Cisco 5510 Getting Started Guide - Page 87

An Outside User Visits the DMZ Web Server

Page 87 highlights

Chapter 8 Scenario: DMZ Configuration Example DMZ Network Topology Figure 8-3 An Outside User Visits the DMZ Web Server www.example.com Internet Inside interface 192.168.1.1 Public IP Address 209.165.200.225 (outside interface) Destination Address Translation 209.165.200.225 10.30.30.30 DMZ interface 10.30.30.1 Inside DMZ 191800 User 192.168.1.2 Web Server Private IP Address: 10.30.30.30 Public IP Address: 209.165.200.225 When a user on the Internet requests an HTTP page from the DMZ web server, traffic flows through the adaptive security appliance as follows: 1. A user on the outside network requests a web page from the DMZ web server using the public IP address of the adaptive security appliance (209.165.200.225, the IP address of the outside interface). 2. The adaptive security appliance receives the packet and, because it is a new session, verifies that the packet is allowed. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 8-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

8-5
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 8
Scenario: DMZ Configuration
Example DMZ Network Topology
Figure 8-3
An Outside User Visits the DMZ Web Server
When a user on the Internet requests an HTTP page from the DMZ web server,
traffic flows through the adaptive security appliance as follows:
1.
A user on the outside network requests a web page from the DMZ web server
using the public IP address of the adaptive security appliance
(209.165.200.225, the IP address of the outside interface).
2.
The adaptive security appliance receives the packet and, because it is a new
session, verifies that the packet is allowed.
U
s
er
192.16
8
.1.2
In
s
ide
DMZ
191
8
00
www.ex
a
mple.com
Internet
P
ub
lic IP Addre
ss
209.165.200.225
(o
u
t
s
ide interf
a
ce)
In
s
ide interf
a
ce
192.16
8
.1.1
DMZ interf
a
ce
10.
3
0.
3
0.1
We
b
S
erver
Priv
a
te IP Addre
ss
: 10.
3
0.
3
0.
3
0
P
ub
lic IP Addre
ss
: 209.165.200.225
De
s
tin
a
tion Addre
ss
Tr
a
n
s
l
a
tion
209.165.200.225
10.
3
0.
3
0.
3
0