-list DMZtoInside permit tcp host 172.20.1.20 host 172.20.1.5 eq 27000

0
 
solarisjunkieAuthor Commented:
If the internal servers are a subnet 192.x.x.0/24 how do I
adjust the ACL accordingly
0
 
slamjam2000Commented:
You will need to adjust both the NAT and ACL to the /24 subnet for both DMZ and Inside.

0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now