Ok so, I have an ASA acting as a firewall for a bunch of hosted servers, includig a bunch of Small Business servers. Each customer server is on its own vlan and are trunked into the asa. My office mail server is on the inside interface.
Inside 192.168.1.0 =vlan1 my mail server at 192.168.1.5
trunk10 192.168.10.0 =vlan10 pat/nat to xxx.xxx.xxx.163
trunk20 192.168.20.0 =vlan20 pat/nat to xxx.xxx.xxx.164
trunk30 192.168.30.0 =vlan30 pat/nat to xxx.xxx.xxx.165
pat/nat rules are set up so that each customer has their own public ip for services they are running (https/mail mostly)
I've got some other stuff going on but thats the key config.
Everything works great except that hosted customers cant send me emails and viseversa as well as inter-customer. I understand why thats not allowed but I need to get it to work in a scaleable way with out something crazy. Best I can tell I either need to route inter-customer mail internally and do a bunch on the exchange/dns side, ot get the asa to allow traffic on port 25 between the outside interface IPs.
Also if something above is totally jacked up let me know.
This month, we're excited to bring awareness to a newly formed partnership between Cisco Secure and IBM.
Securing today's dynamic enterprise applications is critical. With hybrid and multi-cloud adoption, traditional network-based security ran into limita...
Listen: https://smarturl.it/CCRS8E42Follow us: twitter.com/CiscoChampion
APIClarity is an open source, cloud-native visibility tool for APIs. It utilizes a Service Mesh framework to capture and analyze API traffic and identify potential risks.
Hello everyone, A new video in the Cisco Secure Terraform Series has just been published. If you are interested in Infrastructure as Code, and Terraform, you don't want to miss out on this amazing series with Jason "Canadian Bacon" Maynard! Newe...
The Cisco Secure Firewall and SecureX teams are looking for feedback from active Secure Firewall users who may or may not have already activated SecureX. Your responses will help us improve the Firepower experience in SecureX. Th...