Solved

ASA 8.3 NAT and ACLU

Posted on 2014-02-12
4
343 Views
Last Modified: 2014-02-19
I have just started to utilize the ASA iOS version 8.3 and 9.1
I need to open FTP Port on a server on my DMZ to be accessed from the outside, so I have configured the following NAT statement;

Object network FTP-Server
  Host 192.168.1.1
   NAT (DMZ,Outside) static 208.2.3.4 service tcp FTP FTP

Please correct me if the above is incorrect for the task.

What I and not sure about is the access list. I on this new version on the iOS do I still need to create an access list (as in the previous version) to allow any in to the server for FTP. if so how should it be stated?

Thanks in advance.
0
Comment
Question by:cyberchrisrock
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Spartan_1337 earned 500 total points
ID: 39855915
NAT statement looks fine.
Yes, ACL should be created for FTP service otherwise firewall will DENY all traffic to your host.
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856194
Right, and depending how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO


harbor235 ;}
0
 

Author Comment

by:cyberchrisrock
ID: 39856649
Right how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO

"multiple ACLs"? is it not the same as previous version?  1 ACL per interface, per direction? Can you please elaborate on "multiple ACLs"

Thanks in advance,
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856705
A true DMZ restricts traffic from the outside into the DMZ for authentication/authorization, no traffic is allowed from the outside to the inside without going through the DMZ, unless it is the return traffic of an established flow from inside to outside.  Once authenticated/authorized in the DMZ a separate flow is setup for dmz to inside resources if needed, but as I stated this is strictly enforced.


Of course this is up to the Network architect, there are implications security wise if not implemented properly, it comes down to what risk are you living to live with.


harbor235 ;}
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question