I am trying to configure a cisco ASA 5510 with 2 different DMZ interfaces.
Outside interface is security lvl 0, inside is security lvl 100 and the 2 DMZ interfaces are security lvl 50.
I have 1 public ip range that I route with static NAT rules to the hosts in the different DMZ interfaces.
Whenever I open a tcp or udp port to 1 of the public ip adresses on the outside interface, it is not working. Traffic from outside is still blocked by th ACL on the outside interface unless I change the rule to protocol ip instead of tcp or udp. If I permit IP any any everything works, but that I do not wanna do....
Anyone has any idea on how to setup the configuration of a asa with more than 1 DMZ interfaces?
Outside interface is security lvl 0, inside is security lvl 100 and the 2 DMZ interfaces are security lvl 50.
I have 1 public ip range that I route with static NAT rules to the hosts in the different DMZ interfaces.
Whenever I open a tcp or udp port to 1 of the public ip adresses on the outside interface, it is not working. Traffic from outside is still blocked by th ACL on the outside interface unless I change the rule to protocol ip instead of tcp or udp. If I permit IP any any everything works, but that I do not wanna do....
Anyone has any idea on how to setup the configuration of a asa with more than 1 DMZ interfaces?