(Optional) Making Internal Services Accessible From The Internet (Asdm 6.2 And Later) - Cisco 5510 - ASA SSL / IPsec VPN Edition Quick Start Manual

Asa 5500 series adaptive security appliance
Hide thumbs Also See for 5510 - ASA SSL / IPsec VPN Edition:
Table of Contents

Advertisement

Chapter 6
Configuring the ASA
(Optional) Making Internal Services Accessible from
the Internet (ASDM 6.2 and Later)
Step 1
Step 2
Step 3
78-19753-01

(Optional) Making Internal Services Accessible from the Internet (ASDM 6.2 and Later)

As a business owner, you might have internal network services, such as a web or
FTP server, that need to be available to an outside user. You can place these
services on a separate network behind the ASA, called a demilitarized zone
(DMZ). The ASA allows you to restrict access to the DMZ and only includes
public servers. By placing public servers on the DMZ, any attacks launched
against your public servers do not affect the Inside network.
The Public Server pane (available for ASDM 6.2 and later) displays a list of
public servers, internal and external addresses, the interfaces that the internal or
external addresses apply to, and the service that is exposed.
To set up public server access, perform the following steps:
In the main ASDM window, choose Configuration > Firewall > Public Servers.
The Public Server pane appears.
Click Add, then enter the public server settings in the Public Server dialog box.
(For information about any field, click Help.)
Click OK. The server appears in the list.
Cisco ASA 5580 Series Quick Start Guide
6-3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5520Asa 5540Asa 5550Asa 5580Asa 5585-x

Table of Contents