<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure DMZ  NAT for web server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289010#M1078324</link>
    <description>&lt;P&gt;I'm not quite sure if the above config will work as private IP address 192.168.1.1 &amp;gt;&amp;gt; can be NAT once outside. I mean I can't see how any websites be accessible from outside.&lt;/P&gt;&lt;P&gt;I'm thinking of what you suggested earlier :&lt;/P&gt;&lt;P&gt;- Website A will be using port 8443 so, NAT will be 192.168.1.1:8443&amp;nbsp; &amp;gt;&amp;gt; 1.1.1.1:443&lt;/P&gt;&lt;P&gt;- Website B will be using port 8444 so, NAT will be 192.168.1.1:8444&amp;nbsp; &amp;gt;&amp;gt; 2.2.2.2:443&lt;/P&gt;&lt;P&gt;-Website C will be using port 8445 so, NAT will be 192.168.1.1:8445&amp;nbsp; &amp;gt;&amp;gt; 3.3.3.3:443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think?&lt;/P&gt;</description>
    <pubDate>Tue, 09 Feb 2021 21:31:20 GMT</pubDate>
    <dc:creator>Ahmad Saad4</dc:creator>
    <dc:date>2021-02-09T21:31:20Z</dc:date>
    <item>
      <title>Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284762#M1078025</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;We've got pair of ASA HA 5525 firewalls (v 9.12) configured with 3 interfaces (Outside,Inside, and DMZ). We would like to configure NAT rules for a window virtual web server (IIS) that will host 3 websites (each website will have&amp;nbsp;public IP address), this server will be located on DMZ, so we want this server to be accessible from the Internet as well as internally (as we would need to copy files to it using ViceVerse application).&amp;nbsp;Currently the server is built and has an IP address on internal server range 192.168.1.0/24, and we will need http &amp;amp; https services to be allowed and accessible from outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question here, what's the best practice/approach to deploy this scenario?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to create one network group for the external IP addresses and another for the Internal? or should I create separate network object for each IP address?&lt;/P&gt;&lt;P&gt;Is it better to create a separate NAT rule for HTTP service and another rule for HTTPS ? or it's alright to combine both services?&lt;/P&gt;&lt;P&gt;Do I need to create ACLs for Inside interface to reach DMZ and vice-versa?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 22:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284762#M1078025</guid>
      <dc:creator>Ahmad Saad4</dc:creator>
      <dc:date>2021-02-02T22:49:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284789#M1078026</link>
      <description>&lt;P&gt;1. Just create a single object for the Web server &amp;amp; NAT the server to a public IP. Typically you will use a spare IP address (in this case I'm using 1.1.1.1) and not the one that is assigned to the OUTSIDE interface of the firewall.&lt;/P&gt;&lt;PRE&gt;object network WebServer
 host 192.168.1.194
nat (DMZ,OUTSIDE) static 1.1.1.1&lt;/PRE&gt;&lt;P&gt;2. You can combine both services into a single rule if you prefer it that way. In the example above, I've done a 1-to-1 translation from the internal IP to a public IP address&lt;/P&gt;&lt;P&gt;3. This depends on your security levels. Assuming the following security levels:&lt;/P&gt;&lt;P&gt;INSIDE = 100&lt;/P&gt;&lt;P&gt;DMZ = 50&lt;/P&gt;&lt;P&gt;OUTSIDE = 0&lt;/P&gt;&lt;P&gt;Because the INSIDE zone has a higher security level than the DMZ, you will not need an ACL to allow traffic to enter the DMZ. Because the OUTSIDE is a lower security level than the DMZ, you will have to create and ACL to allow hosts on the Internet to initiate traffic to the DMZ. This is accomplished with an ACL applied in the inbound direction on the OUTSIDE interface.&lt;/P&gt;&lt;PRE&gt;access-list OUTSIDE-INBOUND extended permit tcp any host 192.168.1.194 eq 80
access-list OUTSIDE-INBOUND extended permit tcp any host 192.168.1.194 eq 443
!
