<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Jouni,I'm only on the first in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544960#M236263</link>
    <description>&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;I'm only on the first website but we see this working just like you said.&lt;/P&gt;&lt;P&gt;I left you a message to read at http://98.101.206.100&lt;/P&gt;&lt;P&gt;I can't thank you enough and would like to do something for you my friend.&lt;/P&gt;&lt;P&gt;Please name it - anything you need or want&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jul 2014 16:58:28 GMT</pubDate>
    <dc:creator>Stephen Sisson</dc:creator>
    <dc:date>2014-07-23T16:58:28Z</dc:date>
    <item>
      <title>Websites -HTTP/HTTPS/FTPS, no DMZ</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544952#M236254</link>
      <description>&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;Hello&amp;nbsp;everyone,&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;I'm&amp;nbsp;having&amp;nbsp;some&amp;nbsp;trouble&amp;nbsp;and&amp;nbsp;need&amp;nbsp;your&amp;nbsp;assistance.&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;We&amp;nbsp;have&amp;nbsp;thirty&amp;nbsp;five&amp;nbsp;HTTP/HTTPS/FTPS&amp;nbsp;web&amp;nbsp;sites&amp;nbsp;to&amp;nbsp;setup&amp;nbsp;in&amp;nbsp;the&amp;nbsp;ASA&amp;nbsp;5520&amp;nbsp;ASDM&amp;nbsp;firewall,&amp;nbsp;we&amp;nbsp;need&amp;nbsp;to&amp;nbsp;know&amp;nbsp;if&amp;nbsp;its&amp;nbsp;possible&amp;nbsp;to&amp;nbsp;have&amp;nbsp;them&amp;nbsp;all&amp;nbsp;setup&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;without&amp;nbsp;using&amp;nbsp;a&amp;nbsp;DMZ,&amp;nbsp;we&amp;nbsp;have&amp;nbsp;two&amp;nbsp;or&amp;nbsp;three&amp;nbsp;sub-nets&amp;nbsp;with&amp;nbsp;HTTP/HTTPS/FTPS&amp;nbsp;servers.&amp;nbsp;We&amp;nbsp;get&amp;nbsp;the&amp;nbsp;first&amp;nbsp;website&amp;nbsp;setup&amp;nbsp;on&amp;nbsp;the&amp;nbsp;ASA&amp;nbsp;ASDM&amp;nbsp;GUI&amp;nbsp;&amp;nbsp;working&amp;nbsp;great,&amp;nbsp;when&amp;nbsp;we&amp;nbsp;begin&amp;nbsp;to&amp;nbsp;add&amp;nbsp;multiple&amp;nbsp;sites&amp;nbsp;is&amp;nbsp;when&amp;nbsp;all&amp;nbsp;stop&amp;nbsp;working,&amp;nbsp;even&amp;nbsp;the&amp;nbsp;original&amp;nbsp;first&amp;nbsp;site&amp;nbsp;stops&amp;nbsp;working.&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;I&amp;nbsp;have&amp;nbsp;all&amp;nbsp;networks&amp;nbsp;talking&amp;nbsp;to&amp;nbsp;each&amp;nbsp;other&amp;nbsp;as&amp;nbsp;inside&amp;nbsp;to&amp;nbsp;inside&amp;nbsp;or&amp;nbsp;all&amp;nbsp;using&amp;nbsp;the&amp;nbsp;same&amp;nbsp;security-level&amp;nbsp;100&amp;nbsp;a&amp;nbsp;requirement&amp;nbsp;we&amp;nbsp;have&amp;nbsp;all&amp;nbsp;internal&amp;nbsp;networks&amp;nbsp;allow&amp;nbsp;traffic&amp;nbsp;between&amp;nbsp;networks.&amp;nbsp;We&amp;nbsp;would&amp;nbsp;like&amp;nbsp;to&amp;nbsp;allow&amp;nbsp;outside&amp;nbsp;users/customers&amp;nbsp;to&amp;nbsp;have&amp;nbsp;access&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;to&amp;nbsp;our&amp;nbsp;HTTP/HTTPS/FTPS&amp;nbsp;websites&amp;nbsp;without&amp;nbsp;having&amp;nbsp;to&amp;nbsp;setup&amp;nbsp;two&amp;nbsp;or&amp;nbsp;more&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;DM&amp;nbsp;Z's&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;.&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;What&amp;nbsp;I'm&amp;nbsp;using&amp;nbsp;to&amp;nbsp;setup&amp;nbsp;each&amp;nbsp;website&amp;nbsp;as&amp;nbsp;a&amp;nbsp;template&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;object&amp;nbsp;network&amp;nbsp;SMS-WebServer-HTTP&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;host&amp;nbsp;10.10.2.10&amp;nbsp;inside&amp;nbsp;IP&amp;nbsp;address&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;nat&amp;nbsp;(VLAN102,outside)&amp;nbsp;static&amp;nbsp;98.101.206.252&amp;nbsp;service&amp;nbsp;tcp&amp;nbsp;80&amp;nbsp;80&amp;nbsp;outside&amp;nbsp;address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;object&amp;nbsp;network&amp;nbsp;SMS-WebServer-HTTPS&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;host&amp;nbsp;10.10.2.10&amp;nbsp;inside&amp;nbsp;IP&amp;nbsp;address&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;nat&amp;nbsp;(VLAN102,outside)&amp;nbsp;static&amp;nbsp;98.101.206.252&amp;nbsp;service&amp;nbsp;tcp&amp;nbsp;443&amp;nbsp;443&amp;nbsp;outside&amp;nbsp;address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;access-list&amp;nbsp;OutsideToVLAN102&amp;nbsp;permit&amp;nbsp;tcp&amp;nbsp;any&amp;nbsp;host&amp;nbsp;10.10.2.10&amp;nbsp;eq&amp;nbsp;80&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;access-list&amp;nbsp;OutsideToVLAN102&amp;nbsp;permit&amp;nbsp;tcp&amp;nbsp;any&amp;nbsp;host&amp;nbsp;10.10.2.10&amp;nbsp;eq&amp;nbsp;443&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;I'm&amp;nbsp;not&amp;nbsp;sure&amp;nbsp;what's&amp;nbsp;required&amp;nbsp;to&amp;nbsp;get&amp;nbsp;all&amp;nbsp;HTTP/HTTPS/FTPS&amp;nbsp;sites&amp;nbsp;working&amp;nbsp;through&amp;nbsp;the&amp;nbsp;firewall&amp;nbsp;without&amp;nbsp;using&amp;nbsp;the&amp;nbsp;DMZ&amp;nbsp;and&amp;nbsp;using&amp;nbsp;the&amp;nbsp;ASDM&amp;nbsp;for&amp;nbsp;setup.&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p0" style="margin-bottom:7.5000pt; margin-top:0pt; text-autospace:ideograph-other; line-height:15.0000pt; "&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;Thank&amp;nbsp;you&amp;nbsp;all&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:31:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544952#M236254</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2019-03-12T04:31:29Z</dc:date>
