open translated IP from the inside

Unanswered Question
Jul 6th, 2010

we have a ASA5500 with 3 interfaces : outside, dmz, inside

we have a number of static nats translating a given public IP to a dmz servers and that all works fine.  However for testing purposes, we need to be able to access the public IP from the inside interface.

I tried the following but that did not work:

static (inside,inside) <public_IP> <dmz_IP> netmask

what translation is missing to allow users from the inside to access the public ip address?

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Marcin Latosiewicz Tue, 07/06/2010 - 06:53

I would start with

static (dmz,inside) netmask

enable logging on informational level from and test.

After test do "show logg | i IP.address"


Nagaraja Thanthry Tue, 07/06/2010 - 07:09


As Marcin said, you need to configure the static with "static (DMZ,inside) " format. Also, ensure that there is NAT translation between the inside and the DMZ. It could be identity NAT or dynamic PAT.

static (inside,DMZ) netmask


access-list nonat permit ip

nat (inside) 0 access-list nonat


global (dmz) 1 interface

nat (inside) 1

This will ensure that all traffic from inside (higher security) is going to DMZ with proper NAT translations.

Hope this helps.

ronshuster Tue, 07/06/2010 - 07:32

So which one is it?

Marcin says:

static (dmz,inside) netmask

Nagaraja says:

static (inside,DMZ) netmask

and what is the logic behind this?

Marcin Latosiewicz Tue, 07/06/2010 - 07:34

We're not contadicting each other. :-)

You need to make sure that servers from DMZ to inside are translated (what I was going for).

But at the same time, it's  best to NAT inside users to somethin on DMZ. Be it identity or PAT.

Nagaraja Thanthry Tue, 07/06/2010 - 08:11

You need both of them for proper communication between the interfaces i.e. inside and DMZ. As Marcin said, one will ensure that when your inside hosts try to access the public IP of the DMZ server, it gets translated to corresponding DMZ IP. Other one is needed to satisfy the firewall requirement i.e. NAT rules are needed when you go from higher security interface (inside) to a lower security interface (DMZ).

Hope this helps.

ronshuster Tue, 07/06/2010 - 08:43

I have added the following 2 lines to the firewall:

static (dmz,inside) netmask

The users on the inside are\8

static (inside,dmz) netmask

This is the translation from the was there before

static (dmz,outside) netmask

I am still unable to access the public address from the inside or from the dmz

Nagaraja Thanthry Tue, 07/06/2010 - 08:49

Do you have any nonat or identity NAT configurations from DMZ to inside? It would look like:

nat (DMZ) 0 access-list


static (DMZ,inside) 192.168.1.x 192.168.1.x netmask

If you have these, that could be the reason you are not able to access. Please modify the configuration so that there is no identity nat from DMZ to inside.

Hope this helps.


This Discussion