05-20-2016 02:42 AM - edited 03-12-2019 12:46 AM
I have
Solved! Go to Solution.
05-20-2016 09:46 AM
Hi,
You can configure static nat on the ASA with port forwarding enabled
for example
if your ASA public ip is 1.1.1.1 and defence center private ip is 2.2.2.2 then configuration will be auto nat with below syntax:
object network 1.1.1.1-DCaccess
host 2.2.2.2
nat(inside,outside) static 1.1.1.1 service tcp 443 8443
here 1.1.1.1 is the object name for the public up of asa
after this you can access DC on
https://1.1.1.1:8443
Rate if it helps
thanks,
Ankita
05-20-2016 09:46 AM
Hi,
You can configure static nat on the ASA with port forwarding enabled
for example
if your ASA public ip is 1.1.1.1 and defence center private ip is 2.2.2.2 then configuration will be auto nat with below syntax:
object network 1.1.1.1-DCaccess
host 2.2.2.2
nat(inside,outside) static 1.1.1.1 service tcp 443 8443
here 1.1.1.1 is the object name for the public up of asa
after this you can access DC on
https://1.1.1.1:8443
Rate if it helps
thanks,
Ankita
05-20-2016 08:31 PM
Thank you Ankita. I will try that solution of yours. But what about the access rule:
Will this command work:
"
???
Because
05-21-2016 01:35 AM
Hi,
The acl should permit real port and IP address. So ensure the real IP and port of DC are permitted in the acl.
Hope it helps.
RS
Rate if it helps.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide