Cisco Systems 5585-X, ASA5585S60P60SK9, 5580 quick start Asa

Page 8

7(Optional) Allowing Access to Public Servers Behind the

ASA

ASA 8.2 and Later

The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet. As a business owner, you might have internal network services, such as a web and FTP server, that need to be available to an outside user. You can place these services on a separate network behind the ASA, called a demilitarized zone (DMZ). By placing the public servers on the DMZ, any attacks launched against the public servers do not affect your inside networks.

Step 1 In the main ASDM window, choose Configuration > Firewall > Public Servers. The Public Server pane appears.

Step 2 Click Add, then enter the public server settings in the Add Public Server dialog box. (For information about any field, click Help.)

Step 3 Click OK. The server appears in the list.

Step 4 Click Apply to submit the configuration to the ASA.

8

Image 8
Contents Cisco ASA Verifying the Package Contents Powering On the ASA PS1Maximizing Throughput BridgeConnecting Interface Cables and Verifying Connectivity Launching Asdm Click Run Startup WizardRunning the Startup Wizard ASA Optional Running VPN Wizards Page Advanced Configuration Optional Running Other Wizards in AsdmCisco Systems, Inc