Cisco SA520-K9 Administration Guide - Page 115

Allowing Inbound Traffic to a Web Server Using a Specified Public IP, Address

Page 115 highlights

Firewall Configuration Firewall Rule Configuration Examples 4 Allowing Inbound Traffic to a Web Server Using a Specified Public IP Address Situation: You host a public web server on your local DMZ network. You want to allow inbound HTTP requests from any outside IP address. Your ISP has provided a static IP address that you want to expose to the public as your web server address. Solution: Add the static IP address (provided by the ISP), to the WAN interface as an alias and create an inbound rule as For information about configuring aliases, see Configuring IP Aliases for WAN interfaces, page 106. Parameter From Zone To Zone Service Action Source Hosts Internal IP Address External IP Address Value Insecure (WAN1) DMZ HTTP ALLOW always Any 192.168.5.2 Dedicated WAN-209.165.201.225 Allowing Inbound Traffic from Specified Range of Outside Hosts Situation: You want to allow incoming video conferencing to be initiated from a restricted range of outside IP addresses (132.177.88.2 - 132.177.88.254). Solution: Create an inbound rule as shown below. In the example, connections for CU-SeeMe (an Internet video-conferencing client) are allowed only from a specified range of external IP addresses. Parameter From Zone To Zone Service Value INSECURE (Dedicated WAN/Optional WAN) Secure (LAN) CU-SEEME:UDP Cisco SA500 Series Security Appliances Administration Guide 115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Firewall Rule Configuration Examples
Cisco SA500 Series Security Appliances Administration Guide
115
4
Allowing Inbound Traffic to a Web Server Using a Specified Public IP
Address
Situation:
You host a public web server on your local DMZ network. You want to
allow inbound HTTP requests from any outside IP address. Your ISP has provided
a static IP address that you want to expose to the public as your web server
address.
Solution:
Add the static IP address (provided by the ISP), to the WAN interface as
an alias and create an inbound rule as For information about configuring aliases,
see
Configuring IP Aliases for WAN interfaces, page 106
.
Allowing Inbound Traffic from Specified Range of Outside Hosts
Situation:
You want to allow incoming video conferencing to be initiated from a
restricted range of outside IP addresses (132.177.88.2 - 132.177.88.254).
Solution:
Create an inbound rule as shown below. In the example, connections for
CU-SeeMe (an Internet video-conferencing client) are allowed only from a
specified range of external IP addresses.
Parameter
Value
From Zone
Insecure (WAN1)
To Zone
DMZ
Service
HTTP
Action
ALLOW always
Source Hosts
Any
Internal IP Address
192.168.5.2
External IP Address
Dedicated WAN-209.165.201.225
Parameter
Value
From Zone
INSECURE (Dedicated WAN/Optional WAN)
To Zone
Secure (LAN)
Service
CU-SEEME:UDP