Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Asa 5520  7.2

Posted on 2013-11-26
7
336 Views
Last Modified: 2013-11-27
I  have  to setup some inbound  rules and NAT for 443 , 3389  and 25 (smtp)

so  195.x.x.x  in bound to 10.40.226.35   how can a accumplish this on a cisco asa 5520  runnign 7.2
0
Comment
Question by:thombie
  • 4
  • 3
7 Comments
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39678106
static (inside,outside) 195.x.x.x 10.40.226.35 netmask 255.255.255.255

As long as it isn't the IP address on your outside interface ;)
0
 

Author Comment

by:thombie
ID: 39678180
no it will be  a  seperate IP from the outside interface.
Ok so  be the statment for the  smtp and 443 rules look like  ?
0
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 500 total points
ID: 39678201
Rules?
You mean the ACL's?

access-list outside extended permit tcp any host 195.x.x.x eq 25
access-list outside extended permit tcp any host 195.x.x.x eq 443
access-list outside extended permit tcp any host 195.x.x.x eq 3389


That should do it.
0
Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

 

Author Comment

by:thombie
ID: 39680114
Thanks I will try this today.
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39680145
Let me know how it works out :)
0
 

Author Comment

by:thombie
ID: 39681468
perfect that worked
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 39681482
My pleasure,  thx for the points :)
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question