Cisco Systems 5525XW750, ASA5512K9 Optional Allowing Access to Public Servers Behind the

Models: ASA 5515X ASA 5512X ASA5512K9 5525XW750

1 12
Download 12 pages 3.24 Kb
Page 8
Image 8
6(Optional) Allowing Access to Public Servers Behind the

6(Optional) Allowing Access to Public Servers Behind the

ASA

The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet. As a business owner, you might have internal network services, such as a web and FTP server, that need to be available to an outside user. You can place these services on a separate network behind the ASA, called a demilitarized zone (DMZ). By placing the public servers on the DMZ, any attacks launched against the public servers do not affect your inside networks.

Step 1 In the main ASDM window, choose Configuration > Firewall > Public Servers. The Public Server pane appears.

Step 2 Click Add, then enter the public server settings in the Add Public Server dialog box. (For information about any field, click Help.)

Step 3 Click OK. The server appears in the list.

Step 4 Click Apply to submit the configuration to the ASA.

8

Page 8
Image 8
Cisco Systems 5525XW750, ASA5512K9, ASA 5512X, ASA 5515X quick start Optional Allowing Access to Public Servers Behind the