Solved

Configure Cisco Firewall for NAT

Posted on 2012-03-22
3
320 Views
Last Modified: 2012-03-27
Hello Everyone,
I know this is a very open question with many possibilities, especially since you will not be familiar with our network.

We have an MPLS through a vendor and they have a firewall that we manage. I have not used an ASA (i think thats what they call it) firewall before. I have watchguard firewalls in our offices that we have been using for a long time. The vendor set the firewall up for us since we have a few offices and I found out where to allow outgoing ports, but im not sure how i would set up a NAT from one of the public IPs they gave us to an internal server.

I see the options for Access Rules and NAT Rules, but im not sure which one is the way to go. Any guidance, even if its a very basic overview to get me started, would be great.

The only version numbers i see are when i log in to the device. It says: Cisco ASDM 6.2f for FWSM.
0
Comment
Question by:msidnam
3 Comments
 
LVL 10

Accepted Solution

by:
Larry Larmeu earned 250 total points
ID: 37752450
0
 
LVL 10

Assisted Solution

by:pclinuxguru
pclinuxguru earned 250 total points
ID: 37752496
Won't be perfect because like you said their may be differences in your network.

In ASDM -> Configuration -> Firewall -> NAT Rules

Click the little down arrow for add and select Add network Object

Name is whatever you want to call it. If its an exchange server an appropriate name would be mail or exchange... whatever makes it easy for you.

Type: Host
Ip Address: The Inside address of the server.
Translated addres would be the external IP.

After you get the server natted you would go into access rules and permit/deny what you need to to the server. However the rules go in order of how they are entered.

So you would allow the traffic for the specific ports first then a deny all rule after.
0
 
LVL 2

Author Closing Comment

by:msidnam
ID: 37770881
Thank you both. I had to use info from both of your comments.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Cisco Pix/ASA hairpinning The term, hairpinning, comes from the fact that the traffic comes from one source into a router or similar device, makes a U-turn, and goes back the same way it came. Visualize this and you will see something that looks …
When I upgraded my ASA 8.2 to 8.3, I realized that my nonat statement was failing!   The log showed the following error:     %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows It was caused by the config upgrade, because t…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now