    </item>
    <item>
      <title>Hi, Will need some</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544953#M236255</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will need some clarification on what you are actually wanting/attempting to do and what the current situation with regards to the network is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First thing that I want to ask is what do you mean setting up the servers without a DMZ? Do you mean that you want to use your existing internal networks address space when configuring the servers and then simply configure NAT for the servers on the firewall INSTEAD OF configuring a separate Subnet/Vlan on the firewall where all the servers would be hosted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess technically there is nothing stopping you from setting up the servers in whatever subnet/Vlan you have already on your network. Usually though servers that are used to host resources to external users through the public network are positioned on a DMZ network which permits little to no connectivity from the servers towards the LAN networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also be interested in exactly what commands are entered to the ASA when the connectivity to the servers stops working. I would imagine that there is some error in the configurations if they effect already working setups. You might also be overwriting the working configuration depending what you are actually inserting to the ASA. You should be able to get the CLI format configurations even if you were using only ASDM if you go to Tools -&amp;gt; Preferences -&amp;gt; choose the preview of commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also like to ask you what your situation with regards to available public IP addresses is? Are you able to dedicate each server a public IP address (though there seems to be many)? Especially in the cases of web servers you might run into a problem if you dont have a public IP address for each server since you can not forward the same port for the same public IP address to multiple internal hosts. So when you have used the HTTP and HTTPS ports for the public IP address you mention then you will already require another public IP address to forward the same ports to another server. Or you will have to use different public facing ports which is not very convinient for the actual web users if he/she has to use a port number in the URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess there are ways to host multiple sites on a single server which means you would not need so many public IP address and special NAT configurations on the firewall but that is a thing I am not equipped to give advice to anyone &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in short, we would need to know&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;How many public IP addresses do you have available to use for these servers or are you going to host multiple sites on fewer number of servers?&lt;/LI&gt;&lt;LI&gt;Are you going to have the server running on actual LAN subnets or would you be willing to atleast create a single DMZ to host the servers?&lt;/LI&gt;&lt;LI&gt;What are the commands that you have entered that prevents the existing configurations from working? Is there any IP overlap in the configurations and does the ASA give any error messages?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 12:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544953#M236255</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-23T12:35:32Z</dc:date>
    </item>
    <item>
      <title>Hello Jouni, always nice</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544954#M236257</link>
      <description>&lt;P&gt;Hello Jouni, always nice working with you.&lt;/P&gt;&lt;P&gt;We have this new ASA 5520 as a fail over if our current production ISP dies for some reason, we have this firewall on a different ISP subnet verses our production.&lt;/P&gt;&lt;P&gt;We have one Public IP address available for each server /24 block&lt;/P&gt;&lt;P&gt;I have twenty nine servers to setup in our 102 VLAN, able to only test one at a time in this LAB environment, ten to setup in the 104 VLAN, three in our 109 VLAN so you can see we end up with several DMZ;s if we used them, makes to much work for this DR fail over. would like to have them use NAT/ACL to control the access for all HTTP/HTTPS/FTPS if possible, not the best practice for doing this but it's only for DR.&lt;/P&gt;&lt;P&gt;I'm sending you the two sites template used for the setup, one from the 10.10.2.x network then other from 10.10.4.x network, both using the same Public class C&lt;/P&gt;&lt;P&gt;object network Edoc_Testweb2-HTTP&lt;/P&gt;&lt;P&gt;host 10.10.4.200 inside IP address&lt;/P&gt;&lt;P&gt;nat (VLAN104,outside) static 98.101.206.100 service tcp 80 80 outside address&lt;BR /&gt;!