03-03-2011 04:23 AM - edited 03-11-2019 01:00 PM
Hi,
i'm currently replacing my existing firewall environment with a Cisco ASA 5510 and got a question regarding DMZ.
I've currently set up like this:
Ethernet0/0 (outside) - Public static IP Address
Ethernet0/1 (inside) - LAN, internal ip addresses. Everything from here will be nat'd from the outside.
Ethernet0/2 (dmz) - DMZ with A class addresses which doesn't need NAT.
Do i have to setup somekind of nat for the dmz or will the addresses pass through automatically (granted that i have setup proper acl's for the access)? I got intra communication turned on.
Regards.
Andreas
Solved! Go to Solution.
03-03-2011 05:52 AM
Ok, I see. If you have your public IPs on devices on the DMZ then you can use a static NAT translation for that subnet, for example:
static (dmz,outside) 193.17.67.X 193.17.67.X netmask 255.255.255.X
Additionally you need ACLs to allow traffic from the outside to the DMZ, for example, allowing HTTP traffic:
access-list outside_in permit tcp any host 193.17.67.X eq 80
access-group outside_in in interface outside
If you have more ports to allow then start adding ACLs. For the traffic from DMZ to inside you will need another type of static translation so that DMZ users could reach the internal IPs.
I hope this helps
03-03-2011 04:43 AM
You want to allow traffix from the dmz to the inside and to the outside? Do you also need traffic from outside and inside to the dmz?
Sent from Cisco Technical Support iPhone App
03-03-2011 05:13 AM
I want to know if i need to set up nat for the dmz when i use "external" ip addresses on the dmz.
The DMZ interface have machines connected like 193.17.67.* they're not supposed to be nat, just put behind the firewall and have acl lists applied to them, what i wonder is: do i have to create nat rules in the fw for like 193.17.67.250 pointing to 193.17.67.250?
let's say i'm at home and want to connect to the server 193.17.67.250 which resides on my dmz (an actual machine with the same ip on my dmz) do i have to put in som extra config for this or will the outside interface just forward the packets to the dmz interface and the 193.17.67.250 machine? Also when i am at work using the machine and accessing services on the internet will the address 193.17.67.250 be used or will the address be the outside interface?
and yes i also need traffic from the outside to dmz hosts, some acl controlled traffic from certain hosts on the dmz to the inside and also traffic from inside to the dmz.
Sorry if i'm confusing you
/andreas
03-03-2011 05:52 AM
Ok, I see. If you have your public IPs on devices on the DMZ then you can use a static NAT translation for that subnet, for example:
static (dmz,outside) 193.17.67.X 193.17.67.X netmask 255.255.255.X
Additionally you need ACLs to allow traffic from the outside to the DMZ, for example, allowing HTTP traffic:
access-list outside_in permit tcp any host 193.17.67.X eq 80
access-group outside_in in interface outside
If you have more ports to allow then start adding ACLs. For the traffic from DMZ to inside you will need another type of static translation so that DMZ users could reach the internal IPs.
I hope this helps
03-03-2011 05:59 AM
Thank you! That answered my question.
/andreas
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide