Cisco 5510 Getting Started Guide - Page 89

An Inside User Visits a Web Server on the DMZ, server are handled as follows

Page 89 highlights

Chapter 8 Scenario: DMZ Configuration Example DMZ Network Topology Figure 8-4 An Inside User Visits a Web Server on the DMZ www.example.com Internet Public IP Address 209.165.200.225 (outside interface) Inside interface 192.168.1.1 Inside DMZ interface 10.30.30.1 DMZ 191801 User 192.168.1.2 Web Server Private IP Address: 10.30.30.30 Public IP Address: 209.165.200.225 In Figure 8-4, the adaptive security appliance permits HTTP traffic originating from inside clients and destined for the DMZ web server. Because the internal network does not include a DNS server, internal client requests for the DMZ web server are handled as follows: 1. A lookup request is sent to the DNS server of the ISP. The public IP address of the DMZ web server is returned to the client. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 8-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

8-7
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 8
Scenario: DMZ Configuration
Example DMZ Network Topology
Figure 8-4
An Inside User Visits a Web Server on the DMZ
In
Figure 8-4
, the adaptive security appliance permits HTTP traffic originating
from inside clients and destined for the DMZ web server. Because the internal
network does not include a DNS server, internal client requests for the DMZ web
server are handled as follows:
1.
A lookup request is sent to the DNS server of the ISP. The public IP address
of the DMZ web server is returned to the client.
User
192.168.1.2
Inside
DMZ
191801
www.example.com
Internet
Public IP Address
209.165.200.225
(outside interface)
Inside interface
192.168.1.1
DMZ interface
10.30.30.1
Web Server
Private IP Address: 10.30.30.30
Public IP Address: 209.165.200.225