cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
580
Views
0
Helpful
1
Replies

ASA front-end to ISA Server back-end configuration help

licenses
Level 1
Level 1

I have a client that requires an ASA front-end firewall that will pass all traffic to an ISA Server setting in front of the corporate LAN. There will also be a SPAM filter in the ASA dmz accepting all email and passing it through ISA to the mail server. The last part of the configuration is they want to use the SSL VPN capabilities of the ASA to connect to the corporate LAN.

I have found numerous articles about setting this up from an ISA Server standpoint, but nothing on how to do this from the ASA side. Looking for configuration examples, dos and don'ts, anyhting that will help me get going.

Thanks,

1 Reply 1

Not applicable

You will need to define a new network to represent the subnet between the ASA and ISA (this is a traditional DMZ). This could be private or public; unless you have a lot of public IP addresses that you can subnet down, this network is likely to be a private network. The ASA will therefore NAT all inbound and outbound traffic to/from ISA. You can then either NAT or route traffic through ISA to the internal network.

The key thing to remember is that the ASA will need to have all the NAT entries to provide the correct traffic flow AND also you will need to define ACLs to allow different types of outbound access, primarily, this will be ISA though...

Have a look at the following articles which give you a good feel of a back-to-back setup:

http://www.isaserver.org/tutorials/Configuring-Domain-Members-Back-to-Back-ISA-Firewall-DMZ-Part1.html

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card