06-27-2025 04:25 AM
Just checking community to see best option to reach multiple internal say web servers from certain sites across WAN/internet on the FTD?
I was thinking say manual static NAT to an object-group which contains the internal server objects or something?
Solved! Go to Solution.
06-27-2025 07:03 AM
There are two case
1- one public to multi server use same l4 port (this ftd not support)
2- one public to multi server use different l4 port' this ftd support
MHM
06-27-2025 10:26 PM
@CiscoBrownBelt ForemostPayOnlinewrote:Just checking community to see best option to reach multiple internal say web servers from certain sites across WAN/internet on the FTD?
I was thinking say manual static NAT to an object-group which contains the internal server objects or something?
For exposing multiple internal web servers to the WAN/Internet via an FTD, the **best option is to deploy a Reverse Proxy/Load Balancer in your DMZ**. A simple static NAT to an object-group won't differentiate between multiple internal web servers sharing the same public IP and standard web ports (80/443). Instead, your FTD will perform a static NAT translating your single public IP to the DMZ-located reverse proxy's private IP. The FTD's Access Control Policy will then allow traffic from the internet to the proxy, and from the proxy to your internal web servers, with robust threat inspection applied to both flows. This approach centralizes SSL, provides intelligent routing, enhances security by hiding internal structure, and allows for load balancing, making it superior to using multiple public IPs for each internal server.
06-27-2025 04:34 AM
round robin is not support in FTD
Sorry
MHM
06-27-2025 05:48 AM - edited 06-27-2025 05:49 AM
Thanks again @MHM Cisco World
Sorry so you saying a NAT rule like I described would it not alternate traffic to the different servers?
06-27-2025 07:03 AM
There are two case
1- one public to multi server use same l4 port (this ftd not support)
2- one public to multi server use different l4 port' this ftd support
MHM
06-30-2025 04:20 AM
Great thanks that is what I figured
06-27-2025 10:26 PM
@CiscoBrownBelt ForemostPayOnlinewrote:Just checking community to see best option to reach multiple internal say web servers from certain sites across WAN/internet on the FTD?
I was thinking say manual static NAT to an object-group which contains the internal server objects or something?
For exposing multiple internal web servers to the WAN/Internet via an FTD, the **best option is to deploy a Reverse Proxy/Load Balancer in your DMZ**. A simple static NAT to an object-group won't differentiate between multiple internal web servers sharing the same public IP and standard web ports (80/443). Instead, your FTD will perform a static NAT translating your single public IP to the DMZ-located reverse proxy's private IP. The FTD's Access Control Policy will then allow traffic from the internet to the proxy, and from the proxy to your internal web servers, with robust threat inspection applied to both flows. This approach centralizes SSL, provides intelligent routing, enhances security by hiding internal structure, and allows for load balancing, making it superior to using multiple public IPs for each internal server.
06-30-2025 04:24 AM - edited 06-30-2025 04:25 AM
Great thanks. Yes was planning on doing better solution possible down the road. Able to suggest any of the free solutions out there lol?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide