Solved

FWSM Config

Posted on 2012-12-23
2
567 Views
Last Modified: 2012-12-24
In my company i am having FWSM and i want to understand the config which is running into it.i can easily make it out that object-group is called but still i am not able to understand two cmnds which are below.


name 5.5.5.5 sales  (why we use name cmd) ?

interface Vlan220
 nameif inside1
 security-level 70
 ip address 10.3.220.254 255.255.255.0 standby 10.3.220.250


interface Vlan146
 nameif outside
 security-level 0
 ip address 6.6.6.6 255.255.255.0 standby 6.6.6.7

 
object-group network POET
 description Poet
 network-object 9.79.48.0 255.255.255.0

object-group service WWW tcp
 description WEb Access TCP Ports
 port-object eq www
 port-object eq https

access-list outsidelist extended permit tcp object-group POET host sales object-group WWW

static (inside1,outside) sales 10.3.220.106 netmask 255.255.255.255  (what nat is this)

Thanks in advance.
0
Comment
Question by:pawanopensource
2 Comments
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 500 total points
ID: 38719013
The name command is simply a configuring a host name for 5.5.5.5. I don't think it's required but it's usually done. The NAT command is translating "sales" which is 5.5.5.5, to 10.3.220.106.
0
 
LVL 12

Expert Comment

by:Fidelius
ID: 38719103
Hello,

From command reference:
To associate a name with an IP address, use the name command in global configuration mode. To disable the use of the text names but not remove them from the configuration, use the no form of this command.
name ip_address name
no name ip_address [name]

static (inside1,outside) sales 10.3.220.106 netmask 255.255.255.255
This is persistent one-to-one NAT. It translates IP address 10.3.220.106 to sales IP (5.5.5.5)

static (real_ifc,mapped_ifc) mapped_ip real_ip netmask mask

For name command, you can find more info here:
http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/no.html#wp1638986
For static command, you can find more info here:
http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/command/reference/s8.html#wp2760334

Regards!
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now