cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
487
Views
6
Helpful
6
Replies

DMZ Question

agoodwin
Level 1
Level 1

Hi all,

Csn someone give me some advice please. What I am trying to achieve is:

1- a dmz with internet access

2- outside access to dmz for www from any

3- access from inside host to dmz for smtp and 1433

4- access for requests from dmz to inside host from smtp and 1433

my basic config is:

hostname firewall

domain-name domain.local

nameif e0 outside sec0

nameif e1 inside sec100

nameif e2 dmz sec50

int e0 100full

int e1 100baset

int e2 100full

ip address inside 10.171.92.5 255.255.255.0

ip address outside 62.x.x.1 255.255.255.252

ip address dmz 192.168.200.1 255.255.255.252

route outside 0 0 62.x.x.2 1

nat (dmz) 1 192.168.200.2 255.255.255.255 0 0

global (outside) 1 interface

static (dmz,outside) tcp 62.x.x.1 www 192.168.200.2 www netmask 255.255.255.255

access-list outside_dmz permit tcp any host 62.x.x.1 eq www

access-group outside_dmz in interface outside

static (inside,outside) tcp 192.168.200.2 25 10.171.92.3 25 netmask 255.255.255.255

static (inside,outside) tcp 192.168.200.2 1433 10.171.92.4 1433 netmask 255.255.255.255

access-list dmz_inside permit tcp any host 10.171.92.3 eq smtp

access-list dmz_inside permit tcp any host 10.171.92.3 eq 1433

access-group dmz_inside in interface inside

--------------------------

Can anyone tell me if I have this correct. I seem to be getting confused as to where I place the access-group command. Is it on the inside interface?

Many thanks for your time

Andy

6 Replies 6

nihal.akbulut
Level 1
Level 1

hi,

for your scenario 1;

if you mean to allow access from dmz to outside, it seems ok.

for scenario 2;

it seems ok.

for scenario 3;

you have use a nat statement like you did for nat(dmz) and also a global. or you if you don't want to nat you can use "nat(inside) 0 0" to disable nat.

for scenario 4;

your static statements must be like that "static (inside,dmz)" and you have to apply the dmz_inside to dmz interface instead of inside. and I couln't understand that why you made the second static for 10.171.92.4. will it be 10.171.92.3? if your's true it must be allowed in the access-list, too.

hope this helps..

Hi,

Thanks for the reply.

3 - If I apply an access list to the dmz interface what do I need to have? I tried this allowing accesslist to dmz for 25 and 1433 but this just stopped internet access by blocking dns etc

4 - I made a mistake the statics should be the same sorry.

I think the problem I am seeing is that im not sure how to setup the access from dmz to inside. If create statics for the internal server ip to the dmz server ip for the two ports then create an acl that allows just those ports then this acl blocks the traffic to the internet. How do I set this up?

thanks again

Andy

yes Andy, sorry I missed that. I think you have to add a new line to access-list dmz_inside. Because of the implicit deny statement at the end of the access-list your web server can't access to outside. So, if you append a statement that permits your webserver to outside, it will be ok.

can you try and let me know?

I think he is right. You will have to include the line in your outside_dmz access list in your dmz_inside access list, then apply the dmz_inside access list to your DMZ interface. Remember the name 'dmz_inside' is *only* a name, it's not instructing the access-list to only perform functions going to the inside from the dmz, it applies it to the entire interface regardless of where the traffic goes to. Also remember you dont need anything permitting access from the inside to the dmz because higher to lower communication is permitted, and the inside is "higher" than the dmz interface, but you do need to allow the dmz through to the inside. Sometimes it gets to be a pain to make sure you have multiple acl's correctly entered. You can always just use a conduit command to allow specific traffic from the dmz to the inside, that's what I do when I have very long acl's and acl's on multiple interfaces...even though I think Cisco doesnt recommend that you use conduits and acl's together it works for me, and I know a lot of engineers who do the same. Hope that helps.

Hi,

I have changed by config as below. Im not sure on setting up conduits so would prefer acl's. Even with whats below I still get deny messages when trying to access the internet from the dmz when the dmz_int acl is applied. I thought a higher (dmz) to lower (outside) was allowed anyway? I think most of it is correct but I can't reason why I get the deny statements now.

Thanks for your help guys I appreciate it.

Andy

hostname firewall

domain-name domain.local

nameif e0 outside sec0

nameif e1 inside sec100

nameif e2 dmz sec50

int e0 100full

int e1 100baset

int e2 100full

ip address inside 10.171.92.5 255.255.255.0

ip address outside x.x.x.1 255.255.255.252

ip address dmz 192.168.200.1 255.255.255.252

route outside 0 0 x.x.x.2 1

nat (dmz) 1 192.168.200.2 255.255.255.255 0 0

global (outside) 1 interface

nat (inside) 2 10.171.92.3 255.255.255.255

global (dmz) 2 interface

static (dmz,outside) tcp x.x.x.1 www 192.168.200.2 www netmask 255.255.255.255

access-list outside_int permit tcp any host x.x.x.1 eq www

access-group outside_int in interface outside

static (inside,dmz) tcp 192.168.200.2 25 10.171.92.3 25 netmask 255.255.255.255

static (inside,dmz) tcp 192.168.200.2 1433 10.171.92.3 1433 netmask 255.255.255.255

access-list dmz_int permit tcp host 192.168.200.2 host 10.171.92.3 eq smtp

access-list dmz_int permit tcp host 192.168.200.2 host 10.171.92.3 eq 1433

access-list dmz_int permit tcp interface dmz interface outside

access-list dmz_int permit udp interface dmz interface outside

access-group dmz_int in interface dmz

I have got it sorted. In the end I spoke to TAC and I realise now where I was going wrong.

I didn't understand that I needed to allow the server in the dmz an acl so it would access the dmz interface then the statics would take over.

Thanks for your time again

Andy

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: