cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2243
Views
5
Helpful
25
Replies

www server behind ASA 5505

altziebler
Level 1
Level 1

Hello Community,

I have a ASA 5505 with default setup, 2 VLANs. On the inside I have a DNS, IIS, SQL server. I am desperate for some help to get the www server accessible from the public. I am not using a DMZ. Got tips for me? Many thanks in advance. - Jurgen

25 Replies 25

so I went into Security Settings added a new Access Rule. interface: outside, direction: incoming, type: any, destination IP 70.164.46.224, protocol TCP, source: any, destination port: http

still cant access my ISS server, ASDM syslog says TCP access denied by ACL from 192.168.1.107

So you're trying http://70.164.46.224 from the inside?

Could you post the new config?

Thanks so much for your help!

I can't access from the outside (real outside) or inside

Result of the command: "show running-config"

: Saved

:

ASA Version 7.2(2)

!

hostname ciscoasa

domain-name default.domain.invalid

enable password xxx

names

name 192.168.1.20 SERVER1 description DNS

name 192.168.1.35 SERVER2 description IIS

name 192.168.1.40 SERVER3 description SQL

name 192.168.1.10 AppleAirport description WiFi

name 192.1.168.30 SERVER2-2 description IIS Ethernet 100

!

interface Vlan1

description ALT74 LAN

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface Vlan2

description COX

nameif outside

security-level 0

ip address 70.x.x.246 255.255.255.224

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

passwd xxx

ftp mode passive

clock timezone EST -5

clock summer-time EDT recurring

dns domain-lookup inside

dns domain-lookup outside

dns server-group DefaultDNS

domain-name default.domain.invalid

same-security-traffic permit intra-interface

access-list inside_access_in extended permit ip any any

access-list outside_access_in extended permit tcp any 70.x.x.224 255.255.255.224 eq www

pager lines 24

logging enable

logging asdm informational

mtu inside 1500

mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-522.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0

static (outside,inside) tcp SERVER2 www 70.164.46.224 www netmask 255.255.255.255

access-group inside_access_in in interface inside

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 70.164.46.225 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout uauth 0:05:00 absolute

http server enable

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd address 192.168.1.100-192.168.1.130 inside

dhcpd dns SERVER1 192.168.1.22 interface inside

dhcpd domain alt74.local interface inside

dhcpd enable inside

!

dhcpd dns 68.100.16.30 68.10.16.30 interface outside

!

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

message-length maximum 512

policy-map global_policy

class inspection_default

inspect dns preset_dns_map

inspect ftp

inspect h323 h225

inspect h323 ras

inspect rsh

inspect rtsp

inspect esmtp

inspect sqlnet

inspect skinny

inspect sunrpc

inspect xdmcp

inspect sip

inspect netbios

inspect tftp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:xxx

: end

access-list outside_access_in extended permit tcp any 70.164.46.224 255.255.255.224 eq www

should be......

access-list outside_access_in extended permit tcp any 70.164.46.224 255.255.255.255 eq www

or

access-list outside_access_in extended permit tcp any host 70.164.46.224 eq www

just did that :)

access-list inside_access_in extended permit ip any any

access-list outside_access_in extended permit tcp any host 70.164.46.224 eq www

uff! for some reason it doesn't work

Oops, I missed this too...

static (outside,inside) tcp SERVER2 www 70.164.46.224 www netmask 255.255.255.255

should be......

static (inside,outside) tcp 70.164.46.224 www SERVER2 www netmask 255.255.255.255

i fixed that one

static (inside,outside) tcp 70.164.46.224 www SERVER2 www netmask 255.255.255.255

I only have one group 'inside' in NAT, one static, and one dynamic. static is the one described abvove. the dynamic one is any any outside

Hi pepople,

I have exactly the same problem, would be a release 7.2(2) problem?

I have did that many times on PIX release 6.3(5), but right now I do not know what to do, I have tryed many as diferent configuration as I know.

Is there somebody else who can help us please, I really need to make that configuration.

Thanks folks

Martin

I have ASA Version 7.2(2)

I got a brand new unit last week. Mmhh

I going to make an upgrade and I'm going to be in touch.

Martin

where can I get the upgrade?

thanks much!

Review Cisco Networking for a $25 gift card