Cisco Systems ASA 5500 manual Incoming request

Models: ASA 5500

1 144
Download 144 pages 23.87 Kb
Page 50
Image 50
Incoming request

Chapter 6 Scenario: DMZ Configuration

Configuring the Security Appliance for a DMZ Deployment

Figure 6-3 Incoming HTTP Traffic Flow From the Internet

2

Incoming request

1 HTTP request

 

Security

destined for public

sent to public address

Appliance

address of DMZ web

of DMZ web server.

 

 

server intercepted.

Internet

HTTP client

 

 

3Destination IP address translated to the private IP address of the web server.

 

 

 

 

4 Web server receives

 

 

 

 

request for content.

 

 

 

 

 

 

 

 

 

 

 

 

 

DMZ Web

Private IP address: 10.30.30.30

Server

Public IP address: 209.165.200.226

HTTP client

153779

To permit incoming traffic to access the DMZ web server, the adaptive security appliance configuration includes the following:

An address translation rule translating the public IP address of the DMZ web server to the private IP address of the DMZ web server.

An access control rule permitting incoming HTTP traffic that is destined for the DMZ web server.

The procedures for creating this configuration are detailed in the remainder of this chapter.

Configuring the Security Appliance for a DMZ Deployment

This section describes how to use ASDM to configure the adaptive security appliance for the configuration scenario shown in Figure 6-1. The procedure uses sample parameters based on the scenario.

 

Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide

6-4

78-17611-01

Page 50
Image 50
Cisco Systems ASA 5500 manual Incoming request