Cisco 5510 - ASA SSL / IPsec VPN Edition Getting Started Manual page 84

Asa 5500 series
Hide thumbs Also See for 5510 - ASA SSL / IPsec VPN Edition:
Table of Contents

Advertisement

Example DMZ Network Topology
Figure 8-1
192.168.1.2
This example scenario has the following characteristics:
Cisco ASA 5500 Series Getting Started Guide
8-2
Network Layout for DMZ Configuration Scenario
www.example.com
Internet
Inside interface
192.168.1.1
Inside
User
The web server is on the DMZ interface of the adaptive security appliance.
Clients on the inside network can access the web server in the DMZ and can
also communicate with devices on the Internet.
Clients on the Internet are permitted HTTP access to the DMZ web server; all
other traffic coming from the Internet is denied.
The network has one IP address that is publicly available: the outside
interface of the adaptive security appliance (209.165.200.225). This public
address is shared by the adaptive security appliance and the DMZ web server.
Chapter 8
Public IP Address
209.165.200.225
(outside interface)
DMZ interface
10.30.30.1
DMZ
Web Server
Private IP Address: 10.30.30.30
Public IP Address: 209.165.200.225
Scenario: DMZ Configuration
78-19186-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5520Asa 5540Asa 5550Asa 5510

Table of Contents