&lt;BR /&gt;object network Edoc_Testweb2-HTTPS&lt;/P&gt;&lt;P&gt;host 10.10.4.200 inside IP address&lt;/P&gt;&lt;P&gt;nat (VLAN104,outside) static 98.101.206.100 service tcp 443 443 outside address&lt;BR /&gt;!&lt;BR /&gt;access-list OutsideToVLAN104 permit tcp any host 10.10.4.200 eq 80&lt;/P&gt;&lt;P&gt;access-list OutsideToVLAN104 permit tcp any host 10.10.4.200 eq 443&lt;BR /&gt;!&lt;BR /&gt;access-group OutsideToVLAN104 in interface outside = ASDM only&lt;/P&gt;&lt;P&gt;Number2&lt;/P&gt;&lt;P&gt;object network CulsWeb-HTTP&lt;/P&gt;&lt;P&gt;host 10.10.2.120 inside IP address&lt;/P&gt;&lt;P&gt;nat (VLAN102,outside) static 98.101.206.105 service tcp 80 80 outside address&lt;BR /&gt;!&lt;BR /&gt;object network CulsWeb-HTTPS&lt;/P&gt;&lt;P&gt;host 10.10.2.120 inside IP address&lt;/P&gt;&lt;P&gt;nat (VLAN102,outside) static 98.101.206.105 service tcp 443 443 outside address&lt;BR /&gt;!&lt;BR /&gt;access-list OutsideToVLAN102 permit tcp any host 10.10.2.120 eq 80&lt;/P&gt;&lt;P&gt;access-list OutsideToVLAN102 permit tcp any host 10.10.2.120 eq 443&lt;BR /&gt;!&lt;BR /&gt;access-group OutsideToVLAN102 in interface outside&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 13:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544954#M236257</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2014-07-23T13:01:15Z</dc:date>
    </item>
    <item>
      <title>Hi, It seems that your actual</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544955#M236258</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that your actual connectivity problem when adding new configurations is caused by changing the ACL attached to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that you are creating 2 different ACLs but trying to attach them to the same interface &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. The interface can only hold a single ACL for one direction so you would have to use the same ACL for controlling all traffic that is coming &lt;STRONG&gt;"in"&lt;/STRONG&gt; from behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. This is the reason why the first server stops working after adding configurations for another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Though you still have problems related to the setup. You say you have tens of servers to setup yet you seem to have way fever public IP addresses correct? If this is true then you will quickly run out of public IP addresses that you can use for your servers. This is because of the earlier mentioned limitation of being able to forward a specific port for specific public IP address only to one internal host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in the end you would either have to use different public facing ports for some internal servers (like mapping public TCP port 81 to 80 , 82 to 80 for another server and so on) OR you would have to get more public IP addresses from the ISP to have one for each server. I guess one option would also be running the sites/services on single/fewer server(s) but I guess that is not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 13:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544955#M236258</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-23T13:16:12Z</dc:date>
    </item>
    <item>
      <title>Jouni,Can you give me an</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544956#M236259</link>
      <description>&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;Can you give me an example for what I'm doing wrong by using the outside interface for all ACL attached to the outside interface, and what to do to fix this issue so we can add all the servers.&lt;/P&gt;&lt;P&gt;We have plenty of public IP's 250 available for this project, we only need one for each server, need only thirty for the HTTP/HTTPS websites, only need nine or so for the FTPS sites.&lt;/P&gt;&lt;P&gt;All HTTP sites will use port 80, all HTTPS sites will use 443, all FTPS will use ports 990 - 1099, others will use port 22&lt;/P&gt;&lt;P&gt;Please explain what I'm doing wrong and step-by-step what I need to do for allowing this on the 5520 running 9.0(3) IOS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 13:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544956#M236259</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2014-07-23T13:30:36Z</dc:date>
    </item>
    <item>
