<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 Firewall configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789183#M1000789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the link. Now i am able to access the internet from inside (192.168.3.0 network) via Broadband on the outside (192.168.1.0 network). I have also connected our intranet server to the DMZ (10.162.1.0 network) and i am able to access it from the inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now i want to access the DMZ server from the outside. Is it possible? I was unable to add a NATing rule for a host on the outside so that it can access the DMZ. If I happen to select "outside" for my "Source Network", automatically the "dmz" option in the "Translate Address on Interface" dropdown box disappears.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to go about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Siddhartha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2007 06:52:49 GMT</pubDate>
    <dc:creator>ansuman07</dc:creator>
    <dc:date>2007-08-20T06:52:49Z</dc:date>
    <item>
      <title>ASA 5510 Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789181#M1000787</link>
      <description>&lt;P&gt;Hi! Greetings to all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco ASA 5510. I need help with the basic configurations. I have a DSL Internet connections connected to the outside (Ethernet0/0) and my office network connected to the inside (Eth 0/1). I will require a DMZ interface later. Do i need an additional router? Do i need to have a static public IP? And do i need to use ip_packet_forwarding here? Can anyone give me some basic guidance and help setup this unit.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789181#M1000787</guid>
      <dc:creator>ansuman07</dc:creator>
      <dc:date>2019-03-11T10:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789182#M1000788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Do i need an addtional router". Depends where you mean. Between your DSL and ASA no you don't. On the inside of your ASA - it really depends on how many subnets you have inside. If you only have one then no you don't need to worry about a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public IP - yes it would certainly help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip_packet_forwarding - on which device ? The Asa will forward packets between interfaces providing you have the right NAT/access-lists in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;attached is a link to the config guide for ASA v7.2. Start with this and please come back if you need further assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/intro.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/intro.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 11:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789182#M1000788</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-16T11:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Firewall configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789183#M1000789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the link. Now i am able to access the internet from inside (192.168.3.0 network) via Broadband on the outside (192.168.1.0 network). I have also connected our intranet server to the DMZ (10.162.1.0 network) and i am able to access it from the inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now i want to access the DMZ server from the outside. Is it possible? I was unable to add a NATing rule for a host on the outside so that it can access the DMZ. If I happen to select "outside" for my "Source Network", automatically the "dmz" option in the "Translate Address on Interface" dropdown box disappears.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to go about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Siddhartha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2007 06:52:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-firewall-configuration/m-p/789183#M1000789</guid>
      <dc:creator>ansuman07</dc:creator>
      <dc:date>2007-08-20T06:52:49Z</dc:date>
    </item>
  </channel>
</rss>

