Cisco 5510 Getting Started Guide - Page 92

Information to Have Available, Enabling Inside Clients to Communicate with Devices on the Internet

Page 92 highlights

Configuring the Adaptive Security Appliance for a DMZ Deployment Chapter 8 Scenario: DMZ Configuration Information to Have Available Before you begin this configuration procedure, gather the following information: • Internal IP address of the server inside the DMZ that you want to make available to clients on the public network (in this scenario, a web server). • Public IP addresses to be used for servers inside the DMZ. (Clients on the public network will use the public IP address to access the server inside the DMZ.) • Client IP address to substitute for internal IP addresses in outgoing traffic (in this scenario the IP address of the outside interface). Outgoing client traffic will appear to come from this address so that the internal IP address is not exposed. Enabling Inside Clients to Communicate with Devices on the Internet To permit internal clients to request content from devices on the Internet, the adaptive security appliance translates the real IP addresses of internal clients to the external address of the outside interface (that is, the public IP address of the adaptive security appliance). Outgoing traffic appears to come from this address. Enabling Inside Clients to Communicate with the DMZ Web Server In this procedure, you configure the adaptive security appliance to allow internal clients to communicate securely with the web server in the DMZ. To accomplish this, you must configure a translation rule. Configure a NAT rule between the DMZ and inside interfaces that translates the real IP address of the DMZ web server to its public IP address (10.30.30.30 to 209.165.200.225). This is necessary because when an internal client sends a DNS lookup request, the DNS server returns the public IP address of the DMZ web server. 8-10 Cisco ASA 5500 Series Getting Started Guide 78-19186-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

Chapter 8
Scenario: DMZ Configuration
Configuring the Adaptive Security Appliance for a DMZ Deployment
8-10
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Information to Have Available
Before you begin this configuration procedure, gather the following information:
Internal IP address of the server inside the DMZ that you want to make
available to clients on the public network (in this scenario, a web server).
Public IP addresses to be used for servers inside the DMZ. (Clients on the
public network will use the public IP address to access the server inside the
DMZ.)
Client IP address to substitute for internal IP addresses in outgoing traffic (in
this scenario the IP address of the outside interface). Outgoing client traffic
will appear to come from this address so that the internal IP address is not
exposed.
Enabling Inside Clients to Communicate with Devices on the
Internet
To permit internal clients to request content from devices on the Internet, the
adaptive security appliance translates the real IP addresses of internal clients to
the external address of the outside interface (that is, the public IP address of the
adaptive security appliance). Outgoing traffic appears to come from this address.
Enabling Inside Clients to Communicate with the DMZ Web
Server
In this procedure, you configure the adaptive security appliance to allow internal
clients to communicate securely with the web server in the DMZ. To accomplish
this, you must configure a translation rule.
Configure a NAT rule between the DMZ and inside interfaces that translates the
real IP address of the DMZ web server to its public IP address (10.30.30.30 to
209.165.200.225).
This is necessary because when an internal client sends a DNS lookup request, the
DNS server returns the public IP address of the DMZ web server.