Solved

FWSM Config

Posted on 2012-12-23
2
583 Views
Last Modified: 2012-12-24
In my company i am having FWSM and i want to understand the config which is running into it.i can easily make it out that object-group is called but still i am not able to understand two cmnds which are below.


name 5.5.5.5 sales  (why we use name cmd) ?

interface Vlan220
 nameif inside1
 security-level 70
 ip address 10.3.220.254 255.255.255.0 standby 10.3.220.250


interface Vlan146
 nameif outside
 security-level 0
 ip address 6.6.6.6 255.255.255.0 standby 6.6.6.7

 
object-group network POET
 description Poet
 network-object 9.79.48.0 255.255.255.0

object-group service WWW tcp
 description WEb Access TCP Ports
 port-object eq www
 port-object eq https

access-list outsidelist extended permit tcp object-group POET host sales object-group WWW

static (inside1,outside) sales 10.3.220.106 netmask 255.255.255.255  (what nat is this)

Thanks in advance.
0
Comment
Question by:pawanopensource
2 Comments
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 500 total points
ID: 38719013
The name command is simply a configuring a host name for 5.5.5.5. I don't think it's required but it's usually done. The NAT command is translating "sales" which is 5.5.5.5, to 10.3.220.106.
0
 
LVL 12

Expert Comment

by:Fidelius
ID: 38719103
Hello,

From command reference:
To associate a name with an IP address, use the name command in global configuration mode. To disable the use of the text names but not remove them from the configuration, use the no form of this command.
name ip_address name
no name ip_address [name]

static (inside1,outside) sales 10.3.220.106 netmask 255.255.255.255
This is persistent one-to-one NAT. It translates IP address 10.3.220.106 to sales IP (5.5.5.5)

static (real_ifc,mapped_ifc) mapped_ip real_ip netmask mask

For name command, you can find more info here:
http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/no.html#wp1638986
For static command, you can find more info here:
http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/s8.html#wp2760334

Regards!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now