jrmann1999
Technical User
I have an ASA 5520, need some advise.
Three interfaces are setup, inside, DMZ, and outside.
The three above have the following security(in order) 100, 50, 0
As I understand it, inside can talk to all interfaces without any ACL logic(yes I have the option enabled for same level traffic).
I'm trying to have a host on inside(192.168.1.0/24, 192.168.1.117 specifically) contact a host on DMZ(10.10.0.0/24, 10.10.0.10 specifically) and everything times out. If I explicitly enable an ACL allowing 10.10.0.10 to contact 192.168.1.117 it works great, but I thought the ASA would sense that it's return traffic and allow it without any ACL logic.
Specifically I'm trying to ping, and ssh, from internal to the DMZ.
Any ACL logic would help a ton.
Similar scenario when DMZ tries to talk to outside. Nothing happens when traffic originates in DMZ unless I explicitly allow outside to talk to DMZ in an ACL, the return traffic appears dropped.
Thanks.
Three interfaces are setup, inside, DMZ, and outside.
The three above have the following security(in order) 100, 50, 0
As I understand it, inside can talk to all interfaces without any ACL logic(yes I have the option enabled for same level traffic).
I'm trying to have a host on inside(192.168.1.0/24, 192.168.1.117 specifically) contact a host on DMZ(10.10.0.0/24, 10.10.0.10 specifically) and everything times out. If I explicitly enable an ACL allowing 10.10.0.10 to contact 192.168.1.117 it works great, but I thought the ASA would sense that it's return traffic and allow it without any ACL logic.
Specifically I'm trying to ping, and ssh, from internal to the DMZ.
Any ACL logic would help a ton.
Similar scenario when DMZ tries to talk to outside. Nothing happens when traffic originates in DMZ unless I explicitly allow outside to talk to DMZ in an ACL, the return traffic appears dropped.
Thanks.