DMZ to inside ASA 8.4/ASDM 6.4

Unanswered Question
May 22nd, 2012

Hello guys,

This is my first post so please forgive me if this has already been answered in the forum.

I have a standard ASA 5505 with inside, dmz and outside with the default security levels, 100/50/0. we have an email server inside which has been NATed and is working fine. However users accessing the wireless on the dmz are unable to access their emails on https (443). How do I allow SSL access ONLY to users on the dmz using ASA 8.4 commands or ADSM 6.4?

Many thanks for any help.


I have this problem too.
0 votes
  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (1 ratings)
slipperzoom Tue, 05/22/2012 - 12:12

Thanks for your reply siddhartham. The wireless users are in the DMZ zone.

Julio Carvajal Tue, 05/22/2012 - 10:29


you will need to allow that traffic into the DMZ access-list

access-list dmz permit tcp x.x.x.x (dmz subnet) host (inside email server) eq 443

access-list dmz permit tcp x.x.x.x (dmz subnet) host (inside email server) eq 25

access-group dmz in interface dmz


DO rate all the helpful posts


slipperzoom Tue, 05/22/2012 - 12:15

Thanks for your reply. I will try this later but I'm not sure that I can achieve this with an access-list only. I'll post details later.

Julio Carvajal Tue, 05/22/2012 - 12:21


As you asked just for an ACL, I thought you already had the NAT.

Lets say the ip address of the Inside server is and the DMZ subnet is

You want to nat the Inside server on the DMZ to

Here is what you need

object network Inside_server


object network DMZ_Server_global


nat (inside,dmz) source static  Inside_server  DMZ_Server_global

access-list dmz permit tcp x.x.x.x (dmz subnet) host (inside email server) eq 443

access-list dmz permit tcp x.x.x.x (dmz subnet) host (inside email server) eq 25

Do rate all the helpful posts!!

slipperzoom Wed, 05/23/2012 - 02:44

Many thanks jcarvaja for the update. I'll test this out tonight and post details.

Best regards,


Julio Carvajal Wed, 05/23/2012 - 09:16

Hello Eric,

My pleasure, I will be more than glad to help.


Do rate all the helpful posts

slipperzoom Wed, 06/06/2012 - 07:50

Hi jcarvaja,

Thanks again but your suggested solution does not appear to work.

Just to clarify:

1. We do not have any servers on the dmz network. All we use that for is allow connections from smart phones through a wireless access point out to the internet.

2. The smartphones are able to access the internet but cannot access the public address of the Exchange server. We need to be able to allow ssl access only (from all mobile devices on the dmz) to the exchange public interface.

Found the following link which highlights a similar scenario but I'm not sure if the commands will work for ASA 8.4

.. appreciate any further help.


nkarthikeyan Wed, 06/06/2012 - 09:20

Hi Eric,

First thing u may need to have an acl created for dmz zone to permit https from dmz zone subnet to email server.

Also you need to check on the routing if any infra present in the inside zone.

access-list permit tcp host eq https

access-list deny ip any any

Check if there is any hits when you try to access web mail through mobiles. If hits present for that... then you may need to check on the routing and other stuffs related to dmz.

Please let me know if this helps...

leeswc Wed, 02/13/2013 - 12:28

Greetings All,

Did a search on Google for a problem that sounds much like this one and found this thread. Did the above fix the problem? I'm not quite clear where the ACL was applied if the public addresses are not on an interface. I have the same situation; public IPs are defined in the NAT rules, but not associated with an interface. Thanks.


This Discussion

Related Content