Skip to main content

ASA 5505 DMZ and passthrough ports

More
17 years 1 week ago #23935 by Selket
I recently inhertited a network with an ASA 5505 in a remote office. I have a server there that needs to be placed into a DMZ on that ASA (Plus Security License already applied). I also need to allow specific port traffic to pass through.

I have created an Object-group:

Object-group service SERVER tcp
description TCP Passthrough Ports
Port-object range XXXX-XXXX
Port-object range xxxx-xxxx
Port-object range eq xxxxx


and an access list outside_access_in:

access-list outside_access_in extended permit tcp any host (outside IP) object-group SERVER


and applied this access list to the outside interface:

access-group outside_access_in in interface outside


Is this correct? And how do I associate the DMZ Server with this?

Thank you much,

S
More
17 years 1 week ago #23939 by skepticals
Have you configured the DMZ interface on the ASA?
More
17 years 1 week ago #23942 by sp1k3tou
Just like skepticals said you will need to configure a port on that ASA as a DMZ port. Also you will need to assign your access list to whatever you named the DMZ interface.

Post a show run so we can see your full configuration along with a show ver so we can see if that port is active after the security license has been applied.
More
16 years 11 months ago #24105 by Elohim
An analysis of the services being offered by that server will determine what port needs to be opened. YOu can't just open ports without knowing what services are offered. If that's the case, just open for everything.

I recently inhertited a network with an ASA 5505 in a remote office. I have a server there that needs to be placed into a DMZ on that ASA (Plus Security License already applied). I also need to allow specific port traffic to pass through.

I have created an Object-group:

Object-group service SERVER tcp
description TCP Passthrough Ports
Port-object range XXXX-XXXX
Port-object range xxxx-xxxx
Port-object range eq xxxxx


and an access list outside_access_in:

access-list outside_access_in extended permit tcp any host (outside IP) object-group SERVER


and applied this access list to the outside interface:

access-group outside_access_in in interface outside


Is this correct? And how do I associate the DMZ Server with this?

Thank you much,

S

Time to create page: 0.124 seconds