Solved

ASA 8.3 NAT and ACLU

Posted on 2014-02-12
4
345 Views
Last Modified: 2014-02-19
I have just started to utilize the ASA iOS version 8.3 and 9.1
I need to open FTP Port on a server on my DMZ to be accessed from the outside, so I have configured the following NAT statement;

Object network FTP-Server
  Host 192.168.1.1
   NAT (DMZ,Outside) static 208.2.3.4 service tcp FTP FTP

Please correct me if the above is incorrect for the task.

What I and not sure about is the access list. I on this new version on the iOS do I still need to create an access list (as in the previous version) to allow any in to the server for FTP. if so how should it be stated?

Thanks in advance.
0
Comment
Question by:cyberchrisrock
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
Spartan_1337 earned 500 total points
ID: 39855915
NAT statement looks fine.
Yes, ACL should be created for FTP service otherwise firewall will DENY all traffic to your host.
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856194
Right, and depending how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO


harbor235 ;}
0
 

Author Comment

by:cyberchrisrock
ID: 39856649
Right how you are designing your DMZ you will be creating/updating multiple ACLs. Traffic into/leaving a DMZ should be strictly policed IMO

"multiple ACLs"? is it not the same as previous version?  1 ACL per interface, per direction? Can you please elaborate on "multiple ACLs"

Thanks in advance,
0
 
LVL 32

Expert Comment

by:harbor235
ID: 39856705
A true DMZ restricts traffic from the outside into the DMZ for authentication/authorization, no traffic is allowed from the outside to the inside without going through the DMZ, unless it is the return traffic of an established flow from inside to outside.  Once authenticated/authorized in the DMZ a separate flow is setup for dmz to inside resources if needed, but as I stated this is strictly enforced.


Of course this is up to the Network architect, there are implications security wise if not implemented properly, it comes down to what risk are you living to live with.


harbor235 ;}
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question