Cisco PIX-515E Manuel de démarrage rapide - Page 9

Parcourez en ligne ou téléchargez le pdf Manuel de démarrage rapide pour {nom_de_la_catégorie} Cisco PIX-515E. Cisco PIX-515E 42 pages. Security appliance
Également pour Cisco PIX-515E : Manuel de démarrage rapide (42 pages)

Cisco PIX-515E Manuel de démarrage rapide
Because the DMZ web server is located on a private DMZ network, it is necessary to translate its
private IP address to a public (routable) IP address. This public address allows external clients to have
HTTP access to the DMZ web server in the same way the clients would access any server on the
Internet.
This DMZ configuration scenario, shown in Figure 2, provides two routable IP addresses that are
publicly available: one for the outside interface (209.165.156.10) and one for the translated DMZ web
server (209.165.156.11). The following procedure describes how to use ASDM to configure the security
appliance for secure communications between HTTP clients and the web server.
In this DMZ scenario, the security appliance already has an outside interface configured, called dmz.
Set up the security appliance interface for your DMZ by using the Startup Wizard. Ensure that the
security level is set between 0 and 100. (A common choice is 50).
Information to Have Available
• Internal IP addresses of the servers inside the DMZ that you want to make available to clients on
the public network (in this scenario, a web server).
• External IP addresses to be used for servers inside the DMZ. (Clients on the public network will
use the external IP address to access the server inside the DMZ.)
• Client IP address to substitute for internal IP addresses in outgoing traffic. (Outgoing client traffic
will appear to come from this address so that the internal IP address is not exposed.)
Step 1: Configure IP Pools for Network Translations
For an inside HTTP client (10.10.10.10) to access the web server on the DMZ network (30.30.30.30),
it is necessary to define a pool of IP addresses (30.30.30.50–30.30.30.60) for the DMZ interface.
Similarly, an IP pool for the outside interface (209.165.156.10) is required for the inside HTTP client
to communicate with any device on the public network. Use ASDM to manage IP pools efficiently and
to facilitate secure communications between protected network clients and devices on the Internet.
1. Launch ASDM by entering this factory default IP address in the address field of a web browser:
https://192.168.1.1.
2. Click the Configuration button at the top of the ASDM window.
3. Choose the NAT feature on the left side of the ASDM window.
9