mikearama wrote: » Based on that, I currently have specific rules for the DMZ interfaces to allow hosts to reach the inside networks, and a "permit ip any any" for those same DMZ hosts to reach the internet. Well that's dumb... a bunch of specific rules followed by a "permit any any". Why even have the specific rules at all if I'm just going to follow it all with a "permit any any"! There's got to be a better solution that that, no?
bighornsheep wrote: » Is the ASA the only routing device on DMZ/inside? You can use a router or another ASA/PIX with interfaces on the DMZ/inside as the default gateway to control the interior traffic, and only route to the perimeter ASA for Internet traffic.
bighornsheep wrote: » What I would do is permit the specific service to the host in the inside network, but followed by a deny ip inside_subnet inside_subnet_mask statement, followed by your permit ip any any for the Internet.
mikearama wrote: » Ah, now that I like. Good thinking. I'll play with this in the lab and see how it plays out.
bighornsheep wrote: » Geez, you're hard to please.....
Ahriakin wrote: Nail...Head....Hit