Solved

Asa 5520  7.2

Posted on 2013-11-26
7
333 Views
Last Modified: 2013-11-27
I  have  to setup some inbound  rules and NAT for 443 , 3389  and 25 (smtp)

so  195.x.x.x  in bound to 10.40.226.35   how can a accumplish this on a cisco asa 5520  runnign 7.2
0
Comment
Question by:thombie
  • 4
  • 3
7 Comments
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39678106
static (inside,outside) 195.x.x.x 10.40.226.35 netmask 255.255.255.255

As long as it isn't the IP address on your outside interface ;)
0
 

Author Comment

by:thombie
ID: 39678180
no it will be  a  seperate IP from the outside interface.
Ok so  be the statment for the  smtp and 443 rules look like  ?
0
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 39678201
Rules?
You mean the ACL's?

access-list outside extended permit tcp any host 195.x.x.x eq 25
access-list outside extended permit tcp any host 195.x.x.x eq 443
access-list outside extended permit tcp any host 195.x.x.x eq 3389


That should do it.
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 

Author Comment

by:thombie
ID: 39680114
Thanks I will try this today.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39680145
Let me know how it works out :)
0
 

Author Comment

by:thombie
ID: 39681468
perfect that worked
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39681482
My pleasure,  thx for the points :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
wireshark 2 computers 8 42
Telco & Point to Point Internet VPN 3 77
Intrusion detection 20 57
RNC Hacking Question 6 28
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now