i have tipical problem is i have two servers connected to unmanagble switch and from that switch to connected to one of of the port eth0/0 and i taken output eth0/1 and i conncted to my pc through the firewall i want to access my servers
through the firewall.
but my doubt is we r trying to access the servers through the intranet .
server ip:i have two servers connected to unmanagble switch and from that switch to connected to one of of the port eth0/0 and i taken output eth0/1 and i conncted to my pc through the firewall i want to access my servers
server ip address:188.8.131.52 and 184.108.40.206 gateway:220.127.116.11
this setup will work or not because iam accessing the firewall from outside.
plz any tips plz ,iam vrygreatfull to cisco fourms.
So, if you want to access these server internally through the firewall, there are two options
you can create three interface on the ASA.
Put the servers on the DMZ interface. So, you should have a different network on the DMZ than the inside interface.
Lets say your inside interface is 192.168.1.x then you might want to give the DMZ interface the address 192.168.3.x which is a different network than your inside network.
Also, when you create the interface, you might want to make the security level as lower than the inside interface.
After that, you would need to create static translations. Since you will be going from the inside interface (which is a higher interface) to a DMZ interface (which is a lower interface), you would just need only static translations. If the servers needs to access or initiate the connection to your inside network then you need to configure an ACL to allow access from the DMZ to the inside interface.
You can put the servers and everything on the inside interface and access them from your PC through internal IP address of the servers.
Hope this explains. Let me know if you want to follow Option A or Option B and send me the current config of the ASA.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...