Cisco static command

Hi Experts,

I have a question regarding our cisco asa.  We typically use juniper ssg5s for small business setups, but weve had a customer requesting a cisco ASA5505, as they need a vpn tunnel between 2 sites.  The vpn set up and works fine.  My question is regarding the inbound access from the web into the server behind the firewall.  The setup is:

Untrusted network: 10.10.10.148/30
Trusted network: 10.10.10.152/29
(its one /24 network that we subnet)

Outside interface  -  10.10.10.150
Inside interface  10.10.10.153

Server on inside  10.10.10.154
Servers ILO  10.10.10.155

There is a static command to allow traffic from the outside to the Server:

Static (inside,outside) 10.10.10.154 10.10.10.154 netmask 255.255.255.255

And an access list that allows https traffic to the server.  This appears to work fine...my question is, can i create another rule so we can see the servers ilo (which also uses https) or will the 2 rules clash?  For example:

Static (inside,outside) 10.10.10.154 10.10.10.154 netmask 255.255.255.255
Static (inside,outside) 10.10.10.155 10.10.10.155 netmask 255.255.255.255

And then a couple of access-lists to allow the traffic.  

Will this work?
kevin_toddAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

devangshroffCommented:
yes this willl work
0
devangshroffCommented:
yes this willl work
0
batry_boyCommented:
The structure of your static commands appears to be correct, but you mention that you would then add a couple of ACL lists to allow the traffic.  While adding ACL statements is needed to allow the traffic, just make sure that your ACL statements are all part of a single named ACL, since you can only apply a single ACL to an interface in a certain direction at a time.  For example,

access-list outside_access_in permit tcp any host 10.10.10.154 eq www
access-list outside_access_in permit tcp any host 10.10.10.155 eq www
access-group outside_access_in in interface outside

Make sense?
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
kevin_toddAuthor Commented:
Hi folks,

Thats great...thanks, i'll try these and get back to you.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.