cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
940
Views
0
Helpful
3
Replies

ASA/FWSM: static(dmz,dmz)

SSS999888
Level 1
Level 1

Hi ,

Is the following a workable config on FWSM or on ASA?

static (DMZ,DMZ) 10.10.10.111 192.168.26.111 netmask 255.255.255.255

My_Network_Visio.png

Thank you

Sri

1 Accepted Solution

Accepted Solutions

Yudong Wu
Level 7
Level 7

static NAT should be

static (dmz,dmz) 192.168.26.111 10.10.10.111

you also need "same-security-traffic permit intra-interface"

On server 10.10.10.111, you need to make sure the return traffic will be sent to ASA instead of Rou-1.

View solution in original post

3 Replies 3

Yudong Wu
Level 7
Level 7

static NAT should be

static (dmz,dmz) 192.168.26.111 10.10.10.111

you also need "same-security-traffic permit intra-interface"

On server 10.10.10.111, you need to make sure the return traffic will be sent to ASA instead of Rou-1.

Thank you Youdong,

I also need to initiate traffic form BOTH of the servers.

Would this need any additional considerations? Both directions have

1/ smae static map

and also

2/ differeing static IP address maps

Sri

But per my testing, it works in both directions. Both sides can initiate the traffic since you are using static NAT.

Beside what I mentioned in the last post, you need make sure you have route added in your ASA correctly.

For example, you need add a route on ASA to route traffic destinate to 192.168.26.111 to  10.10.10.111.

You might need to add "permit ip host 10.10.10.111 host 172.24.24.111" on the ACL applied to dmz interface as well.

Review Cisco Networking for a $25 gift card