<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring ASA Public servers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438924#M856609</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you're right.&lt;/P&gt;&lt;P&gt;On the ACLs, the outside (public) IP address needs to be defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you define the private IP on the ACL (for incoming traffic) it will not work because the only IP visible to the Internet is the outside IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually just as a side note, this is a new improvement on version 8.3&lt;/P&gt;&lt;P&gt;Using 8.3 you can define the private real address on the incoming ACL, so that if you need to change the public IP, you don't need to modify the ACL each time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Jun 2010 17:12:20 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-06-03T17:12:20Z</dc:date>
    <item>
      <title>Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438919#M856596</link>
      <description>&lt;P&gt;I have just bought an ASA 5510 and am trying to configure it, but it is not working the way I expect.&lt;/P&gt;&lt;P&gt;I have several internal servers which need to be accessed from the web. If I create a NAT entry for each, and a corresponding access rule, the servers cannot be accessed. If, however, I add the servers in the 'Public Servers' section, it automatically adds the appropriate NAT and Access rule, and it works. My first question is why is this so? Surly adding the NAT and Access rule should work?&lt;/P&gt;&lt;P&gt;Secondly, although it works by adding the servers via Public folders, it only does so by assigning a different public IP for each internal server. I want to assign different ports from one external IP to different internal servers to conserve IP's, but it will not let me do this: adding a server in Public server assigns an IP to that internal server, even though I specify, for example, only smtp as the service. If I try to add another Public server, say http, to another internal machine, it says the external address overlaps with another in use. This can be done by configuring NAT and Access Rule directly, but this doesn't work. I can only access my servers by doing it via Public Servers. is this by design, or am I doing something wrong??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438919#M856596</guid>
      <dc:creator>alanmsv1234</dc:creator>
      <dc:date>2019-03-11T17:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438920#M856599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see if you're doing something wrong, please post the output of the following lines from the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;sh run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can change your sensitive information before posting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438920#M856599</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T16:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438921#M856601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MSV-ASA# sh run static&lt;BR /&gt;static (Inside,Outside) tcp xxx.29 pptp Fileserver pptp netmask 255.255.255.255&lt;BR /&gt;static (DMZ,Outside) tcp xxx.27 imap4 pop.m.org imap4 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,Outside) tcp xxx.27 pop3 pop.m.org pop3 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,Outside) tcp xxx.27 smtp CentOs smtp netmask 255.255.255.255&lt;BR /&gt;static (Inside,Outside) xxx.28 Commserver netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;MSV-ASA# sh run access-group&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MSV-ASA# sh run access-list&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host CentOs eq smtp&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host xxx.29 eq pptp&lt;BR /&gt;access-list Outside_access_in extended permit tcp object-group Webroot host xxx.28 eq smtp&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host xxx.28 object-group DM_INLINE_TCP_0&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host Fileserver eq pptp&lt;BR /&gt;access-list Outside_access_in extended permit tcp any host pop.m.org object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438921#M856601</guid>
      <dc:creator>alanmsv1234</dc:creator>
      <dc:date>2010-06-03T16:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438922#M856603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can share the same public IP address with multiple internal addresses if doing static PAT and that's what you're doing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) tcp public_IP port internal_IP port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have the above line multiple times for the same public_IP and for different internal IPs as long as using different ports.&lt;/P&gt;&lt;P&gt;You say the configuration that you posted here works? Or which line(s) gives you problems?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 16:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438922#M856603</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T16:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438923#M856606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That config does not work, but I think I've spotted the flaw:&lt;/P&gt;&lt;P&gt;it works if the destination of the access rule is the external IP of the internal server, but does not work if the destination is specified as the internal server (in this case centos). This seems somewhat counter-intuitive to me, and different from the ISR routers, where you do specify the internal name/ip.&lt;/P&gt;&lt;P&gt;I have done all config via the ASDM, not CLI. I am assuming the Public servers config option is a 'user friendly' way of doing the nat and access list in one go?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 17:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438923#M856606</guid>
      <dc:creator>alanmsv1234</dc:creator>
      <dc:date>2010-06-03T17:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438924#M856609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you're right.&lt;/P&gt;&lt;P&gt;On the ACLs, the outside (public) IP address needs to be defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you define the private IP on the ACL (for incoming traffic) it will not work because the only IP visible to the Internet is the outside IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually just as a side note, this is a new improvement on version 8.3&lt;/P&gt;&lt;P&gt;Using 8.3 you can define the private real address on the incoming ACL, so that if you need to change the public IP, you don't need to modify the ACL each time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 17:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438924#M856609</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T17:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438925#M856612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, if I upgrade from 8.2 to 8.3, I could use the internal names/ip's in my ACLs? As you say, this would be much more flexible, as I do indeed plan to change external IP scheme eventually.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 08:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438925#M856612</guid>
      <dc:creator>alanmsv1234</dc:creator>
      <dc:date>2010-06-04T08:03:34Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring ASA Public servers</title>
      <link>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438926#M856615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but before attempting the upgrade to 8.3 you need to consider that the NAT configuration changed completely, the entire configuration is more object-group oriented than before, etc. You need extra memory also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please review this information prior going to 8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Migration guide to 8.3&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Release notes&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/release/notes/asarn83.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 15:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-asa-public-servers/m-p/1438926#M856615</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T15:44:57Z</dc:date>
    </item>
  </channel>
</rss>

