Cisco 5510 Getting Started Guide - Page 84

Network Layout for DMZ Configuration Scenario

Page 84 highlights

Example DMZ Network Topology Chapter 8 Scenario: DMZ Configuration Figure 8-1 Network Layout for DMZ Configuration Scenario www.example.com Internet Public IP Address 209.165.200.225 (outside interface) Inside interface 192.168.1.1 Inside DMZ interface 10.30.30.1 DMZ 191634 User 192.168.1.2 Web Server Private IP Address: 10.30.30.30 Public IP Address: 209.165.200.225 This example scenario has the following characteristics: • The web server is on the DMZ interface of the adaptive security appliance. • Clients on the inside network can access the web server in the DMZ and can also communicate with devices on the Internet. • Clients on the Internet are permitted HTTP access to the DMZ web server; all other traffic coming from the Internet is denied. • The network has one IP address that is publicly available: the outside interface of the adaptive security appliance (209.165.200.225). This public address is shared by the adaptive security appliance and the DMZ web server. Cisco ASA 5500 Series Getting Started Guide 8-2 78-19186-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Chapter 8
Scenario: DMZ Configuration
Example DMZ Network Topology
8-2
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Figure 8-1
Network Layout for DMZ Configuration Scenario
This example scenario has the following characteristics:
The web server is on the DMZ interface of the adaptive security appliance.
Clients on the inside network can access the web server in the DMZ and can
also communicate with devices on the Internet.
Clients on the Internet are permitted HTTP access to the DMZ web server; all
other traffic coming from the Internet is denied.
The network has one IP address that is publicly available: the outside
interface of the adaptive security appliance (209.165.200.225). This public
address is shared by the adaptive security appliance and the DMZ web server.
User
192.168.1.2
Inside
DMZ
191634
www.example.com
Internet
Public IP Address
209.165.200.225
(outside interface)
Inside interface
192.168.1.1
DMZ interface
10.30.30.1
Web Server
Private IP Address: 10.30.30.30
Public IP Address: 209.165.200.225