Cisco 5510 Getting Started Guide - Page 91

Configuration Requirements - asa & static outside in

Page 91 highlights

Chapter 8 Scenario: DMZ Configuration Configuring the Adaptive Security Appliance for a DMZ Deployment • Enabling Inside Clients to Communicate with Devices on the Internet, page 8-10 • Enabling Inside Clients to Communicate with the DMZ Web Server, page 8-10 • Configuring Static PAT for Public Access to the DMZ Web Server (Port Forwarding), page 8-17 • Providing Public HTTP Access to the DMZ Web Server, page 8-20 The remainder of this chapter provides instructions for how to implement this configuration. Configuration Requirements This DMZ deployment of the adaptive security appliance requires configuration rules as follows. So That... Create These Rules... Internal clients can request information from web servers on the Internet The adaptive security appliance comes with a default configuration that permits inside clients access to devices on the Internet. No additional configuration is required. Internal clients can • A NAT rule between the DMZ and inside interfaces that translates the request information from real IP address of the DMZ web server to its public IP address the DMZ web server (10.30.30.30 to 209.165.200.225). • A NAT rule between the inside and DMZ interfaces that translates the real addresses of the internal client network. In this scenario, the real IP address of the internal network is "translated" to itself, that is, the real IP address of the internal network is used when internal clients communicate with the DMZ web server (10.30.30.30). External clients can • An address translation rule between the outside and DMZ interfaces request information from that translates the public IP address of the DMZ web server to its private the DMZ web server IP address (209.165.200.225 to 10.30.30.30). • An access control rule permitting incoming HTTP traffic that is destined for the DMZ web server. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 8-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

8-9
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 8
Scenario: DMZ Configuration
Configuring the Adaptive Security Appliance for a DMZ Deployment
Enabling Inside Clients to Communicate with Devices on the Internet,
page 8-10
Enabling Inside Clients to Communicate with the DMZ Web Server,
page 8-10
Configuring Static PAT for Public Access to the DMZ Web Server (Port
Forwarding), page 8-17
Providing Public HTTP Access to the DMZ Web Server, page 8-20
The remainder of this chapter provides instructions for how to implement this
configuration.
Configuration Requirements
This DMZ deployment of the adaptive security appliance requires configuration
rules as follows.
So That...
Create These Rules...
Internal clients can
request information from
web servers on the
Internet
The adaptive security appliance comes with a default configuration that
permits inside clients access to devices on the Internet. No additional
configuration is required.
Internal clients can
request information from
the DMZ web server
A NAT rule between the DMZ and inside interfaces that translates the
real IP address of the DMZ web server to its public IP address
(10.30.30.30 to 209.165.200.225).
A NAT rule between the inside and DMZ interfaces that translates the
real addresses of the internal client network. In this scenario, the real
IP address of the internal network is “translated” to itself, that is, the
real IP address of the internal network is used when internal clients
communicate with the DMZ web server (10.30.30.30).
External clients can
request information from
the DMZ web server
An address translation rule between the outside and DMZ interfaces
that translates the public IP address of the DMZ web server to its private
IP address (209.165.200.225 to 10.30.30.30).
An access control rule permitting incoming HTTP traffic that is
destined for the DMZ web server.