access-group OUTSIDE-INBOUND in interface OUTSIDE&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 14:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284789#M1078026</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-02-03T14:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284976#M1078041</link>
      <description>&lt;P&gt;Thanks Tyson!&lt;/P&gt;&lt;P&gt;The webserver will host 3 websites and each website will have a separate public IP address.&lt;/P&gt;&lt;P&gt;I presume that the NAT rule you created above should be from DMZ to Outside (DMZ,Outside), and not from (Inside,Outside)?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 09:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4284976#M1078041</guid>
      <dc:creator>Ahmad Saad4</dc:creator>
      <dc:date>2021-02-03T09:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4285283#M1078065</link>
      <description>&lt;P&gt;You are correct. My NAT statement meant to use "DMZ" and not "INSIDE". I try to check my work before posting as much as I can but sometimes mistakes get through. I've changed my original post to reflect the correct statement.&lt;/P&gt;&lt;P&gt;As for the web server, since all three websites are being hosted on the same private IP address, they will also be hosted on the same public IP address. There is not a way to NAT based on URL. The only way to change this would be to have 3 separate IIS servers, each running one of the websites.&lt;/P&gt;&lt;P&gt;Now if each of the websites used a different port (say one was TCP/443 only, another was TCP/80 only, and the third was TCP/8443), then we could create a NAT rule mapping a different public IP to each port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 15:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4285283#M1078065</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-02-03T15:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4288946#M1078317</link>
      <description>&lt;P&gt;Thanks Tyson!&lt;/P&gt;&lt;P&gt;In this case I will need to create 3 network objects for the same private web server, and create 3 NAT rules for each network object as follow :&amp;nbsp;WebServer=WebServer2=WebServer3= 192.168.1.194&lt;/P&gt;&lt;PRE&gt;object network WebServer
 host 192.168.1.194
nat (DMZ,OUTSIDE) static 1.1.1.1&lt;/PRE&gt;&lt;PRE&gt;object network WebServer2
 host 192.168.1.194
nat (DMZ,OUTSIDE) static 2.2.2.2&lt;/PRE&gt;&lt;PRE&gt;object network WebServer3
 host 192.168.1.194
nat (DMZ,OUTSIDE) static 3.3.3.3&lt;/PRE&gt;&lt;P&gt;Will I need an ACL to allow traffic from DMZ to Inside network ? as I said that&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;we want this server to be accessible from the Internet as well as internally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 19:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4288946#M1078317</guid>
      <dc:creator>Ahmad Saad4</dc:creator>
      <dc:date>2021-02-09T19:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4288990#M1078322</link>
      <description>&lt;P&gt;What I assume you are trying to do is something like the following:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.mysite.com/finance" target="_blank"&gt;www.mysite.com/finance&lt;/A&gt; accessible on 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.mysite.com/engineering" target="_blank"&gt;www.mysite.com/engineering&lt;/A&gt; acessible on 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.myothersite.com" target="_blank"&gt;www.myothersite.com&lt;/A&gt; accessible on 3.3.3.3&lt;/P&gt;&lt;P&gt;The problem is that there is no way to make each site only accessible on a single public IP address like that. Given your configuration above, you will be able to access all 3 sites from any of those IP addresses. As far as traffic going from the DMZ to the OUTSIDE, how will you dictate which public IP address is used for each website because I'm not aware of anyway to do it.&lt;/P&gt;&lt;P&gt;You will not need an ACL from the DMZ to INSIDE zone. Traffic is initiated by the INSIDE zone which has a higher security level than the DMZ so an ACL is not required.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 20:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4288990#M1078322</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-02-09T20:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289009#M1078323</link>
      <description>&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 21:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289009#M1078323</guid>
      <dc:creator>Ahmad Saad4</dc:creator>
      <dc:date>2021-02-09T21:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289010#M1078324</link>
      <description>&lt;P&gt;I'm not quite sure if the above config will work as private IP address 192.168.1.1 &amp;gt;&amp;gt; can be NAT once outside. I mean I can't see how any websites be accessible from outside.&lt;/P&gt;&lt;P&gt;I'm thinking of what you suggested earlier :&lt;/P&gt;&lt;P&gt;- Website A will be using port 8443 so, NAT will be 192.168.1.1:8443&amp;nbsp; &amp;gt;&amp;gt; 1.1.1.1:443&lt;/P&gt;&lt;P&gt;- Website B will be using port 8444 so, NAT will be 192.168.1.1:8444&amp;nbsp; &amp;gt;&amp;gt; 2.2.2.2:443&lt;/P&gt;&lt;P&gt;-Website C will be using port 8445 so, NAT will be 192.168.1.1:8445&amp;nbsp; &amp;gt;&amp;gt; 3.3.3.3:443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 21:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289010#M1078324</guid>
      <dc:creator>Ahmad Saad4</dc:creator>
      <dc:date>2021-02-09T21:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configure DMZ  NAT for web server</title>
      <link>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289026#M1078325</link>
      <description>&lt;P&gt;Are these websites already up and running? Are you able to hit them from the Inside network. I feel like there are some things that haven't been fully fleshed out quite yet before you try putting this on the Internet. For instance, I don't think you're going to be able to host 3 websites on the same server. I could be wrong but try doing that first and then come back to us and tell us how you got it to work. Then we can help you get the firewall to NAT it to the Internet.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 22:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configure-dmz-nat-for-web-server/m-p/4289026#M1078325</guid>
      <dc:creator>TJ-20933766</dc:creator>
      <dc:date>2021-02-09T22:21:33Z</dc:date>
    </item>
  </channel>
</rss>

