Cisco Systems 5585-X Optional Allowing Access to Public Servers Behind the, ASA 8.2 and Later

Models: 5585-X 5580 ASA5585S60P60SK9

1 12
Download 12 pages 43.28 Kb
Page 8
Image 8
7(Optional) Allowing Access to Public Servers Behind the

7(Optional) Allowing Access to Public Servers Behind the

ASA

ASA 8.2 and Later

The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet. As a business owner, you might have internal network services, such as a web and FTP server, that need to be available to an outside user. You can place these services on a separate network behind the ASA, called a demilitarized zone (DMZ). By placing the public servers on the DMZ, any attacks launched against the public servers do not affect your inside networks.

Step 1 In the main ASDM window, choose Configuration > Firewall > Public Servers. The Public Server pane appears.

Step 2 Click Add, then enter the public server settings in the Add Public Server dialog box. (For information about any field, click Help.)

Step 3 Click OK. The server appears in the list.

Step 4 Click Apply to submit the configuration to the ASA.

8

Page 8
Image 8
Cisco Systems 5585-X, ASA5585S60P60SK9, 5580 Optional Allowing Access to Public Servers Behind the, ASA 8.2 and Later