Cisco ASA 5580 Panduan Memulai Cepat - Halaman 35

Jelajahi secara online atau unduh pdf Panduan Memulai Cepat untuk Perangkat Keras Jaringan Cisco ASA 5580. Cisco ASA 5580 40 halaman. Asa 5500 series adaptive security appliance
Juga untuk Cisco ASA 5580: Panduan Memulai Cepat (13 halaman)

Cisco ASA 5580 Panduan Memulai Cepat
Chapter 6
Configuring the ASA
(Optional) Making Internal Services Accessible from
the Internet (ASDM 6.2 and Later)
Step 1
Step 2
Step 3
78-19753-01

(Optional) Making Internal Services Accessible from the Internet (ASDM 6.2 and Later)

As a business owner, you might have internal network services, such as a web or
FTP server, that need to be available to an outside user. You can place these
services on a separate network behind the ASA, called a demilitarized zone
(DMZ). The ASA allows you to restrict access to the DMZ and only includes
public servers. By placing public servers on the DMZ, any attacks launched
against your public servers do not affect the Inside network.
The Public Server pane (available for ASDM 6.2 and later) displays a list of
public servers, internal and external addresses, the interfaces that the internal or
external addresses apply to, and the service that is exposed.
To set up public server access, perform the following steps:
In the main ASDM window, choose Configuration > Firewall > Public Servers.
The Public Server pane appears.
Click Add, then enter the public server settings in the Public Server dialog box.
(For information about any field, click Help.)
Click OK. The server appears in the list.
Cisco ASA 5580 Series Quick Start Guide
6-3