      <title>Hi, You should configure a</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544957#M236260</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should configure a single ACL and configure all the rules to it. You will then attach that single ACL to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface to control all traffic from the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you should probably use Static NAT rather than Static PAT (Port Forward) since you will have to use a public IP address per server anyway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case the configuration format for each server would be&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-1&lt;BR /&gt;&amp;nbsp;host &amp;lt;internal ip&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;public ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-2&lt;BR /&gt;&amp;nbsp;host &amp;lt;internal ip&amp;gt;&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;public ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and so on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could then configure the ACL to allow traffic to these 2 servers in the below way.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Rules for Web servers&lt;BR /&gt;access-list OUTSIDE-IN permit tcp any object SERVER-1 eq http&lt;BR /&gt;access-list OUTSIDE-IN permit tcp any object SERVER-1 eq https&lt;BR /&gt;access-list OUTSIDE-IN permit tcp any object SERVER-2 eq http&lt;BR /&gt;access-list OUTSIDE-IN permit tcp any object SERVER-2 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Naturally you can add as many statements as you need. There is also other options that achieve the same. You can for example group the services and server IP addresses to their own groups so you can get a small ACL configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The command you need to use to attach the ACL to the interface is&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that when you have inserted this &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command once and want to add more rules to allow/deny traffic then you simply add the &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; lines but you will NOT have use the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command again because you have already attached the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface with the above command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this clarifies things.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 14:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544957#M236260</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-23T14:42:58Z</dc:date>
    </item>
    <item>
      <title>Jouni you are the best, let</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544958#M236261</link>
      <description>&lt;P&gt;Jouni&amp;nbsp;you&amp;nbsp;are&amp;nbsp;the&amp;nbsp;best,&amp;nbsp;let&amp;nbsp;me&amp;nbsp;put&amp;nbsp;this&amp;nbsp;into our&amp;nbsp;lab&amp;nbsp;network.&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;you&amp;nbsp;for&amp;nbsp;always&amp;nbsp;helping&amp;nbsp;us&amp;nbsp;figure&amp;nbsp;out&amp;nbsp;what&amp;nbsp;we&amp;nbsp;have&amp;nbsp;done&amp;nbsp;wrong&amp;nbsp;and&amp;nbsp;for&amp;nbsp;&lt;/P&gt;&lt;P&gt;showing&amp;nbsp;the&amp;nbsp;right&amp;nbsp;way&amp;nbsp;to&amp;nbsp;make&amp;nbsp;things&amp;nbsp;work.&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;you&amp;nbsp;Sir&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 14:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544958#M236261</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2014-07-23T14:51:05Z</dc:date>
    </item>
    <item>
      <title>Hi, No problem :) Let me know</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544959#M236262</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No problem &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know how it goes after you have tested it in your lab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 15:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544959#M236262</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-23T15:08:34Z</dc:date>
    </item>
    <item>
      <title>Jouni,I'm only on the first</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544960#M236263</link>
      <description>&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;I'm only on the first website but we see this working just like you said.&lt;/P&gt;&lt;P&gt;I left you a message to read at http://98.101.206.100&lt;/P&gt;&lt;P&gt;I can't thank you enough and would like to do something for you my friend.&lt;/P&gt;&lt;P&gt;Please name it - anything you need or want&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 16:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544960#M236263</guid>
      <dc:creator>Stephen Sisson</dc:creator>
      <dc:date>2014-07-23T16:58:28Z</dc:date>
    </item>
    <item>
      <title>Hi, Good to hear that its</title>
      <link>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544961#M236264</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good to hear that its working so far. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Thank you for the message, though I am not part of Cisco &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't know if its really proper to ask anything from the help I give here and to be honest I would not know what to ask even. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm happy if the correct answer is marked (if I have given one)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2014 17:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/websites-http-https-ftps-no-dmz/m-p/2544961#M236264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-23T17:17:38Z</dc:date>
    </item>
  </channel>
</rss>

