<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa 5510 multiple web servers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024956#M917175</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as i've indicated we are allocated public internet address of .17 to .29 by the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want .17 to point to the 172.17.193.99 web server and .18 to point to the 172.17.193.98 web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jul 2008 20:39:08 GMT</pubDate>
    <dc:creator>support.edm</dc:creator>
    <dc:date>2008-07-08T20:39:08Z</dc:date>
    <item>
      <title>asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024948#M917151</link>
      <description>&lt;P&gt;ciscoasa(config)# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.17 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.x.x.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone mst -6&lt;/P&gt;&lt;P&gt;access-list split_tunnel_list standard permit 172.17.193.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.17.193.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list ping_reply extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnuserspool 192.168.10.101-192.168.10.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.17.193.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group ping_reply in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.30 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 172.17.193.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set firstset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set transform-set firstset&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn1 1 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map mymap 1 ipsec-isakmp dynamic dyn1&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 43200&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 3600&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.17.193.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 172.17.193.101-172.17.193.254 inside&lt;/P&gt;&lt;P&gt;dhcpd dns dns1 dns2 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024948#M917151</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2019-03-11T13:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024949#M917154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;ntp server 67.212.67.78 source outside&lt;/P&gt;&lt;P&gt;group-policy vpnuserspolicy internal&lt;/P&gt;&lt;P&gt;group-policy vpnuserspolicy attributes&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split_tunnel_list&lt;/P&gt;&lt;P&gt; address-pools value vpnuserspool&lt;/P&gt;&lt;P&gt;username admin password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username admin attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy vpnuserspolicy&lt;/P&gt;&lt;P&gt;tunnel-group vpnusersgroup type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group vpnusersgroup general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy vpnuserspolicy&lt;/P&gt;&lt;P&gt;tunnel-group vpnusersgroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 16:31:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024949#M917154</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-08T16:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024950#M917160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a w2k3 server on the LAN that has 2 web sites running on it.  Web1 is bound to 172.17.193.99 and Web2 is bound to 172.17.193.98.  The outside interface of the ASA is on the x.x.x.16/28 network.  The inside is on 172.17.193.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 172.17.193.99 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list web1_access permit tcp any host x.x.x.17 eq 80&lt;/P&gt;&lt;P&gt;access-group web1_access in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could browse to web1 using &lt;A class="jive-link-custom" href="http://x.x.x.17" target="_blank"&gt;http://x.x.x.17&lt;/A&gt; which gets redirected to 172.17.193.99 web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I go about being able to browse to web2 from the internet using &lt;A class="jive-link-custom" href="http://x.x.x.18" target="_blank"&gt;http://x.x.x.18&lt;/A&gt; to point to 172.17.193.98 web server while at the same time retaining the ability to browse to web1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 16:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024950#M917160</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-08T16:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024951#M917165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do u have a single public IP or u have more?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 19:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024951#M917165</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-07-08T19:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024952#M917169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you should have two static&lt;/P&gt;&lt;P&gt;one for 172.17.193.99 &lt;/P&gt;&lt;P&gt;another for 172.17.193.98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you have single ip you can use different ports&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 172.17.193.99 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 81 172.17.193.98 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. rate a post if it was useful&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 19:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024952#M917169</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-08T19:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024953#M917171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We get .17 to .29&lt;/P&gt;&lt;P&gt;.16 network id&lt;/P&gt;&lt;P&gt;.30 broadcast address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;255.255.255.240 (/28)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:15:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024953#M917171</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-08T20:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024954#M917173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"static (inside,outside) tcp interface 81 172.17.193.98 80 netmask 255.255.255.255 "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that mean ppl on the internet have to put in "&lt;A class="jive-link-custom" href="http://x.x.x.17:81" target="_blank"&gt;http://x.x.x.17:81&lt;/A&gt;" in their browser to access web2 server?????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024954#M917173</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-08T20:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024955#M917174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or you need yet another public ip.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024955#M917174</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-08T20:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024956#M917175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as i've indicated we are allocated public internet address of .17 to .29 by the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want .17 to point to the 172.17.193.99 web server and .18 to point to the 172.17.193.98 web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024956#M917175</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-08T20:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024957#M917176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it is feasible for you on usage/utilization and resource basis, you also can migrate the web service from server 2 to server 1, then configure host headers to run 2 different web services behind 1 public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024957#M917176</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-08T20:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024958#M917177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"I want .17 to point to the 172.17.193.99 web server and .18 to point to the 172.17.193.98 web server"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then all you have to do is creating another static statement,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.18 80 172.17.193.98 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-list web1_access permit tcp any host x.x.x.18 eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jul 2008 20:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024958#M917177</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-08T20:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024959#M917178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound_on_outside extended permit tcp any host x.x.x.17 eq www&lt;/P&gt;&lt;P&gt;access-list inbound_on_outside extended permit tcp any host x.x.x.18 eq www&lt;/P&gt;&lt;P&gt;access-list inbound_on_outside extended permit tcp any host x.x.x.19 eq www&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 172.17.193.99 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.18 www 172.17.193.98 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.19 www 172.17.193.97 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group inbound_on_outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works fine for 3 test websites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curious...any reason why&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"static (inside,outside) tcp interface www 172.17.193.99 www netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can't be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"static (inside,outside) tcp x.x.x.17 www 172.17.193.99 www netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to keep things consistent?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jul 2008 17:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024959#M917178</guid>
      <dc:creator>support.edm</dc:creator>
      <dc:date>2008-07-10T17:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa 5510 multiple web servers</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024960#M917179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is actually for "securing" the Ip address of interfaces which are crutial for overall routing processes from misuse. It is easy to get confused and create a one to one static for the outside IP address which will halt the the overall operation. You supposed to be careful when you use an "interface" statement rather than the IP address. But I have seen a very few configurations which actually operates without interface command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jul 2008 20:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-multiple-web-servers/m-p/1024960#M917179</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-07-10T20:27:47Z</dc:date>
    </item>
  </channel>
</rss>

