11-05-2018 01:54 PM - edited 02-21-2020 08:26 AM
This is a dumbed down version of what I'm trying to do, but if I can get this much figured out I'm golden.
The setup:
- ASA 5505 running 9.2.4(28)
- ISP has assigned block of external IPs 10.0.0.1-10.0.0.14
- ASA's outside interface can "see" traffic on all external IPs
- ASA's outside interface configured for 10.0.0.1
- ASA's inside configured for 192.168.1.1 (255.255.255.0 to keep it simple)
What I need:
- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.
Is this possible? And if so how do I do it (details pretty pretty please with sugar on top).
Solved! Go to Solution.
11-06-2018 12:45 AM
thats interesting! i've always configured it like this:
object network websvr-ext
host 10.0.0.2
object network websvr-int-80
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 80 80
object network websvr-int-443
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 443 443
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 80
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 443
will have to test your config sometime.
regards, mk
11-05-2018 02:01 PM
Hi,
Try this:-
object network SRV1
host 192.168.1.20
nat (inside,outside) static 10.0.0.2
access-list OUTSIDE->IN permit tcp any host 192.168.1.20 eq 443
access-list OUTSIDE->IN permit tcp any host 192.168.1.20 eq 80
You will probably have to change the ACL name and possibly also the interface names (inside,outside).
HTH
11-05-2018 02:06 PM
Good example guide for your reference :
11-05-2018 04:12 PM
@GrootLives wrote:
This is a dumbed down version of what I'm trying to do, but if I can get this much figured out I'm golden.
The setup:
- ASA 5505 running 9.2.4(28)
- ISP has assigned block of external IPs 10.0.0.1-10.0.0.14
- ASA's outside interface can "see" traffic on all external IPs
- ASA's outside interface configured for 10.0.0.1
- ASA's inside configured for 192.168.1.1 (255.255.255.0 to keep it simple)
What I need:
- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.
Is this possible? And if so how do I do it (details pretty pretty please with sugar on top).
Looks promising. I'll give it a go tomorrow. Done for the day.
@balaji.bandi wrote:
Good example guide for your reference :
Easy to read to guide. Only uses a single IP though. Have to see if it scales up to multiple IPs. Again I'll check it out tomorrow.
11-06-2018 02:40 AM
But as per your orginal message
What I need:
- Any external traffic arriving on 10.0.0.2 ports 80, 443 to forward to internal host 192.168.1. 20.
So we have suggested for single IP, if your requirement Multiple IP explain more please , Multiple IP also possible but we would like to know use case to suggest better rather assumptions.
11-06-2018 12:45 AM
thats interesting! i've always configured it like this:
object network websvr-ext
host 10.0.0.2
object network websvr-int-80
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 80 80
object network websvr-int-443
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 443 443
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 80
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 443
will have to test your config sometime.
regards, mk
11-06-2018 03:39 AM - edited 11-06-2018 04:15 AM
@mkazam001 wrote:
thats interesting! i've always configured it like this:
object network websvr-ext
host 10.0.0.2
object network websvr-int-80
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 80 80
object network websvr-int-443
host 192.168.1.20
nat (inside,outside) static websvr-ext service tcp 443 443
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 80
access-list OUTSIDE-IN ext permit tcp any object websvr-int eq 443
will have to test your config sometime.
regards, mk
That seemed to do the trick. Thanks everyone.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide