ASA 5505 DMZ clients can't connect to the Internet
I have been wracking my brain for hours with this. I have tried allowing all ip from this interface but nothing seems to work. Can someone please review the below config and give me an idea of what I could be doing wrong?
Cisco Adaptive Security Appliance Software Version 8.2(1)
Device Manager Version 6.2(1)
enable password 5/kJOuby0Z8 encrypted
passwd 2KFQnb2KYOU encrypted
name 192.168.1.100 TT01 description Old Server
name 192.168.1.10 TT02 description New Server
ip address 192.168.1.1 255.255.255.0
ip address 126.96.36.199 255.255.255.248
ip address 192.168.10.1 255.255.255.0
switchport access vlan 2
switchport access vlan 10
description Trunk port for Cisco AP
switchport trunk allowed vlan 1,10
switchport trunk native vlan 1
switchport mode trunk
ftp mode passive
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
object-group service RDP tcp-udp
port-object eq 3389
object-group protocol TCPUDP
object-group service NATRDP
service-object tcp range 9998 9999
object-group service DM_INLINE_SERVICE_1
service-object tcp eq www
access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any host 188.8.131.52
access-list inside_access_in extended permit ip any any
access-list Split_Tunnel_List standard permit 192.168.1.0 255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu DMZ 1500
ip local pool VPN_Pool 192.168.2.200-192.168.2.231 mask 255.255.255.0
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...