Provide access to outside

Unanswered Question
Apr 19th, 2012
User Badges:

Hi,


  A consultant will be installing an agent in some of our internal servers so they can monitor them from the outside. This agent needs to talk to an specific IP as well as Port on the outside interface and the communication is bidirectional. I don't have enough outside IPs to do a one to one translation so I am reaching out to you to see what is the best way to accomplish this.


  This is what I would do:


  1. Create an object group with all the servers

  2. Create an access list with the above object group to allow the agent access to the specified IP and port #

  3. Deny statement to block the rest of the traffic


May I hear your suggestions?


Thanks, RG

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
varrao Thu, 04/19/2012 - 08:41
User Badges:
  • Red, 2250 points or more

Hi,


If you have a group of servers that needs to be mapped on the outside interface of the ASA, then that migth be a problem, because although you can do port forwarding on the outside interface of the ASA, that is also a one-to-one nat, so if one server uses the port 443 on the outside interface then the other servers would not be able to use it.


Port-forwarding doc:

http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080b80d74.shtml


Thanks,

Varun

varrao Thu, 04/19/2012 - 08:50
User Badges:
  • Red, 2250 points or more

Can you share it??

Rafael Garcia Thu, 04/19/2012 - 09:08
User Badges:

Sure...


After gathering more information, I found out that the agent only needs access to the outside so there is no need for a one-to-one translation. What I did was, I created an object group that contains all the servers in question and create an ACL allowing IP traffic from the object group to the destination on port XXXX and added another statement to deny any other traffic.


Have a good day!!!

Actions

This Discussion

Related Content