am trying to get a DMZ configured . I have allowed the interesting traffic to go from the Inside inteface to the DMZ and vice versa but its still being dropped.
When I do a packet trace it tells me the Implicit deny ACL rule is the cause of my problems but there are rules above it that match my traffic. So I am confused I dont know if there something I am missing.
I have permitted any any for troublehooting purposes but still no dice.
I would suggest starting over again with those acl's.
To get traffic from inside to dmz you do not need an acl at all.
To get traffic from the dmz to the inside, write an acl and apply it with "access-group dmz_access_in in interface dmz". For ex, to allow a host on dmz to hit a host on the inside on port 80, it would look like this...
For getting PING to work, you should permit the icmp traffic either by ACL or by policy inspections.
Here is the icmp inspection
access-list youracl permit icmp source destination (you can type any to source and any to destinatin temporarily during troubleshooting and it will allow all icmp traffic. You should do it in bot dmz and inside acls)
Thanks for your help guys you were very helpful I finally got it right and apparently the server guy forgot to enable RDP so I was pulling my hair out wondering what was wrong. It doesn't help that I am doing this remotely.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...