Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 6
Scenario: DMZ Configuration
In this procedure, you configure a NAT rule that associates IP addresses from this
pool with the inside clients so they can communicate securely with the DMZ web

server.

To configure NAT between the inside interface and the DMZ interface, perform
the following steps starting from the main ASDM window:
In the main ASDM window, click the Configuration tool.
Step 1
In the Features pane, click NAT.
Step 2
From the Add drop-down list, choose Add Dynamic NAT Rule.
Step 3
The Add Dynamic NAT Rule dialog box appears.
In the Real Address area, specify the IP address to be translated. For this scenario,
Step 4
address translation for inside clients is done according to the IP address of the
subnet.
a.
b.
c.
Step 5
In the Dynamic Translation area, do the following:
a.
b.
78-17612-01
From the Interface drop-down list, choose the Inside interface.
Enter the IP address of the client or network. In this scenario, the IP address
of the network is 10.10.10.0.
From the Netmask drop-down list, choose the Netmask. In this scenario, the
netmask is 255.255.255.0.
From the Interface drop-down list, choose the DMZ interface.
To specify the address pool to be used for this Dynamic NAT rule, check the
Select check box next to Global Pool ID. In this scenario, the IP pool ID is
200.
In this scenario the IP pool that we want to use is already created. If it was
not already created, you would click Add to create a new IP pool.
Configuring the Security Appliance for a DMZ Deployment
Cisco ASA 5505 Getting Started Guide
6-13

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents