Solved

ASA 8.3 NAT and ACLU

Posted on 2014-02-12
4
344 Views
Last Modified: 2014-02-19
I have just started to utilize the ASA iOS version 8.3 and 9.1
I need to open FTP Port on a server on my DMZ to be accessed from the outside, so I have configured the following NAT statement;

Object network FTP-Server
  Host 192.168.1.1
   NAT (DMZ,Outside) static 208.2.3.4 service tcp FTP FTP

Please correct me if the above is incorrect for the task.

What I and not sure about is the access list. I on this new version on the iOS do I still need to create an access list (as in the previous version) to allow any in to the server for FTP. if so how should it be stated?

Thanks in advance.
0
Comment
Question by:cyberchrisrock
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Spartan_1337 earned 500 total points
ID: 39855915
NAT statement looks fine.
Yes, ACL should be created for FTP service otherwise firewall will DENY all traffic to your host.
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856194
Right, and depending how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO


harbor235 ;}
0
 

Author Comment

by:cyberchrisrock
ID: 39856649
Right how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO

"multiple ACLs"? is it not the same as previous version?  1 ACL per interface, per direction? Can you please elaborate on "multiple ACLs"

Thanks in advance,
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856705
A true DMZ restricts traffic from the outside into the DMZ for authentication/authorization, no traffic is allowed from the outside to the inside without going through the DMZ, unless it is the return traffic of an established flow from inside to outside.  Once authenticated/authorized in the DMZ a separate flow is setup for dmz to inside resources if needed, but as I stated this is strictly enforced.


Of course this is up to the Network architect, there are implications security wise if not implemented properly, it comes down to what risk are you living to live with.


harbor235 ;}
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Firewall blocking images 4 78
Ping configured interface on Sonicwall 16 60
Need a "SonicWall" Replacement 12 37
server crashed 2 46
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question